Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 03:25

General

  • Target

    dcc498f24008b14e01da869bd8fb6ff6dc83a3e014ddd45038f643e77756c561.exe

  • Size

    72KB

  • MD5

    f13f4fd0e0a21070119f217408419f14

  • SHA1

    b493f596a69c71514c9edef31829fe1ed999c094

  • SHA256

    dcc498f24008b14e01da869bd8fb6ff6dc83a3e014ddd45038f643e77756c561

  • SHA512

    ebba6b85a8044ab582e8db065908d9891404dd19f90884155da11907be594efb4a9eb1469272298cc985b25d71965b981871b65bddc1a095010e948d0fa573b6

  • SSDEEP

    768:x7dtXTJNvrfBnVN7AE65emQYLjILF1tDa1lTetv/1H58iU9UiEb/KEiEixV38HiD:x7fTzvrf2ImpUZMTetB+PgUN3QivEtA

Malware Config

Extracted

Family

berbew

C2

http://tat-neftbank.ru/kkq.php

http://tat-neftbank.ru/wcmd.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 24 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 12 IoCs
  • Drops file in System32 directory 36 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 39 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcc498f24008b14e01da869bd8fb6ff6dc83a3e014ddd45038f643e77756c561.exe
    "C:\Users\Admin\AppData\Local\Temp\dcc498f24008b14e01da869bd8fb6ff6dc83a3e014ddd45038f643e77756c561.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Windows\SysWOW64\Djgjlelk.exe
      C:\Windows\system32\Djgjlelk.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Windows\SysWOW64\Dobfld32.exe
        C:\Windows\system32\Dobfld32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\SysWOW64\Ddonekbl.exe
          C:\Windows\system32\Ddonekbl.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4068
          • C:\Windows\SysWOW64\Dhkjej32.exe
            C:\Windows\system32\Dhkjej32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1300
            • C:\Windows\SysWOW64\Dkifae32.exe
              C:\Windows\system32\Dkifae32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1092
              • C:\Windows\SysWOW64\Daconoae.exe
                C:\Windows\system32\Daconoae.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4672
                • C:\Windows\SysWOW64\Ddakjkqi.exe
                  C:\Windows\system32\Ddakjkqi.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4424
                  • C:\Windows\SysWOW64\Dkkcge32.exe
                    C:\Windows\system32\Dkkcge32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3836
                    • C:\Windows\SysWOW64\Dmjocp32.exe
                      C:\Windows\system32\Dmjocp32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3668
                      • C:\Windows\SysWOW64\Dddhpjof.exe
                        C:\Windows\system32\Dddhpjof.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1820
                        • C:\Windows\SysWOW64\Dknpmdfc.exe
                          C:\Windows\system32\Dknpmdfc.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1284
                          • C:\Windows\SysWOW64\Dmllipeg.exe
                            C:\Windows\system32\Dmllipeg.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3536
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 396
                              14⤵
                              • Program crash
                              PID:3988
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3536 -ip 3536
    1⤵
      PID:4656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      72KB

      MD5

      632888c307a584ac70b33f3ddf5dfd63

      SHA1

      93ebd4be0142bbc86b59310a9430bb14e744f003

      SHA256

      28433cb2e097abc24850442e721dde274b2cc4d7eea7090c244bd51bea1adb6b

      SHA512

      2ff7198041086abfd85104766a63d865b86c441d290d35fa54dea453c7d2f03f0174c134ae562aaa67f4e5b4e53558df3c4b903678e7caa6390bbe9a9b21a9b0

    • C:\Windows\SysWOW64\Ddakjkqi.exe

      Filesize

      72KB

      MD5

      3ebf2025710631d26a24134e79c8efc6

      SHA1

      c32914768cf29b58a507a0a293949be2b4e3568f

      SHA256

      51a4ceb556324c64a75d152361b753f260626093da9faa97a50135e2a2ee5e88

      SHA512

      911396100133a9254f7f78a895e59b47a7542ed6be5c9dc1a4068cf6316626a84ac0d59e1f4744342c1205c402ff5bd1e1fed5e516149cf5344b7588c4493e25

    • C:\Windows\SysWOW64\Dddhpjof.exe

      Filesize

      72KB

      MD5

      4a067ab7f0496fc75703f39c323b6305

      SHA1

      4ad69a618dcc437dd4d4b55abdb658d281b5b5b7

      SHA256

      abc9b62a45ccd317a45c30df608b3414a96a62db2e52963a4f8da3b2bb9b7a50

      SHA512

      79912959a97ad06c63488c857a0a83860c26b53d17900477e800e18e8feb60286aca209a6870d13f1fe15486811f2b886b921a8f548c9642d757acfee351c387

    • C:\Windows\SysWOW64\Ddonekbl.exe

      Filesize

      72KB

      MD5

      22578282d1deca203aae1cbe6c42061e

      SHA1

      f21de7e3418eb465eb2f03cc5b7b806522a01368

      SHA256

      057a378ddc8165e0518e5a59ae9e89f1c76446065b24b41fe05c712b101cef01

      SHA512

      4e4ea6d94af974c609a8c637d57865cfd2085de5d9e1c6025b5738477213f12dcd9ddda1271afbf08b7cbb77c81ec43124802d13ae94edeb7275de5c87666638

    • C:\Windows\SysWOW64\Dhkjej32.exe

      Filesize

      72KB

      MD5

      ec1990fd564fad9fe4f51a1ca5af8ab3

      SHA1

      4f4cbd60afab7a7d7031f1890e1217771e32c3af

      SHA256

      71cb036b44fde63c1e2520e096ffea5350b212a2574499f8a9817708dd96818e

      SHA512

      e3b84ed91b670c48b4d0797c577567138f30d397372c5e23178af772486f072540cd637d17561ac7da707866d3bcd9102eeb1a220a451719c82c18cbcc810f22

    • C:\Windows\SysWOW64\Djgjlelk.exe

      Filesize

      72KB

      MD5

      f204634c59721cb11be2b77051fc42d6

      SHA1

      1c45b4058f1ce99f027837e2c67cc672f31eb536

      SHA256

      0455a9ef7b7b66c89a055f6c5e2eeca0c00a791fabec8ad600fc3aeb3a3f7b87

      SHA512

      2226b7e3ac151501ff649f99d4ae916f0f89cfdba456ce04b3d206eca871d9ba9ba6cda5c7b09ab5cc5074afff1469662a5da277f73c521a3f0bef3c0e872028

    • C:\Windows\SysWOW64\Dkifae32.exe

      Filesize

      72KB

      MD5

      47df19e040d8993e05ac40fb82a91b3e

      SHA1

      894738beabf6aad443b7ad65ca0a704cf0082698

      SHA256

      08609b4e8e25d5249142685685ef5396a0fd8466ecee8f2f32b1958f63b7f3e9

      SHA512

      5afaeaa592fb81171f9058003cc2823480619d9d747b41f1d0ee37b21eceaa648eec7092cd25d901a17bd960faeca78e6b0912bdf549d2cd6af8859a322548b2

    • C:\Windows\SysWOW64\Dkkcge32.exe

      Filesize

      72KB

      MD5

      bb8e7da89a3dbd3f586d6ae1cf20cf75

      SHA1

      38408120f5cc4fa45dccf81a56c69993cfd34773

      SHA256

      e19e315b2c5f30b613004646568d7c46ad8229116e72e051f78384a572241807

      SHA512

      5db49ed8d9eddd1979c6dd74b5e1b1e551523bd369316af13ff4a349ae6f6f7525f52da6e2e1b543bca36acebf83d2b595c98cee3a053594efaac8a24ada70d8

    • C:\Windows\SysWOW64\Dknpmdfc.exe

      Filesize

      72KB

      MD5

      9b995540d32c84d43b6495a329c6f05b

      SHA1

      2c2d1a9cfa2556af8784f06e6ef0564f8971db98

      SHA256

      5c1e9a91e88e375819c848d27636e7ae188caa15a055869ca55b5159a4cc72ea

      SHA512

      8d1a0c841097a0f431168215c1d58564c141803faf582c59f34d4f9e230480c2cfead17dfa9cc80d5bdf73ac857a3e8c638dbc80f3e9a5b13b24e2a36fd8af4c

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      72KB

      MD5

      3454a2db7cf626cafb2bcb6fee4970f2

      SHA1

      51bf046e4d90db2b3f7ec3f19dbc3a060c08d183

      SHA256

      15df0ca860000ef5760b3f8a1d08f89f216163f32a519fa301d9412a1d0ff431

      SHA512

      49a55d344b08e6aaa82297192d4070d9ad05316e2070aa9662ba1cb525bbac6ba7ecec813b7342a8e0592752c0b76f7bb119ec4947e5dd89f92b6fd0c75f706d

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      72KB

      MD5

      e99ab68ca83acdbe4928108e016f6524

      SHA1

      219704796175bd01081cac07bb74b15018a15bc2

      SHA256

      9e4cd4923332cf653e2b08c6abd5004f6922b01902eec3dcb7da3d635fd40776

      SHA512

      6e089a8dc99991ed1701fe9ab5dbc372b50fb6853da74e91cf1e399013f9322006a3d613b9327210c05c442303b5679b48a36187604bab414c2b30177dc3dae3

    • C:\Windows\SysWOW64\Dobfld32.exe

      Filesize

      72KB

      MD5

      34632e9ed86a37371b9fd14674e704e8

      SHA1

      8d29ea13f59872c14da5b764f581c545de777e6a

      SHA256

      9c954b719d0a190a149ed5de5b0a3cb4ee88a09b6f5607dd72618cee07331286

      SHA512

      dd86f620637f9383af470536c6362f1d6dff1747da264cad6851c3c0a4c4b7bfefbfdd525c123e980a0b0e20e3181ea7f9c129dcda5bda9c37fb57ded9b8b852

    • memory/1092-39-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1092-108-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1284-102-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1284-94-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1300-31-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1300-109-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1820-103-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1820-80-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2340-97-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2340-16-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3536-98-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3536-101-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3668-71-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3668-104-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3836-105-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3836-63-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4068-100-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4068-23-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4424-55-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4424-106-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4568-89-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4568-7-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4672-47-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4672-107-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/5072-0-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/5072-79-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB