Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe
Resource
win10v2004-20250217-en
General
-
Target
afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe
-
Size
85KB
-
MD5
a16c2a3acd3cb3d77a3771c0a0f003f7
-
SHA1
2c181395b2511974f786138815f22f2e005d8cbe
-
SHA256
afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2
-
SHA512
d7eebca3b658648a8c7ca0de16916488b324e247974b4d65c0ad29bda0daba783ab31a3006878a754a1c15a007bbbb2b518ed8bdde1c6e64388ccf5812be2eb1
-
SSDEEP
1536:f64mODOs64iWwzN04C0PiGzfHu51G5YclO7uXcNvvm5yw/Lb0OUrrQ35wNBJ:yXe64yN0nM5P2E5YX7usluTXp6J
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdkgocpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdkgocpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmclhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdoajb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bonoflae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmclhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhhpeafc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdoajb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bonoflae.exe -
Berbew family
-
Executes dropped EXE 6 IoCs
pid Process 2236 Bonoflae.exe 2464 Bdkgocpm.exe 2704 Bmclhi32.exe 2500 Bhhpeafc.exe 1092 Cdoajb32.exe 2164 Cacacg32.exe -
Loads dropped DLL 16 IoCs
pid Process 2848 afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe 2848 afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe 2236 Bonoflae.exe 2236 Bonoflae.exe 2464 Bdkgocpm.exe 2464 Bdkgocpm.exe 2704 Bmclhi32.exe 2704 Bmclhi32.exe 2500 Bhhpeafc.exe 2500 Bhhpeafc.exe 1092 Cdoajb32.exe 1092 Cdoajb32.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cdoajb32.exe Bhhpeafc.exe File opened for modification C:\Windows\SysWOW64\Bonoflae.exe afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe File created C:\Windows\SysWOW64\Bdkgocpm.exe Bonoflae.exe File opened for modification C:\Windows\SysWOW64\Bdkgocpm.exe Bonoflae.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe Cdoajb32.exe File created C:\Windows\SysWOW64\Dnabbkhk.dll Bhhpeafc.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll Cdoajb32.exe File created C:\Windows\SysWOW64\Jodjlm32.dll Bmclhi32.exe File created C:\Windows\SysWOW64\Bonoflae.exe afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe File created C:\Windows\SysWOW64\Eignpade.dll afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe File created C:\Windows\SysWOW64\Fcohbnpe.dll Bonoflae.exe File created C:\Windows\SysWOW64\Opacnnhp.dll Bdkgocpm.exe File opened for modification C:\Windows\SysWOW64\Bhhpeafc.exe Bmclhi32.exe File created C:\Windows\SysWOW64\Cacacg32.exe Cdoajb32.exe File created C:\Windows\SysWOW64\Bmclhi32.exe Bdkgocpm.exe File opened for modification C:\Windows\SysWOW64\Bmclhi32.exe Bdkgocpm.exe File created C:\Windows\SysWOW64\Bhhpeafc.exe Bmclhi32.exe File created C:\Windows\SysWOW64\Cdoajb32.exe Bhhpeafc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2368 2164 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmclhi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhhpeafc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdoajb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cacacg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bonoflae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdkgocpm.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdoajb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdkgocpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opacnnhp.dll" Bdkgocpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmclhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcohbnpe.dll" Bonoflae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmclhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnabbkhk.dll" Bhhpeafc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdoajb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Cdoajb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdkgocpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bonoflae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bonoflae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eignpade.dll" afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jodjlm32.dll" Bmclhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhhpeafc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2236 2848 afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe 30 PID 2848 wrote to memory of 2236 2848 afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe 30 PID 2848 wrote to memory of 2236 2848 afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe 30 PID 2848 wrote to memory of 2236 2848 afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe 30 PID 2236 wrote to memory of 2464 2236 Bonoflae.exe 31 PID 2236 wrote to memory of 2464 2236 Bonoflae.exe 31 PID 2236 wrote to memory of 2464 2236 Bonoflae.exe 31 PID 2236 wrote to memory of 2464 2236 Bonoflae.exe 31 PID 2464 wrote to memory of 2704 2464 Bdkgocpm.exe 32 PID 2464 wrote to memory of 2704 2464 Bdkgocpm.exe 32 PID 2464 wrote to memory of 2704 2464 Bdkgocpm.exe 32 PID 2464 wrote to memory of 2704 2464 Bdkgocpm.exe 32 PID 2704 wrote to memory of 2500 2704 Bmclhi32.exe 33 PID 2704 wrote to memory of 2500 2704 Bmclhi32.exe 33 PID 2704 wrote to memory of 2500 2704 Bmclhi32.exe 33 PID 2704 wrote to memory of 2500 2704 Bmclhi32.exe 33 PID 2500 wrote to memory of 1092 2500 Bhhpeafc.exe 34 PID 2500 wrote to memory of 1092 2500 Bhhpeafc.exe 34 PID 2500 wrote to memory of 1092 2500 Bhhpeafc.exe 34 PID 2500 wrote to memory of 1092 2500 Bhhpeafc.exe 34 PID 1092 wrote to memory of 2164 1092 Cdoajb32.exe 35 PID 1092 wrote to memory of 2164 1092 Cdoajb32.exe 35 PID 1092 wrote to memory of 2164 1092 Cdoajb32.exe 35 PID 1092 wrote to memory of 2164 1092 Cdoajb32.exe 35 PID 2164 wrote to memory of 2368 2164 Cacacg32.exe 36 PID 2164 wrote to memory of 2368 2164 Cacacg32.exe 36 PID 2164 wrote to memory of 2368 2164 Cacacg32.exe 36 PID 2164 wrote to memory of 2368 2164 Cacacg32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe"C:\Users\Admin\AppData\Local\Temp\afd249af7f0b15f3845c3cc6e69542cfdfd8af35d5013bb399bd6038504f1fa2.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Bonoflae.exeC:\Windows\system32\Bonoflae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Bdkgocpm.exeC:\Windows\system32\Bdkgocpm.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Bmclhi32.exeC:\Windows\system32\Bmclhi32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\Bhhpeafc.exeC:\Windows\system32\Bhhpeafc.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\Cdoajb32.exeC:\Windows\system32\Cdoajb32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:2368
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD53b59b8e906217ca12d5ea1ee29a8c41b
SHA1ed83d1c92586abf11aea95e22ee1e2c629251100
SHA256e7c5f874390147c6f3e73a2bc78399770130d254d78fc0fabac3b67b41d422ea
SHA512787c41dcfdb85a313e9909dd998be45ff9b010054481990f7c288f655260e0e4ddb570d4fd1c5c8e95623756ba6ceac3b117894f12caec0cf57ef4d3d912143e
-
Filesize
85KB
MD56d3453e02cd3e7ae14e480954b541ca9
SHA1dbd1df2ccf664446b9faa2c4738b7e820f033915
SHA256f06cd64451ba7d7eff506fa603f3bc6c7a5d965cea230c6b7491a139fb2039c7
SHA512a3025630d636a17d36a254796bf6d20149a7f12f31c432ed97969a2c41f5538dbd11665362084a0c0473866ea987ee4121852fe193f2b9ece9d598ac997d0302
-
Filesize
85KB
MD5a74e58e02d9472c90a2026f878fc7d22
SHA1b4293d3706461755ea09484f883c8073b7932cb6
SHA256543cd628f33291da1f58a306a7d2c7824fed592c8bdc188c8dd6ff60e5ba1f61
SHA5121741b2d3bfbffd9743f56a9f5c19427057a5f86df7eaad9534d8c5d51a30656947abcdd33155f04167f64b19f143189bdd2e3413a04ad170e580f679fa4034e1
-
Filesize
85KB
MD5d857b332aca972f0d44f00ba57f629f5
SHA150dd83b9c425d7846a0e02332f70e3a7215cd09d
SHA25698315f50a7ea3ae9a7c37725e843f18804e08d500e9704bee8c8fc07602cad6c
SHA512cfa60420e90d4fe0946e1d72eb4115e32a34d7aad4ffdbd5ac0506f55a7a50e036cebf636f5e6c52ee29efa5d4bc9c5c5fc6cfe6260671c14888d04c4518c961
-
Filesize
85KB
MD5086b36c9e2864e193fad353f489466b9
SHA1f3e4e0a078f38b8dfa634b5a49307654fc11d975
SHA256255d7d573944d7810ae777287afbef97ad8a1d2ade024599cf9d4206543f91b5
SHA5127f1e80c3a7052c826a853f0a94821d4eaed1d7b442abf2ce038350c8df9ed68a8716461eeaccf1e2e137afc6e20be8f2e26785dc6032347251a75ce921124984
-
Filesize
85KB
MD58fda9fe6b9f2364fb66ce4e2a2f21f45
SHA1abe8c06867fed737e55b15293ae695cc642ac2da
SHA25688c9b9972e0994066daf30db1338a95abae702c9614a2a9860b23fffd02079ba
SHA51233afbf99aa6b9dd5eebf56bb3dc1b8cbe875084a200360e493a6a0bdc608aa0b5c77b44f8ad152a5f34a0241d30825c178211a61dce64fc29055499b2e85d703