Analysis

  • max time kernel
    132s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 19:47

General

  • Target

    NEAS.c856e0294312d1ec453e81f1aaf43fe0_JC.exe

  • Size

    177KB

  • MD5

    c856e0294312d1ec453e81f1aaf43fe0

  • SHA1

    74662a6da9f3a687d3d50953cb3f22a82736ea75

  • SHA256

    d1e01d59f8c5985bd10ca627e5c5e66cbfcb5c947743c45177f7d736609da65a

  • SHA512

    2d9b35c9b03171505039291ac40458d4efc7e2ce5d46923ef4bdb0b86d4dfad45035a2998aed00c484f46beeb2b2243554b6f70f917018de7dd9b4681f715446

  • SSDEEP

    3072:csskf8FFtfylLFN1Eg3q/haR5sS+vfvLHhjh8g1eGFyOsa:c7FYFPEga/harSvLHh98gwG0ON

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Malware Backdoor - Berbew 33 IoCs

    Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 2 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c856e0294312d1ec453e81f1aaf43fe0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c856e0294312d1ec453e81f1aaf43fe0_JC.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Windows\SysWOW64\Laiipofp.exe
      C:\Windows\system32\Laiipofp.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Windows\SysWOW64\Mqhfoebo.exe
        C:\Windows\system32\Mqhfoebo.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Windows\SysWOW64\Nodiqp32.exe
          C:\Windows\system32\Nodiqp32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:5108
          • C:\Windows\SysWOW64\Oifppdpd.exe
            C:\Windows\system32\Oifppdpd.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3912
            • C:\Windows\SysWOW64\Ppdbgncl.exe
              C:\Windows\system32\Ppdbgncl.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1860
              • C:\Windows\SysWOW64\Piocecgj.exe
                C:\Windows\system32\Piocecgj.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:400
                • C:\Windows\SysWOW64\Pififb32.exe
                  C:\Windows\system32\Pififb32.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2580
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 400
                    9⤵
                    • Program crash
                    PID:4408
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 400
                    9⤵
                    • Program crash
                    PID:1480
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2580 -ip 2580
    1⤵
      PID:2360

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Laiipofp.exe

            Filesize

            177KB

            MD5

            bafd06ebae6ebecb4b666b3abf253582

            SHA1

            eaddc0eab77423572c35bd2d221ebda6c7863c42

            SHA256

            cfab51b39fe0ae5ebcb7965d62a777c74d10f04410f08c979ba073bf637cae7e

            SHA512

            25cacb4d6b0a03347a9869f4fde90fe3e431d110ae2dafd20bdfedd378cfdef7dd7dd3da72ff10739a9ab29c2cf67e97c26019b06ae2961a1d65fb58d8f98cf7

          • C:\Windows\SysWOW64\Laiipofp.exe

            Filesize

            177KB

            MD5

            bafd06ebae6ebecb4b666b3abf253582

            SHA1

            eaddc0eab77423572c35bd2d221ebda6c7863c42

            SHA256

            cfab51b39fe0ae5ebcb7965d62a777c74d10f04410f08c979ba073bf637cae7e

            SHA512

            25cacb4d6b0a03347a9869f4fde90fe3e431d110ae2dafd20bdfedd378cfdef7dd7dd3da72ff10739a9ab29c2cf67e97c26019b06ae2961a1d65fb58d8f98cf7

          • C:\Windows\SysWOW64\Mqhfoebo.exe

            Filesize

            177KB

            MD5

            da742de4de3ad2f687373a093e4cd6e1

            SHA1

            577253240a6ace4af82588463bb32f57ab9781b6

            SHA256

            5be77060d8c76c81ae2aca0ab341bbb09536e96f1461d848a530394dc5bbb834

            SHA512

            efaaced1e9902e7d798cbde35398a4677ceb3d22c21fd835b494596dceb5f7cb1be789fbfb8887183308534cbbc1aa32df29e2c39ff1104a72c59a977afd2447

          • C:\Windows\SysWOW64\Mqhfoebo.exe

            Filesize

            177KB

            MD5

            da742de4de3ad2f687373a093e4cd6e1

            SHA1

            577253240a6ace4af82588463bb32f57ab9781b6

            SHA256

            5be77060d8c76c81ae2aca0ab341bbb09536e96f1461d848a530394dc5bbb834

            SHA512

            efaaced1e9902e7d798cbde35398a4677ceb3d22c21fd835b494596dceb5f7cb1be789fbfb8887183308534cbbc1aa32df29e2c39ff1104a72c59a977afd2447

          • C:\Windows\SysWOW64\Mqhfoebo.exe

            Filesize

            177KB

            MD5

            da742de4de3ad2f687373a093e4cd6e1

            SHA1

            577253240a6ace4af82588463bb32f57ab9781b6

            SHA256

            5be77060d8c76c81ae2aca0ab341bbb09536e96f1461d848a530394dc5bbb834

            SHA512

            efaaced1e9902e7d798cbde35398a4677ceb3d22c21fd835b494596dceb5f7cb1be789fbfb8887183308534cbbc1aa32df29e2c39ff1104a72c59a977afd2447

          • C:\Windows\SysWOW64\Nodiqp32.exe

            Filesize

            177KB

            MD5

            6b6cd294366eec859deb92735ac5ac80

            SHA1

            0e724cbd37cd9a3b1ce340e6f2dc015cbb2d8047

            SHA256

            c93b1c3f743e9d9810cb216d84993499b8a80d0bc26968587c8bf6e40ae32509

            SHA512

            3e971032c6dcf7b13bea6b8c7d3ba580b2eda91d3dd538045c7f52edf957e266d9ae30c11ba780c889dcec31fd1b38e77b1b359a18c5d60d38a938a53bb77f40

          • C:\Windows\SysWOW64\Nodiqp32.exe

            Filesize

            177KB

            MD5

            6b6cd294366eec859deb92735ac5ac80

            SHA1

            0e724cbd37cd9a3b1ce340e6f2dc015cbb2d8047

            SHA256

            c93b1c3f743e9d9810cb216d84993499b8a80d0bc26968587c8bf6e40ae32509

            SHA512

            3e971032c6dcf7b13bea6b8c7d3ba580b2eda91d3dd538045c7f52edf957e266d9ae30c11ba780c889dcec31fd1b38e77b1b359a18c5d60d38a938a53bb77f40

          • C:\Windows\SysWOW64\Oifppdpd.exe

            Filesize

            177KB

            MD5

            ded8892f8c58622f0115cb45511c7fa5

            SHA1

            621a392397aaa7a3308f3900b78d7d0f946dba04

            SHA256

            2ba6718f586c379ba683e7d6c5fc581cf7008aadcbd4513791a42e49a0a43318

            SHA512

            b6b19ab0a1a551caec563abacb33af2cc61ced1cdd7f11bd28f300e31bdd41379ce38425dc61d96435bfb00bf301291d9840b8735bb53080bba607d117336ed0

          • C:\Windows\SysWOW64\Oifppdpd.exe

            Filesize

            177KB

            MD5

            ded8892f8c58622f0115cb45511c7fa5

            SHA1

            621a392397aaa7a3308f3900b78d7d0f946dba04

            SHA256

            2ba6718f586c379ba683e7d6c5fc581cf7008aadcbd4513791a42e49a0a43318

            SHA512

            b6b19ab0a1a551caec563abacb33af2cc61ced1cdd7f11bd28f300e31bdd41379ce38425dc61d96435bfb00bf301291d9840b8735bb53080bba607d117336ed0

          • C:\Windows\SysWOW64\Pififb32.exe

            Filesize

            177KB

            MD5

            b1fa396c2cdf86ef4182da34d2c4f8b3

            SHA1

            2ac9b1d451a88b57c471b131ec61c17c7dd1cf52

            SHA256

            f11e86883f7eda5d214af2a2dec77b238f4052bf7eba1ec4977529b920021156

            SHA512

            cdb5cd1f4185cd195e0b85090b1a0c3098c5c9967f8fdda3ca874e327741d88ea5e6c64c0f22119a95fa7dd3228bcee026721fd4e9681804f935c22547a8155f

          • C:\Windows\SysWOW64\Pififb32.exe

            Filesize

            177KB

            MD5

            b1fa396c2cdf86ef4182da34d2c4f8b3

            SHA1

            2ac9b1d451a88b57c471b131ec61c17c7dd1cf52

            SHA256

            f11e86883f7eda5d214af2a2dec77b238f4052bf7eba1ec4977529b920021156

            SHA512

            cdb5cd1f4185cd195e0b85090b1a0c3098c5c9967f8fdda3ca874e327741d88ea5e6c64c0f22119a95fa7dd3228bcee026721fd4e9681804f935c22547a8155f

          • C:\Windows\SysWOW64\Piocecgj.exe

            Filesize

            177KB

            MD5

            fddb478d6bca64a196657a6ac1eb9d6e

            SHA1

            d99dfb945417056284cacf88e79262c111149e25

            SHA256

            854b9825c7c1c87e20ce0e19d29f9779bc33196efbc42bd1a0050a11b3dc27c0

            SHA512

            ac4255a96b5f026e9aefa8e839f2dea202a537a9bc817543d0db38feda1ed0adc4e73f9f3d69262a161a463b6ecac2ccaca6cf35ce972999c6a1006f5bbc756d

          • C:\Windows\SysWOW64\Piocecgj.exe

            Filesize

            177KB

            MD5

            fddb478d6bca64a196657a6ac1eb9d6e

            SHA1

            d99dfb945417056284cacf88e79262c111149e25

            SHA256

            854b9825c7c1c87e20ce0e19d29f9779bc33196efbc42bd1a0050a11b3dc27c0

            SHA512

            ac4255a96b5f026e9aefa8e839f2dea202a537a9bc817543d0db38feda1ed0adc4e73f9f3d69262a161a463b6ecac2ccaca6cf35ce972999c6a1006f5bbc756d

          • C:\Windows\SysWOW64\Piocecgj.exe

            Filesize

            177KB

            MD5

            fddb478d6bca64a196657a6ac1eb9d6e

            SHA1

            d99dfb945417056284cacf88e79262c111149e25

            SHA256

            854b9825c7c1c87e20ce0e19d29f9779bc33196efbc42bd1a0050a11b3dc27c0

            SHA512

            ac4255a96b5f026e9aefa8e839f2dea202a537a9bc817543d0db38feda1ed0adc4e73f9f3d69262a161a463b6ecac2ccaca6cf35ce972999c6a1006f5bbc756d

          • C:\Windows\SysWOW64\Ppdbgncl.exe

            Filesize

            177KB

            MD5

            fd78c3877cbf0aae2bfe7126aad8bf6a

            SHA1

            e0b4b66717eaaf07a580ecf1441fc6a75170afc9

            SHA256

            e3a40b9e5d0ba38c162e5003d76fa7984d3e52cb1e5ac60e4353f882b12a6370

            SHA512

            09ee7544d3643569476b9d826ce57dfe286447237b1bf5ebdf11724723a9dcadba9a0a99263ea144b9b9166e6873311b379f557bed19fa44ce38f68ed65a85b3

          • C:\Windows\SysWOW64\Ppdbgncl.exe

            Filesize

            177KB

            MD5

            fd78c3877cbf0aae2bfe7126aad8bf6a

            SHA1

            e0b4b66717eaaf07a580ecf1441fc6a75170afc9

            SHA256

            e3a40b9e5d0ba38c162e5003d76fa7984d3e52cb1e5ac60e4353f882b12a6370

            SHA512

            09ee7544d3643569476b9d826ce57dfe286447237b1bf5ebdf11724723a9dcadba9a0a99263ea144b9b9166e6873311b379f557bed19fa44ce38f68ed65a85b3

          • memory/400-60-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/400-48-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/668-64-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/668-17-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1860-61-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1860-40-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2580-57-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2580-59-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3360-8-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3360-65-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3736-1-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3736-0-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3736-58-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3912-62-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3912-32-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/5108-24-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/5108-63-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB