Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2023, 20:16

General

  • Target

    NEAS.e3c3aebece16d68b250a3ccf79c6a820.exe

  • Size

    398KB

  • MD5

    e3c3aebece16d68b250a3ccf79c6a820

  • SHA1

    af31542af88061bc080ca101839b514147a827bf

  • SHA256

    d7f7ea2f0871474fa95620b2adb781a5569d75e32a6c12cde89eca7eb9280feb

  • SHA512

    477e80e01d03e3ce2a0c80b146901c7ebaf2362cd842299150678c5f7eb63ff288b107d2dbdb5a116793641a6b16cab5093a8005517186f08d8e616830998eb2

  • SSDEEP

    12288:8hxMyK6t3XGCByvNv54B9f01ZmHByvNv5imipWf0Aq:8LMyK6t3XGpvr4B9f01ZmQvrimipWf0/

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Malware Backdoor - Berbew 14 IoCs

    Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e3c3aebece16d68b250a3ccf79c6a820.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e3c3aebece16d68b250a3ccf79c6a820.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\Eqmlccdi.exe
      C:\Windows\system32\Eqmlccdi.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Windows\SysWOW64\Fdkdibjp.exe
        C:\Windows\system32\Fdkdibjp.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Windows\SysWOW64\Fqbeoc32.exe
          C:\Windows\system32\Fqbeoc32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Windows\SysWOW64\Fbaahf32.exe
            C:\Windows\system32\Fbaahf32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4956
            • C:\Windows\SysWOW64\Fkjfakng.exe
              C:\Windows\system32\Fkjfakng.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:852
              • C:\Windows\SysWOW64\Fgqgfl32.exe
                C:\Windows\system32\Fgqgfl32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2776
                • C:\Windows\SysWOW64\Gddgpqbe.exe
                  C:\Windows\system32\Gddgpqbe.exe
                  8⤵
                  • Executes dropped EXE
                  PID:3972
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 232
                    9⤵
                    • Program crash
                    PID:1332
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3972 -ip 3972
    1⤵
      PID:4588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Eqmlccdi.exe

      Filesize

      398KB

      MD5

      aa1f0ad471124b4f0b82d4488b2d4c08

      SHA1

      4a7dce0fd12098b9e96195b0cfe16b56165c620c

      SHA256

      beb13953fdd311beed8c4270d82934211c9005d3fc66dc49553643aae4622b7c

      SHA512

      916aba3fb628da2ac2a609834998c9a84f5a94be1df912899ffe5609cd34c8f5964ec17f7edc68364ed3123c4afb0addb147f92c6980d0e06ec48f626f41a2ca

    • C:\Windows\SysWOW64\Eqmlccdi.exe

      Filesize

      398KB

      MD5

      aa1f0ad471124b4f0b82d4488b2d4c08

      SHA1

      4a7dce0fd12098b9e96195b0cfe16b56165c620c

      SHA256

      beb13953fdd311beed8c4270d82934211c9005d3fc66dc49553643aae4622b7c

      SHA512

      916aba3fb628da2ac2a609834998c9a84f5a94be1df912899ffe5609cd34c8f5964ec17f7edc68364ed3123c4afb0addb147f92c6980d0e06ec48f626f41a2ca

    • C:\Windows\SysWOW64\Fbaahf32.exe

      Filesize

      398KB

      MD5

      5ad453a2fac9db0eb46f4b0734688c6d

      SHA1

      88844ffd55b6c856fc9467f82a89b339b92c23b6

      SHA256

      d92a3a4dc04f8d5ea8ccc538770aa5d4bb81828bf10fe54c4f59dcc3b1e5fea0

      SHA512

      5a5c982c8adec043dfd2e55bee6ca644e45a16cdef2b04718e9c5a16e09a60de905e77475f96d7788bb1da9bcdd9838b9a4092707da97ba49079d185a4cdef23

    • C:\Windows\SysWOW64\Fbaahf32.exe

      Filesize

      398KB

      MD5

      5ad453a2fac9db0eb46f4b0734688c6d

      SHA1

      88844ffd55b6c856fc9467f82a89b339b92c23b6

      SHA256

      d92a3a4dc04f8d5ea8ccc538770aa5d4bb81828bf10fe54c4f59dcc3b1e5fea0

      SHA512

      5a5c982c8adec043dfd2e55bee6ca644e45a16cdef2b04718e9c5a16e09a60de905e77475f96d7788bb1da9bcdd9838b9a4092707da97ba49079d185a4cdef23

    • C:\Windows\SysWOW64\Fdkdibjp.exe

      Filesize

      398KB

      MD5

      5ae697865d54826cf51ece0f281f1cff

      SHA1

      5ae2182bb6b81f50f856fe138b115470cc7c4b0b

      SHA256

      449350c27c7bacbf0fa815b0feb6292e7af11f0492705540f2062e2b5a7f333d

      SHA512

      2d23976af1bceaca09972ccdf76cb3c5a0654dda4593790e00c81e1fb6e4ecebd02425040c054bc6c03de1b78db7ad38dbdc3aef7c3a1435aade422272035017

    • C:\Windows\SysWOW64\Fdkdibjp.exe

      Filesize

      398KB

      MD5

      5ae697865d54826cf51ece0f281f1cff

      SHA1

      5ae2182bb6b81f50f856fe138b115470cc7c4b0b

      SHA256

      449350c27c7bacbf0fa815b0feb6292e7af11f0492705540f2062e2b5a7f333d

      SHA512

      2d23976af1bceaca09972ccdf76cb3c5a0654dda4593790e00c81e1fb6e4ecebd02425040c054bc6c03de1b78db7ad38dbdc3aef7c3a1435aade422272035017

    • C:\Windows\SysWOW64\Fgqgfl32.exe

      Filesize

      398KB

      MD5

      e447f404f93425b9d4e11993d6b134a1

      SHA1

      7a7a227e23186f2b0fe3a0d8a156b8950fd80574

      SHA256

      7a64b577d2fa2b6b891f73770043b991733094b6b47dc5ab6bb749d56a602f08

      SHA512

      78bd105c4f2977cfc89e4d85c2a1b83d772508f99b1b9d0a7cfa6efc408858e274a15cb999bf0dc0fd783ccea8cb45116d980e3c466e15724fa7d7e7e865a6cd

    • C:\Windows\SysWOW64\Fgqgfl32.exe

      Filesize

      398KB

      MD5

      e447f404f93425b9d4e11993d6b134a1

      SHA1

      7a7a227e23186f2b0fe3a0d8a156b8950fd80574

      SHA256

      7a64b577d2fa2b6b891f73770043b991733094b6b47dc5ab6bb749d56a602f08

      SHA512

      78bd105c4f2977cfc89e4d85c2a1b83d772508f99b1b9d0a7cfa6efc408858e274a15cb999bf0dc0fd783ccea8cb45116d980e3c466e15724fa7d7e7e865a6cd

    • C:\Windows\SysWOW64\Fkjfakng.exe

      Filesize

      398KB

      MD5

      edb759cabb83673d9c2aac0954fde0d9

      SHA1

      103b4d3306b9771daf30f831d19b4f67e0c5adc1

      SHA256

      994d861ab6c8161046c54a6dad53bd84924e415402175e8fdb8001d3b97bdafd

      SHA512

      e199317e9076d2f9d9d8ab773863b35d6ec831d3df974d395b2293d6bc1ce8e74576b2a7254548d9624593b3c59c222a27b592ff31fc72bb2d10dd63e99ac933

    • C:\Windows\SysWOW64\Fkjfakng.exe

      Filesize

      398KB

      MD5

      edb759cabb83673d9c2aac0954fde0d9

      SHA1

      103b4d3306b9771daf30f831d19b4f67e0c5adc1

      SHA256

      994d861ab6c8161046c54a6dad53bd84924e415402175e8fdb8001d3b97bdafd

      SHA512

      e199317e9076d2f9d9d8ab773863b35d6ec831d3df974d395b2293d6bc1ce8e74576b2a7254548d9624593b3c59c222a27b592ff31fc72bb2d10dd63e99ac933

    • C:\Windows\SysWOW64\Fofobm32.dll

      Filesize

      7KB

      MD5

      0d869aa9b023a3fbe0d332c9f2eb777a

      SHA1

      8bafc1835b3ecc5267cc82a2c217abc7da4b7a25

      SHA256

      19e3e35f1a11f59507d4a2bee8ede8b4a6030b168cb5dce46ef7fb85a2236810

      SHA512

      d31d0530bbe2ad9ba94263b5b18430308d2e32ad6600d0cf69332e9317340ddaaa858511575ea92f5812fc6ad5413925be624badec4449a54d5146bdb7b54a8a

    • C:\Windows\SysWOW64\Fqbeoc32.exe

      Filesize

      398KB

      MD5

      7033decf24a0f3de96ab5b6109acc92f

      SHA1

      0de97b3c5fc205e7c4625d0930c874abc447f35b

      SHA256

      8da78416e2e729ef79e0f4b973a2c7c945df25a945a86d24456990bac35d1063

      SHA512

      5f221987687f7aa247c2e5a4ff4b086dc4807bec54fcdbde1160d32366b60348a8ce472fc0d6d8db4521589e2dec011852449c87d720fce217b8f7490d7dc63b

    • C:\Windows\SysWOW64\Fqbeoc32.exe

      Filesize

      398KB

      MD5

      7033decf24a0f3de96ab5b6109acc92f

      SHA1

      0de97b3c5fc205e7c4625d0930c874abc447f35b

      SHA256

      8da78416e2e729ef79e0f4b973a2c7c945df25a945a86d24456990bac35d1063

      SHA512

      5f221987687f7aa247c2e5a4ff4b086dc4807bec54fcdbde1160d32366b60348a8ce472fc0d6d8db4521589e2dec011852449c87d720fce217b8f7490d7dc63b

    • C:\Windows\SysWOW64\Gddgpqbe.exe

      Filesize

      398KB

      MD5

      53285f2738ff613385badf8630f1a0a6

      SHA1

      3cdb52cd6da5d0e4dd20ddebb7e1fec82e56a0ef

      SHA256

      1c3d686104974173ab26fe1cf51c9f3b2cc0cdde1bb68773986fea484acbefea

      SHA512

      5ecbdc40c40379a780ce9cb82a30206f29b5cce758fe380ea3fdf94307f4be70463f3b857a2c2750c5f08ab96100f07169bcd20a6a5fa67045422fb26b754f04

    • C:\Windows\SysWOW64\Gddgpqbe.exe

      Filesize

      398KB

      MD5

      53285f2738ff613385badf8630f1a0a6

      SHA1

      3cdb52cd6da5d0e4dd20ddebb7e1fec82e56a0ef

      SHA256

      1c3d686104974173ab26fe1cf51c9f3b2cc0cdde1bb68773986fea484acbefea

      SHA512

      5ecbdc40c40379a780ce9cb82a30206f29b5cce758fe380ea3fdf94307f4be70463f3b857a2c2750c5f08ab96100f07169bcd20a6a5fa67045422fb26b754f04

    • memory/852-39-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/852-59-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1380-16-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1380-62-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2032-64-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2032-0-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2776-58-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2776-48-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3408-23-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3408-61-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3736-63-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3736-8-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3972-57-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3972-55-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4956-32-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4956-60-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB