Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 19:57
Behavioral task
behavioral1
Sample
NEAS.8b7812dead18b6038bd908b360157130.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.8b7812dead18b6038bd908b360157130.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.8b7812dead18b6038bd908b360157130.exe
-
Size
1.5MB
-
MD5
8b7812dead18b6038bd908b360157130
-
SHA1
19cebf0232040239c857f460c6ab29952d543c3d
-
SHA256
94d3ef785afabe7f0c0ee54be8b9a06b7238b09cb490837d4740fea566544c1b
-
SHA512
9885a2ee4509ad9a708e1b2d68d7a9e8a6bca0eea7aa2fb6c69cc7f989c454fd5512b0c161a74da29296f7a8a8f8444067b0aad333c644ff3395766241a41a52
-
SSDEEP
24576:TaxVIJKBOKBbM8ystDS0JMlLZmN1DUZmSordfq6Ph2kkkkK4kXkkkkkkkkhLX3an:TaxvhOVsDqhZmXYZmSadfqkbazR0vI
Malware Config
Signatures
-
Malware Backdoor - Berbew 2 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x00090000000224ad-1.dat family_berbew behavioral2/files/0x00090000000224ad-3.dat family_berbew -
Executes dropped EXE 1 IoCs
pid Process 1612 97EA.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 432 wrote to memory of 1612 432 NEAS.8b7812dead18b6038bd908b360157130.exe 87 PID 432 wrote to memory of 1612 432 NEAS.8b7812dead18b6038bd908b360157130.exe 87 PID 432 wrote to memory of 1612 432 NEAS.8b7812dead18b6038bd908b360157130.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8b7812dead18b6038bd908b360157130.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8b7812dead18b6038bd908b360157130.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\97EA.tmp"C:\Users\Admin\AppData\Local\Temp\97EA.tmp"2⤵
- Executes dropped EXE
PID:1612
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5d90eb25157c84a2ccf6426c52e08948f
SHA1a2aad5ab4f006f5a7a0ebaca168b0e949a92d612
SHA256f523700ec794c648133541172d4063601628d0c1f35e6a618238f54f20f92d6d
SHA5129e119f51d8223a09eccd51b4b5377e6d11a378d24e9b1d85197049e3edff189f28631c19a6be77230850cfe42ed736f11843a4171897a3c403c91fb6d602e1ad
-
Filesize
1.5MB
MD5d90eb25157c84a2ccf6426c52e08948f
SHA1a2aad5ab4f006f5a7a0ebaca168b0e949a92d612
SHA256f523700ec794c648133541172d4063601628d0c1f35e6a618238f54f20f92d6d
SHA5129e119f51d8223a09eccd51b4b5377e6d11a378d24e9b1d85197049e3edff189f28631c19a6be77230850cfe42ed736f11843a4171897a3c403c91fb6d602e1ad