Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 20:13
Behavioral task
behavioral1
Sample
NEAS.c90f99b9965ae00ef392f6875138a820.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.c90f99b9965ae00ef392f6875138a820.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.c90f99b9965ae00ef392f6875138a820.exe
-
Size
134KB
-
MD5
c90f99b9965ae00ef392f6875138a820
-
SHA1
b5bf9ff76dae918d7541a5a7f2709257d16649d7
-
SHA256
fe4c39a6728d0896abdc35c508a0e4b7ed5b83a5224813a55c44cfa35000582c
-
SHA512
91bed0889db6b685dbd5ecf4e4e2edf15ceda3e9d1df3ed60484678c6ea05d01c98eba169101ebac5605fab5e2101e3201683977341485a5003cbce6e6132a8d
-
SSDEEP
3072:kTjg78PVZGntld84/ocVBSPkBWnkOlmNLap:UmWVUtAuokxOkVap
Malware Config
Signatures
-
Malware Backdoor - Berbew 2 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x000d00000001201d-10.dat family_berbew behavioral1/files/0x000d00000001201d-16.dat family_berbew -
Deletes itself 1 IoCs
pid Process 2012 NEAS.c90f99b9965ae00ef392f6875138a820.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 NEAS.c90f99b9965ae00ef392f6875138a820.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 NEAS.c90f99b9965ae00ef392f6875138a820.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2016 NEAS.c90f99b9965ae00ef392f6875138a820.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2016 NEAS.c90f99b9965ae00ef392f6875138a820.exe 2012 NEAS.c90f99b9965ae00ef392f6875138a820.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2012 2016 NEAS.c90f99b9965ae00ef392f6875138a820.exe 29 PID 2016 wrote to memory of 2012 2016 NEAS.c90f99b9965ae00ef392f6875138a820.exe 29 PID 2016 wrote to memory of 2012 2016 NEAS.c90f99b9965ae00ef392f6875138a820.exe 29 PID 2016 wrote to memory of 2012 2016 NEAS.c90f99b9965ae00ef392f6875138a820.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c90f99b9965ae00ef392f6875138a820.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c90f99b9965ae00ef392f6875138a820.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\NEAS.c90f99b9965ae00ef392f6875138a820.exeC:\Users\Admin\AppData\Local\Temp\NEAS.c90f99b9965ae00ef392f6875138a820.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2012
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5a71d1c4161de4f557f02513c401e502e
SHA1072503236b4a9c2e09a759177b6b29779bc69dfa
SHA256ba532570eff7a0c311ea35ad8b678b867ee23ac34fddf588bc1870f3647fd5fe
SHA5120f22f9c6ff7d0935d9df1dd32594c9231c073d9a4094a57a68a5d34268479a7101b528892a429d775239c9210ebbd0137371cb3be12bcb93786ddd0be38909f2
-
Filesize
134KB
MD5a71d1c4161de4f557f02513c401e502e
SHA1072503236b4a9c2e09a759177b6b29779bc69dfa
SHA256ba532570eff7a0c311ea35ad8b678b867ee23ac34fddf588bc1870f3647fd5fe
SHA5120f22f9c6ff7d0935d9df1dd32594c9231c073d9a4094a57a68a5d34268479a7101b528892a429d775239c9210ebbd0137371cb3be12bcb93786ddd0be38909f2