Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 08:39

General

  • Target

    NEAS.bdbeda7f89fcbabf25feb68d1768dbd4.exe

  • Size

    404KB

  • MD5

    bdbeda7f89fcbabf25feb68d1768dbd4

  • SHA1

    4fd77c9df5ca2254e620665fe6684b943365eb35

  • SHA256

    dd8a1d5d11b558beef30117e3c3b92cf36434d66e87a46c621d5a8e2b31e591e

  • SHA512

    a94a62e3c1ae2780e7e1e55780bab2b0614c76e1c0e8fb45d26d2ad4006fd2a043c456e7e94b48843a23b1178df3c9b2c337bbf85a454e426d83a1277b959942

  • SSDEEP

    6144:bDCmaFeBCkBImyENm+3Mpui6yYPaIGckfru5xyDpui6yYPaIGckSU05836S5:neD6wcMpV6yYP4rbpV6yYPg058KS

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
  • Malware Backdoor - Berbew 23 IoCs

    Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 12 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.bdbeda7f89fcbabf25feb68d1768dbd4.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.bdbeda7f89fcbabf25feb68d1768dbd4.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\Balkchpi.exe
      C:\Windows\system32\Balkchpi.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\Chkmkacq.exe
        C:\Windows\system32\Chkmkacq.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\SysWOW64\Cpfaocal.exe
          C:\Windows\system32\Cpfaocal.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\SysWOW64\Ceegmj32.exe
            C:\Windows\system32\Ceegmj32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2740
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 140
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Balkchpi.exe

    Filesize

    404KB

    MD5

    d8a76579d2f613f8c0cc016baf9dcc45

    SHA1

    67df300e7a490880ae7071e07b1e4c4fbebf465a

    SHA256

    3d58dfcaa8ed2ef781b56d99005564e964b32a50f4bf4ed27657549ff4f6bb99

    SHA512

    53d0e66f7ba5dec4c3075ec4e1e8573fc93e206f65df8b9fb0e6674e1c1ec8ad187c5805d8108632373bc72e4e7a1b0ebadd6ed1c21a63be61bfed82c948ff00

  • C:\Windows\SysWOW64\Balkchpi.exe

    Filesize

    404KB

    MD5

    d8a76579d2f613f8c0cc016baf9dcc45

    SHA1

    67df300e7a490880ae7071e07b1e4c4fbebf465a

    SHA256

    3d58dfcaa8ed2ef781b56d99005564e964b32a50f4bf4ed27657549ff4f6bb99

    SHA512

    53d0e66f7ba5dec4c3075ec4e1e8573fc93e206f65df8b9fb0e6674e1c1ec8ad187c5805d8108632373bc72e4e7a1b0ebadd6ed1c21a63be61bfed82c948ff00

  • C:\Windows\SysWOW64\Balkchpi.exe

    Filesize

    404KB

    MD5

    d8a76579d2f613f8c0cc016baf9dcc45

    SHA1

    67df300e7a490880ae7071e07b1e4c4fbebf465a

    SHA256

    3d58dfcaa8ed2ef781b56d99005564e964b32a50f4bf4ed27657549ff4f6bb99

    SHA512

    53d0e66f7ba5dec4c3075ec4e1e8573fc93e206f65df8b9fb0e6674e1c1ec8ad187c5805d8108632373bc72e4e7a1b0ebadd6ed1c21a63be61bfed82c948ff00

  • C:\Windows\SysWOW64\Ceegmj32.exe

    Filesize

    404KB

    MD5

    ce34eb86e87732ee215b44cc6091e7cc

    SHA1

    067ddfa8399e379f37f69a724a1278964c5e6a5b

    SHA256

    d0202cb039155b836bd042cd14f35cfc55af82704ec71725e0f47794318d7145

    SHA512

    28db064fa4f9562225ee2ed760ba2bdf81f52cc7dded323cb1d18d28425f6834813485879eeb6eb4ccd7f9efeb3d0eabbc0037ad3237aee9920e2c59d5d03d3b

  • C:\Windows\SysWOW64\Ceegmj32.exe

    Filesize

    404KB

    MD5

    ce34eb86e87732ee215b44cc6091e7cc

    SHA1

    067ddfa8399e379f37f69a724a1278964c5e6a5b

    SHA256

    d0202cb039155b836bd042cd14f35cfc55af82704ec71725e0f47794318d7145

    SHA512

    28db064fa4f9562225ee2ed760ba2bdf81f52cc7dded323cb1d18d28425f6834813485879eeb6eb4ccd7f9efeb3d0eabbc0037ad3237aee9920e2c59d5d03d3b

  • C:\Windows\SysWOW64\Chkmkacq.exe

    Filesize

    404KB

    MD5

    644532bf433f3003efc75f9323ec2bd8

    SHA1

    5e79ee83cba165870d628a6d71b5e4283fccdc58

    SHA256

    4a87a8c53b533c8852038f3ffb96c4922a94763e0070f86ecfdafb0b825da18e

    SHA512

    15ef303ad8e93e07639c805583e5a2adffc3909f413c708e827a0191ecbb715273b9c52960894acbca501dea2f5f4bf18a89a90a8ad0d84f2d08d1e6eae3ad27

  • C:\Windows\SysWOW64\Chkmkacq.exe

    Filesize

    404KB

    MD5

    644532bf433f3003efc75f9323ec2bd8

    SHA1

    5e79ee83cba165870d628a6d71b5e4283fccdc58

    SHA256

    4a87a8c53b533c8852038f3ffb96c4922a94763e0070f86ecfdafb0b825da18e

    SHA512

    15ef303ad8e93e07639c805583e5a2adffc3909f413c708e827a0191ecbb715273b9c52960894acbca501dea2f5f4bf18a89a90a8ad0d84f2d08d1e6eae3ad27

  • C:\Windows\SysWOW64\Chkmkacq.exe

    Filesize

    404KB

    MD5

    644532bf433f3003efc75f9323ec2bd8

    SHA1

    5e79ee83cba165870d628a6d71b5e4283fccdc58

    SHA256

    4a87a8c53b533c8852038f3ffb96c4922a94763e0070f86ecfdafb0b825da18e

    SHA512

    15ef303ad8e93e07639c805583e5a2adffc3909f413c708e827a0191ecbb715273b9c52960894acbca501dea2f5f4bf18a89a90a8ad0d84f2d08d1e6eae3ad27

  • C:\Windows\SysWOW64\Cpfaocal.exe

    Filesize

    404KB

    MD5

    53abfe047260ae6ca8a1051cd7ce7229

    SHA1

    2457ab56a3d6603a6a77cec84e77414e0670c28a

    SHA256

    e8eec160c969af7fbea51ec13e7481fd560591f6995e7cc7d3934cc7e8ecc999

    SHA512

    a068dd1e5a1c8ed4ae7549b342a3f83667a52b656effdd7fd41c43f3a00a314faf62acf56ebbfea188a92febfdf16a6a9e16e91814e4d622964a84941023a7e0

  • C:\Windows\SysWOW64\Cpfaocal.exe

    Filesize

    404KB

    MD5

    53abfe047260ae6ca8a1051cd7ce7229

    SHA1

    2457ab56a3d6603a6a77cec84e77414e0670c28a

    SHA256

    e8eec160c969af7fbea51ec13e7481fd560591f6995e7cc7d3934cc7e8ecc999

    SHA512

    a068dd1e5a1c8ed4ae7549b342a3f83667a52b656effdd7fd41c43f3a00a314faf62acf56ebbfea188a92febfdf16a6a9e16e91814e4d622964a84941023a7e0

  • C:\Windows\SysWOW64\Cpfaocal.exe

    Filesize

    404KB

    MD5

    53abfe047260ae6ca8a1051cd7ce7229

    SHA1

    2457ab56a3d6603a6a77cec84e77414e0670c28a

    SHA256

    e8eec160c969af7fbea51ec13e7481fd560591f6995e7cc7d3934cc7e8ecc999

    SHA512

    a068dd1e5a1c8ed4ae7549b342a3f83667a52b656effdd7fd41c43f3a00a314faf62acf56ebbfea188a92febfdf16a6a9e16e91814e4d622964a84941023a7e0

  • \Windows\SysWOW64\Balkchpi.exe

    Filesize

    404KB

    MD5

    d8a76579d2f613f8c0cc016baf9dcc45

    SHA1

    67df300e7a490880ae7071e07b1e4c4fbebf465a

    SHA256

    3d58dfcaa8ed2ef781b56d99005564e964b32a50f4bf4ed27657549ff4f6bb99

    SHA512

    53d0e66f7ba5dec4c3075ec4e1e8573fc93e206f65df8b9fb0e6674e1c1ec8ad187c5805d8108632373bc72e4e7a1b0ebadd6ed1c21a63be61bfed82c948ff00

  • \Windows\SysWOW64\Balkchpi.exe

    Filesize

    404KB

    MD5

    d8a76579d2f613f8c0cc016baf9dcc45

    SHA1

    67df300e7a490880ae7071e07b1e4c4fbebf465a

    SHA256

    3d58dfcaa8ed2ef781b56d99005564e964b32a50f4bf4ed27657549ff4f6bb99

    SHA512

    53d0e66f7ba5dec4c3075ec4e1e8573fc93e206f65df8b9fb0e6674e1c1ec8ad187c5805d8108632373bc72e4e7a1b0ebadd6ed1c21a63be61bfed82c948ff00

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    404KB

    MD5

    ce34eb86e87732ee215b44cc6091e7cc

    SHA1

    067ddfa8399e379f37f69a724a1278964c5e6a5b

    SHA256

    d0202cb039155b836bd042cd14f35cfc55af82704ec71725e0f47794318d7145

    SHA512

    28db064fa4f9562225ee2ed760ba2bdf81f52cc7dded323cb1d18d28425f6834813485879eeb6eb4ccd7f9efeb3d0eabbc0037ad3237aee9920e2c59d5d03d3b

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    404KB

    MD5

    ce34eb86e87732ee215b44cc6091e7cc

    SHA1

    067ddfa8399e379f37f69a724a1278964c5e6a5b

    SHA256

    d0202cb039155b836bd042cd14f35cfc55af82704ec71725e0f47794318d7145

    SHA512

    28db064fa4f9562225ee2ed760ba2bdf81f52cc7dded323cb1d18d28425f6834813485879eeb6eb4ccd7f9efeb3d0eabbc0037ad3237aee9920e2c59d5d03d3b

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    404KB

    MD5

    ce34eb86e87732ee215b44cc6091e7cc

    SHA1

    067ddfa8399e379f37f69a724a1278964c5e6a5b

    SHA256

    d0202cb039155b836bd042cd14f35cfc55af82704ec71725e0f47794318d7145

    SHA512

    28db064fa4f9562225ee2ed760ba2bdf81f52cc7dded323cb1d18d28425f6834813485879eeb6eb4ccd7f9efeb3d0eabbc0037ad3237aee9920e2c59d5d03d3b

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    404KB

    MD5

    ce34eb86e87732ee215b44cc6091e7cc

    SHA1

    067ddfa8399e379f37f69a724a1278964c5e6a5b

    SHA256

    d0202cb039155b836bd042cd14f35cfc55af82704ec71725e0f47794318d7145

    SHA512

    28db064fa4f9562225ee2ed760ba2bdf81f52cc7dded323cb1d18d28425f6834813485879eeb6eb4ccd7f9efeb3d0eabbc0037ad3237aee9920e2c59d5d03d3b

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    404KB

    MD5

    ce34eb86e87732ee215b44cc6091e7cc

    SHA1

    067ddfa8399e379f37f69a724a1278964c5e6a5b

    SHA256

    d0202cb039155b836bd042cd14f35cfc55af82704ec71725e0f47794318d7145

    SHA512

    28db064fa4f9562225ee2ed760ba2bdf81f52cc7dded323cb1d18d28425f6834813485879eeb6eb4ccd7f9efeb3d0eabbc0037ad3237aee9920e2c59d5d03d3b

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    404KB

    MD5

    ce34eb86e87732ee215b44cc6091e7cc

    SHA1

    067ddfa8399e379f37f69a724a1278964c5e6a5b

    SHA256

    d0202cb039155b836bd042cd14f35cfc55af82704ec71725e0f47794318d7145

    SHA512

    28db064fa4f9562225ee2ed760ba2bdf81f52cc7dded323cb1d18d28425f6834813485879eeb6eb4ccd7f9efeb3d0eabbc0037ad3237aee9920e2c59d5d03d3b

  • \Windows\SysWOW64\Chkmkacq.exe

    Filesize

    404KB

    MD5

    644532bf433f3003efc75f9323ec2bd8

    SHA1

    5e79ee83cba165870d628a6d71b5e4283fccdc58

    SHA256

    4a87a8c53b533c8852038f3ffb96c4922a94763e0070f86ecfdafb0b825da18e

    SHA512

    15ef303ad8e93e07639c805583e5a2adffc3909f413c708e827a0191ecbb715273b9c52960894acbca501dea2f5f4bf18a89a90a8ad0d84f2d08d1e6eae3ad27

  • \Windows\SysWOW64\Chkmkacq.exe

    Filesize

    404KB

    MD5

    644532bf433f3003efc75f9323ec2bd8

    SHA1

    5e79ee83cba165870d628a6d71b5e4283fccdc58

    SHA256

    4a87a8c53b533c8852038f3ffb96c4922a94763e0070f86ecfdafb0b825da18e

    SHA512

    15ef303ad8e93e07639c805583e5a2adffc3909f413c708e827a0191ecbb715273b9c52960894acbca501dea2f5f4bf18a89a90a8ad0d84f2d08d1e6eae3ad27

  • \Windows\SysWOW64\Cpfaocal.exe

    Filesize

    404KB

    MD5

    53abfe047260ae6ca8a1051cd7ce7229

    SHA1

    2457ab56a3d6603a6a77cec84e77414e0670c28a

    SHA256

    e8eec160c969af7fbea51ec13e7481fd560591f6995e7cc7d3934cc7e8ecc999

    SHA512

    a068dd1e5a1c8ed4ae7549b342a3f83667a52b656effdd7fd41c43f3a00a314faf62acf56ebbfea188a92febfdf16a6a9e16e91814e4d622964a84941023a7e0

  • \Windows\SysWOW64\Cpfaocal.exe

    Filesize

    404KB

    MD5

    53abfe047260ae6ca8a1051cd7ce7229

    SHA1

    2457ab56a3d6603a6a77cec84e77414e0670c28a

    SHA256

    e8eec160c969af7fbea51ec13e7481fd560591f6995e7cc7d3934cc7e8ecc999

    SHA512

    a068dd1e5a1c8ed4ae7549b342a3f83667a52b656effdd7fd41c43f3a00a314faf62acf56ebbfea188a92febfdf16a6a9e16e91814e4d622964a84941023a7e0

  • memory/1488-44-0x00000000001B0000-0x00000000001F0000-memory.dmp

    Filesize

    256KB

  • memory/1488-38-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1736-24-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1736-59-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1736-60-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1920-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1920-6-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1920-58-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2740-62-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2748-48-0x00000000002A0000-0x00000000002E0000-memory.dmp

    Filesize

    256KB

  • memory/2748-45-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2748-61-0x00000000002A0000-0x00000000002E0000-memory.dmp

    Filesize

    256KB