Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 14:19
Behavioral task
behavioral1
Sample
NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe
-
Size
236KB
-
MD5
c4f3326abeeb4219a8b517153f0ccde0
-
SHA1
c86f35db61b9b5423799dd98753c86bd6709700c
-
SHA256
0b3758cc0044e34865446d1eab0b8a00a37a7d16949b16a2630bab01fc77eb82
-
SHA512
516c872ce32b16065c0d6351a7cd07f58280645ebb11b368bfdec4f0641cead07c9a9b29cc6a86bbf010ec0c79b19e7344fd6eca5d3ae931f0828f099b515f13
-
SSDEEP
3072:dZW3BPGzxmN4J9IDlRxyhTbhgu+tAcrbFAJc+RsUi1aVDkOvhJjvJUp:dIBPUx04sDshsrtMsQB4
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fklcgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fklcgk32.exe -
Malware Backdoor - Berbew 4 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0007000000022e66-7.dat family_berbew behavioral2/files/0x0007000000022e66-8.dat family_berbew behavioral2/files/0x0006000000022e6d-15.dat family_berbew behavioral2/files/0x0006000000022e6d-17.dat family_berbew -
Executes dropped EXE 2 IoCs
pid Process 3536 Fklcgk32.exe 1724 Gddgpqbe.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fklcgk32.exe NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe File opened for modification C:\Windows\SysWOW64\Fklcgk32.exe NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe File created C:\Windows\SysWOW64\Celhnb32.dll NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe File created C:\Windows\SysWOW64\Gddgpqbe.exe Fklcgk32.exe File opened for modification C:\Windows\SysWOW64\Gddgpqbe.exe Fklcgk32.exe File created C:\Windows\SysWOW64\Jcggmk32.dll Fklcgk32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3472 1724 WerFault.exe 86 -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Celhnb32.dll" NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fklcgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcggmk32.dll" Fklcgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fklcgk32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4168 wrote to memory of 3536 4168 NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe 85 PID 4168 wrote to memory of 3536 4168 NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe 85 PID 4168 wrote to memory of 3536 4168 NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe 85 PID 3536 wrote to memory of 1724 3536 Fklcgk32.exe 86 PID 3536 wrote to memory of 1724 3536 Fklcgk32.exe 86 PID 3536 wrote to memory of 1724 3536 Fklcgk32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c4f3326abeeb4219a8b517153f0ccde0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\Fklcgk32.exeC:\Windows\system32\Fklcgk32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\Gddgpqbe.exeC:\Windows\system32\Gddgpqbe.exe3⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 4004⤵
- Program crash
PID:3472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1724 -ip 17241⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5f677f6107b95d1241c668b3521e0e35b
SHA153522dc5031b7ba139a9b9b7027f8ed2400365ec
SHA25686d02c63b8331d9cf2cb19c21e9aeb2e57caa3c4afc88a5d56bcf9be4d57fbde
SHA5120522d427284d3573aa87204e4e161ec7a4144b8b37a14275ed37e4c2f26d9da9acd7e291c135cfbab711dbc1a75737856da76328651c9b23eaa511eb9bc98fc0
-
Filesize
236KB
MD5f677f6107b95d1241c668b3521e0e35b
SHA153522dc5031b7ba139a9b9b7027f8ed2400365ec
SHA25686d02c63b8331d9cf2cb19c21e9aeb2e57caa3c4afc88a5d56bcf9be4d57fbde
SHA5120522d427284d3573aa87204e4e161ec7a4144b8b37a14275ed37e4c2f26d9da9acd7e291c135cfbab711dbc1a75737856da76328651c9b23eaa511eb9bc98fc0
-
Filesize
236KB
MD5c66815b8fed62d961b62853fab28c819
SHA1308238b948a8d30edea34d09a60cfb5785817742
SHA25690abade5fd0b5e7c993c4e8be7a30979069b8134493c4096fa51e00f65c186e3
SHA51210ae83d467f88bb1e036cbcbf3776a1df09d849ca0ca4606924fbf7eff0cdfedf1a0dbc3b323848d74797df666411c4874f069c324ffbfaf89a5319d80c9a4f1
-
Filesize
236KB
MD5c66815b8fed62d961b62853fab28c819
SHA1308238b948a8d30edea34d09a60cfb5785817742
SHA25690abade5fd0b5e7c993c4e8be7a30979069b8134493c4096fa51e00f65c186e3
SHA51210ae83d467f88bb1e036cbcbf3776a1df09d849ca0ca4606924fbf7eff0cdfedf1a0dbc3b323848d74797df666411c4874f069c324ffbfaf89a5319d80c9a4f1