Analysis
-
max time kernel
118s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 17:43
Behavioral task
behavioral1
Sample
NEAS.c45d223132fb200b35d93e6a25132922_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.c45d223132fb200b35d93e6a25132922_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.c45d223132fb200b35d93e6a25132922_JC.exe
-
Size
79KB
-
MD5
c45d223132fb200b35d93e6a25132922
-
SHA1
3e4e55c4358688e30b098be9c26a876c2ce82323
-
SHA256
34ef4a9b592fd828b2ba3e06366f01db6048333873652c4edc06b50e085aa089
-
SHA512
f62e53f27b9053e7171aa2059b0b02491104aa4aad5ef28838825a73a75c0f136a0a95ab03f4762f5eedac4fbe6b8ff255ce026d3a726b7da52adcce1f9168bf
-
SSDEEP
1536:y/rOStsxSa7bZNBA36AejbtZZrI1jHJZrR:yz27VNK36Njbfu1jHJ9R
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.c45d223132fb200b35d93e6a25132922_JC.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjhmbihg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fglnkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcekfnkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcekfnkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.c45d223132fb200b35d93e6a25132922_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjhmbihg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fglnkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbaahf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbaahf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjmfmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjmfmh32.exe -
Malware Backdoor - Berbew 27 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/4900-0-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/memory/4900-1-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/files/0x0006000000022e01-7.dat family_berbew behavioral2/files/0x0006000000022e01-8.dat family_berbew behavioral2/memory/4712-11-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/files/0x0006000000022e03-16.dat family_berbew behavioral2/files/0x0006000000022e03-15.dat family_berbew behavioral2/memory/1872-17-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/files/0x0006000000022e05-23.dat family_berbew behavioral2/files/0x0006000000022e05-25.dat family_berbew behavioral2/memory/4100-24-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/files/0x0006000000022e07-31.dat family_berbew behavioral2/memory/4820-32-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/files/0x0006000000022e07-33.dat family_berbew behavioral2/files/0x0006000000022e09-39.dat family_berbew behavioral2/memory/4880-40-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/files/0x0006000000022e09-41.dat family_berbew behavioral2/files/0x0006000000022e0b-47.dat family_berbew behavioral2/memory/2300-48-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/files/0x0006000000022e0b-49.dat family_berbew behavioral2/memory/4880-51-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/memory/4820-52-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/memory/4100-53-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/memory/2300-50-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/memory/4900-56-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/memory/4712-55-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew behavioral2/memory/1872-54-0x0000000000400000-0x0000000000441000-memory.dmp family_berbew -
Executes dropped EXE 6 IoCs
pid Process 4712 Fjhmbihg.exe 1872 Fglnkm32.exe 4100 Fbaahf32.exe 4820 Fjmfmh32.exe 4880 Fcekfnkb.exe 2300 Gddgpqbe.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fbaahf32.exe Fglnkm32.exe File created C:\Windows\SysWOW64\Fcekfnkb.exe Fjmfmh32.exe File created C:\Windows\SysWOW64\Gddgpqbe.exe Fcekfnkb.exe File created C:\Windows\SysWOW64\Fachkklb.dll Fjmfmh32.exe File created C:\Windows\SysWOW64\Egnelfnm.dll Fglnkm32.exe File opened for modification C:\Windows\SysWOW64\Fcekfnkb.exe Fjmfmh32.exe File opened for modification C:\Windows\SysWOW64\Gddgpqbe.exe Fcekfnkb.exe File created C:\Windows\SysWOW64\Jcggmk32.dll Fcekfnkb.exe File created C:\Windows\SysWOW64\Cnidqf32.dll NEAS.c45d223132fb200b35d93e6a25132922_JC.exe File created C:\Windows\SysWOW64\Fglnkm32.exe Fjhmbihg.exe File created C:\Windows\SysWOW64\Gokfdpdo.dll Fjhmbihg.exe File opened for modification C:\Windows\SysWOW64\Fbaahf32.exe Fglnkm32.exe File created C:\Windows\SysWOW64\Fjmfmh32.exe Fbaahf32.exe File opened for modification C:\Windows\SysWOW64\Fjmfmh32.exe Fbaahf32.exe File created C:\Windows\SysWOW64\Klfhhpnk.dll Fbaahf32.exe File created C:\Windows\SysWOW64\Fjhmbihg.exe NEAS.c45d223132fb200b35d93e6a25132922_JC.exe File opened for modification C:\Windows\SysWOW64\Fjhmbihg.exe NEAS.c45d223132fb200b35d93e6a25132922_JC.exe File opened for modification C:\Windows\SysWOW64\Fglnkm32.exe Fjhmbihg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3904 2300 WerFault.exe 95 -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.c45d223132fb200b35d93e6a25132922_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.c45d223132fb200b35d93e6a25132922_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gokfdpdo.dll" Fjhmbihg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbaahf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fachkklb.dll" Fjmfmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcekfnkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.c45d223132fb200b35d93e6a25132922_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjhmbihg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjhmbihg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egnelfnm.dll" Fglnkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fglnkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjmfmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcggmk32.dll" Fcekfnkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnidqf32.dll" NEAS.c45d223132fb200b35d93e6a25132922_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcekfnkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.c45d223132fb200b35d93e6a25132922_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.c45d223132fb200b35d93e6a25132922_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fglnkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klfhhpnk.dll" Fbaahf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbaahf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjmfmh32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4712 4900 NEAS.c45d223132fb200b35d93e6a25132922_JC.exe 90 PID 4900 wrote to memory of 4712 4900 NEAS.c45d223132fb200b35d93e6a25132922_JC.exe 90 PID 4900 wrote to memory of 4712 4900 NEAS.c45d223132fb200b35d93e6a25132922_JC.exe 90 PID 4712 wrote to memory of 1872 4712 Fjhmbihg.exe 91 PID 4712 wrote to memory of 1872 4712 Fjhmbihg.exe 91 PID 4712 wrote to memory of 1872 4712 Fjhmbihg.exe 91 PID 1872 wrote to memory of 4100 1872 Fglnkm32.exe 92 PID 1872 wrote to memory of 4100 1872 Fglnkm32.exe 92 PID 1872 wrote to memory of 4100 1872 Fglnkm32.exe 92 PID 4100 wrote to memory of 4820 4100 Fbaahf32.exe 93 PID 4100 wrote to memory of 4820 4100 Fbaahf32.exe 93 PID 4100 wrote to memory of 4820 4100 Fbaahf32.exe 93 PID 4820 wrote to memory of 4880 4820 Fjmfmh32.exe 94 PID 4820 wrote to memory of 4880 4820 Fjmfmh32.exe 94 PID 4820 wrote to memory of 4880 4820 Fjmfmh32.exe 94 PID 4880 wrote to memory of 2300 4880 Fcekfnkb.exe 95 PID 4880 wrote to memory of 2300 4880 Fcekfnkb.exe 95 PID 4880 wrote to memory of 2300 4880 Fcekfnkb.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c45d223132fb200b35d93e6a25132922_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c45d223132fb200b35d93e6a25132922_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\Fjhmbihg.exeC:\Windows\system32\Fjhmbihg.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\Fglnkm32.exeC:\Windows\system32\Fglnkm32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\Fbaahf32.exeC:\Windows\system32\Fbaahf32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\Fjmfmh32.exeC:\Windows\system32\Fjmfmh32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\Fcekfnkb.exeC:\Windows\system32\Fcekfnkb.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\Gddgpqbe.exeC:\Windows\system32\Gddgpqbe.exe7⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 4088⤵
- Program crash
PID:3904
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2300 -ip 23001⤵PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD56ac44aead5850b10d1a8d517b5fa75be
SHA1c0e1dbe5ba3260caf6b48d46f6496362ae935e35
SHA25666b9eefa8c024002a76bd41943994832c13ef13ed25d348405eb50914b423268
SHA512464b0188b3540677f53a0eacc9f848e4dfae3a2f96795812c81ce31d2ea811e15c47a6749e351754a6525ec77823703bc06e7ce22006b52ea5dc7e711f2c1196
-
Filesize
79KB
MD56ac44aead5850b10d1a8d517b5fa75be
SHA1c0e1dbe5ba3260caf6b48d46f6496362ae935e35
SHA25666b9eefa8c024002a76bd41943994832c13ef13ed25d348405eb50914b423268
SHA512464b0188b3540677f53a0eacc9f848e4dfae3a2f96795812c81ce31d2ea811e15c47a6749e351754a6525ec77823703bc06e7ce22006b52ea5dc7e711f2c1196
-
Filesize
79KB
MD509e1eedd8442b48b22bac6b947d8514c
SHA11c8096ef55b0f37803b12223c4668526821ed07e
SHA25657f817b2f9419da2e802771e0e15465345798d78271ceccbd28362e292063be6
SHA51208927c2566faea50c7333a3c1cc1146e850d495a67f0891533031b77d6f2512bab09454f620767798ee6df371bf4fefc2a57dd6ae928fb6762f3b4d251d637b0
-
Filesize
79KB
MD509e1eedd8442b48b22bac6b947d8514c
SHA11c8096ef55b0f37803b12223c4668526821ed07e
SHA25657f817b2f9419da2e802771e0e15465345798d78271ceccbd28362e292063be6
SHA51208927c2566faea50c7333a3c1cc1146e850d495a67f0891533031b77d6f2512bab09454f620767798ee6df371bf4fefc2a57dd6ae928fb6762f3b4d251d637b0
-
Filesize
79KB
MD591fa12e03d94b3039184a6ac62b9602e
SHA17edb17c52fdd1e2b2203c7bb1115528f825b7ee6
SHA25633cee411e4906b8d9effaea155f5f5e08fb38fcd9688930053625e971910bf36
SHA512912120ae96291473036c5aaca76237b5f29a0ea4de05154e8a310d614fccde01f2d6d0198f67ec983231326eb280e1c3630af9b2288c4c83a664ca2a831077bf
-
Filesize
79KB
MD591fa12e03d94b3039184a6ac62b9602e
SHA17edb17c52fdd1e2b2203c7bb1115528f825b7ee6
SHA25633cee411e4906b8d9effaea155f5f5e08fb38fcd9688930053625e971910bf36
SHA512912120ae96291473036c5aaca76237b5f29a0ea4de05154e8a310d614fccde01f2d6d0198f67ec983231326eb280e1c3630af9b2288c4c83a664ca2a831077bf
-
Filesize
79KB
MD5b861bec07d7c7453a780102e477efcb6
SHA13a423e23883320a9bf7ca1098dc896546a6dd86e
SHA2567eb21e8abd055899433b8be23c00b6acf7b909043d51388372dd7b6c8485999b
SHA51216ddba394b22906c3f3a39fc2432504468340d1ca4e73d1a90bde15bdd418227cae7aee822fe2ca9652b6f0fdcb6876fe733b02992f37b5208fe3d4d230abf53
-
Filesize
79KB
MD5b861bec07d7c7453a780102e477efcb6
SHA13a423e23883320a9bf7ca1098dc896546a6dd86e
SHA2567eb21e8abd055899433b8be23c00b6acf7b909043d51388372dd7b6c8485999b
SHA51216ddba394b22906c3f3a39fc2432504468340d1ca4e73d1a90bde15bdd418227cae7aee822fe2ca9652b6f0fdcb6876fe733b02992f37b5208fe3d4d230abf53
-
Filesize
79KB
MD54e3b6b7908960a53270c821251fe04a0
SHA16a36291aca1a20d158798db1268559978bf2a31c
SHA256417a709683c8439764988c155f9591eb8aebe860ba823456ae731a67ec003044
SHA5120aa03b8d1ff97b9bb0791d7c23c17bac68772328b057737b149ab1ae5dbe52d1e2fdb7bb740fe519c2660bb31f99901b242444c9bd17499c5a131d8e809c3377
-
Filesize
79KB
MD54e3b6b7908960a53270c821251fe04a0
SHA16a36291aca1a20d158798db1268559978bf2a31c
SHA256417a709683c8439764988c155f9591eb8aebe860ba823456ae731a67ec003044
SHA5120aa03b8d1ff97b9bb0791d7c23c17bac68772328b057737b149ab1ae5dbe52d1e2fdb7bb740fe519c2660bb31f99901b242444c9bd17499c5a131d8e809c3377
-
Filesize
79KB
MD520b593fffeef60b01410e308cb59f742
SHA15835a1bf2776f8495fdaa4df036d89846f942fb7
SHA256f02e108234ff4a96f53426a889673c89e6913c948162ce23a181fbe8f4998ecb
SHA5122f576eeebd47ef92da6e23fc2c5b5b9aab9ff3ac97d310e21fdeca882627a8254f614ceea415652326c67bd3f9f42a5cee93fcd8b533e8d46316f567ee0cdccd
-
Filesize
79KB
MD520b593fffeef60b01410e308cb59f742
SHA15835a1bf2776f8495fdaa4df036d89846f942fb7
SHA256f02e108234ff4a96f53426a889673c89e6913c948162ce23a181fbe8f4998ecb
SHA5122f576eeebd47ef92da6e23fc2c5b5b9aab9ff3ac97d310e21fdeca882627a8254f614ceea415652326c67bd3f9f42a5cee93fcd8b533e8d46316f567ee0cdccd