Analysis

  • max time kernel
    118s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 17:43

General

  • Target

    NEAS.c45d223132fb200b35d93e6a25132922_JC.exe

  • Size

    79KB

  • MD5

    c45d223132fb200b35d93e6a25132922

  • SHA1

    3e4e55c4358688e30b098be9c26a876c2ce82323

  • SHA256

    34ef4a9b592fd828b2ba3e06366f01db6048333873652c4edc06b50e085aa089

  • SHA512

    f62e53f27b9053e7171aa2059b0b02491104aa4aad5ef28838825a73a75c0f136a0a95ab03f4762f5eedac4fbe6b8ff255ce026d3a726b7da52adcce1f9168bf

  • SSDEEP

    1536:y/rOStsxSa7bZNBA36AejbtZZrI1jHJZrR:yz27VNK36Njbfu1jHJ9R

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Malware Backdoor - Berbew 27 IoCs

    Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c45d223132fb200b35d93e6a25132922_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c45d223132fb200b35d93e6a25132922_JC.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\Fjhmbihg.exe
      C:\Windows\system32\Fjhmbihg.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Windows\SysWOW64\Fglnkm32.exe
        C:\Windows\system32\Fglnkm32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Windows\SysWOW64\Fbaahf32.exe
          C:\Windows\system32\Fbaahf32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4100
          • C:\Windows\SysWOW64\Fjmfmh32.exe
            C:\Windows\system32\Fjmfmh32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4820
            • C:\Windows\SysWOW64\Fcekfnkb.exe
              C:\Windows\system32\Fcekfnkb.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4880
              • C:\Windows\SysWOW64\Gddgpqbe.exe
                C:\Windows\system32\Gddgpqbe.exe
                7⤵
                • Executes dropped EXE
                PID:2300
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 408
                  8⤵
                  • Program crash
                  PID:3904
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2300 -ip 2300
    1⤵
      PID:3396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Fbaahf32.exe

      Filesize

      79KB

      MD5

      6ac44aead5850b10d1a8d517b5fa75be

      SHA1

      c0e1dbe5ba3260caf6b48d46f6496362ae935e35

      SHA256

      66b9eefa8c024002a76bd41943994832c13ef13ed25d348405eb50914b423268

      SHA512

      464b0188b3540677f53a0eacc9f848e4dfae3a2f96795812c81ce31d2ea811e15c47a6749e351754a6525ec77823703bc06e7ce22006b52ea5dc7e711f2c1196

    • C:\Windows\SysWOW64\Fbaahf32.exe

      Filesize

      79KB

      MD5

      6ac44aead5850b10d1a8d517b5fa75be

      SHA1

      c0e1dbe5ba3260caf6b48d46f6496362ae935e35

      SHA256

      66b9eefa8c024002a76bd41943994832c13ef13ed25d348405eb50914b423268

      SHA512

      464b0188b3540677f53a0eacc9f848e4dfae3a2f96795812c81ce31d2ea811e15c47a6749e351754a6525ec77823703bc06e7ce22006b52ea5dc7e711f2c1196

    • C:\Windows\SysWOW64\Fcekfnkb.exe

      Filesize

      79KB

      MD5

      09e1eedd8442b48b22bac6b947d8514c

      SHA1

      1c8096ef55b0f37803b12223c4668526821ed07e

      SHA256

      57f817b2f9419da2e802771e0e15465345798d78271ceccbd28362e292063be6

      SHA512

      08927c2566faea50c7333a3c1cc1146e850d495a67f0891533031b77d6f2512bab09454f620767798ee6df371bf4fefc2a57dd6ae928fb6762f3b4d251d637b0

    • C:\Windows\SysWOW64\Fcekfnkb.exe

      Filesize

      79KB

      MD5

      09e1eedd8442b48b22bac6b947d8514c

      SHA1

      1c8096ef55b0f37803b12223c4668526821ed07e

      SHA256

      57f817b2f9419da2e802771e0e15465345798d78271ceccbd28362e292063be6

      SHA512

      08927c2566faea50c7333a3c1cc1146e850d495a67f0891533031b77d6f2512bab09454f620767798ee6df371bf4fefc2a57dd6ae928fb6762f3b4d251d637b0

    • C:\Windows\SysWOW64\Fglnkm32.exe

      Filesize

      79KB

      MD5

      91fa12e03d94b3039184a6ac62b9602e

      SHA1

      7edb17c52fdd1e2b2203c7bb1115528f825b7ee6

      SHA256

      33cee411e4906b8d9effaea155f5f5e08fb38fcd9688930053625e971910bf36

      SHA512

      912120ae96291473036c5aaca76237b5f29a0ea4de05154e8a310d614fccde01f2d6d0198f67ec983231326eb280e1c3630af9b2288c4c83a664ca2a831077bf

    • C:\Windows\SysWOW64\Fglnkm32.exe

      Filesize

      79KB

      MD5

      91fa12e03d94b3039184a6ac62b9602e

      SHA1

      7edb17c52fdd1e2b2203c7bb1115528f825b7ee6

      SHA256

      33cee411e4906b8d9effaea155f5f5e08fb38fcd9688930053625e971910bf36

      SHA512

      912120ae96291473036c5aaca76237b5f29a0ea4de05154e8a310d614fccde01f2d6d0198f67ec983231326eb280e1c3630af9b2288c4c83a664ca2a831077bf

    • C:\Windows\SysWOW64\Fjhmbihg.exe

      Filesize

      79KB

      MD5

      b861bec07d7c7453a780102e477efcb6

      SHA1

      3a423e23883320a9bf7ca1098dc896546a6dd86e

      SHA256

      7eb21e8abd055899433b8be23c00b6acf7b909043d51388372dd7b6c8485999b

      SHA512

      16ddba394b22906c3f3a39fc2432504468340d1ca4e73d1a90bde15bdd418227cae7aee822fe2ca9652b6f0fdcb6876fe733b02992f37b5208fe3d4d230abf53

    • C:\Windows\SysWOW64\Fjhmbihg.exe

      Filesize

      79KB

      MD5

      b861bec07d7c7453a780102e477efcb6

      SHA1

      3a423e23883320a9bf7ca1098dc896546a6dd86e

      SHA256

      7eb21e8abd055899433b8be23c00b6acf7b909043d51388372dd7b6c8485999b

      SHA512

      16ddba394b22906c3f3a39fc2432504468340d1ca4e73d1a90bde15bdd418227cae7aee822fe2ca9652b6f0fdcb6876fe733b02992f37b5208fe3d4d230abf53

    • C:\Windows\SysWOW64\Fjmfmh32.exe

      Filesize

      79KB

      MD5

      4e3b6b7908960a53270c821251fe04a0

      SHA1

      6a36291aca1a20d158798db1268559978bf2a31c

      SHA256

      417a709683c8439764988c155f9591eb8aebe860ba823456ae731a67ec003044

      SHA512

      0aa03b8d1ff97b9bb0791d7c23c17bac68772328b057737b149ab1ae5dbe52d1e2fdb7bb740fe519c2660bb31f99901b242444c9bd17499c5a131d8e809c3377

    • C:\Windows\SysWOW64\Fjmfmh32.exe

      Filesize

      79KB

      MD5

      4e3b6b7908960a53270c821251fe04a0

      SHA1

      6a36291aca1a20d158798db1268559978bf2a31c

      SHA256

      417a709683c8439764988c155f9591eb8aebe860ba823456ae731a67ec003044

      SHA512

      0aa03b8d1ff97b9bb0791d7c23c17bac68772328b057737b149ab1ae5dbe52d1e2fdb7bb740fe519c2660bb31f99901b242444c9bd17499c5a131d8e809c3377

    • C:\Windows\SysWOW64\Gddgpqbe.exe

      Filesize

      79KB

      MD5

      20b593fffeef60b01410e308cb59f742

      SHA1

      5835a1bf2776f8495fdaa4df036d89846f942fb7

      SHA256

      f02e108234ff4a96f53426a889673c89e6913c948162ce23a181fbe8f4998ecb

      SHA512

      2f576eeebd47ef92da6e23fc2c5b5b9aab9ff3ac97d310e21fdeca882627a8254f614ceea415652326c67bd3f9f42a5cee93fcd8b533e8d46316f567ee0cdccd

    • C:\Windows\SysWOW64\Gddgpqbe.exe

      Filesize

      79KB

      MD5

      20b593fffeef60b01410e308cb59f742

      SHA1

      5835a1bf2776f8495fdaa4df036d89846f942fb7

      SHA256

      f02e108234ff4a96f53426a889673c89e6913c948162ce23a181fbe8f4998ecb

      SHA512

      2f576eeebd47ef92da6e23fc2c5b5b9aab9ff3ac97d310e21fdeca882627a8254f614ceea415652326c67bd3f9f42a5cee93fcd8b533e8d46316f567ee0cdccd

    • memory/1872-17-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1872-54-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2300-48-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2300-50-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4100-24-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4100-53-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4712-11-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4712-55-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4820-32-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4820-52-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4880-40-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4880-51-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4900-0-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4900-56-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4900-1-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB