Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 02:31
Behavioral task
behavioral1
Sample
NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe
-
Size
449KB
-
MD5
5eab858bc1d35f935ed98f853c9266f0
-
SHA1
fa6848ea49efeee2c357299bfbae05eecf3c4668
-
SHA256
05f4076b6f63050f6f3caa89a1c82929463c3946147b38eb54221e9c58018452
-
SHA512
bd91013f155b1258add5d3eb1fd2816d52e8d6c1f85de2f02e6da41104f4122fd8a96de6f8d2c554ef6d08620819ed925afb0e08a8c4d7010ab2e6e0aefe4eb5
-
SSDEEP
12288:XKn1XIeKARqf1pCA3GBAWcZAXN8I/d6xMW5KEy6YjQb0wLj/zU3k:X48C+1pCA3GBAWcZAXN8I/d6xMW5KEyU
Malware Config
Signatures
-
Malware Backdoor - Berbew 1 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0009000000022ce9-5.dat family_berbew -
Deletes itself 1 IoCs
pid Process 4884 NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 4884 NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2244 3092 WerFault.exe 87 3172 4884 WerFault.exe 96 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3092 NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2944 svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4884 NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4884 3092 NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe 96 PID 3092 wrote to memory of 4884 3092 NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe 96 PID 3092 wrote to memory of 4884 3092 NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 3962⤵
- Program crash
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exeC:\Users\Admin\AppData\Local\Temp\NEAS.5eab858bc1d35f935ed98f853c9266f0_JC.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 3643⤵
- Program crash
PID:3172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3092 -ip 30921⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4884 -ip 48841⤵PID:1752
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2944
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD55f801716356c073bab27ee3413f8266f
SHA1db36c2407c2bb56e6a87f3539746bc7d625c908b
SHA2561b542ae1a5a6b10100ab0d5ff149b8c89f8ff8037d9e2ba8b8758ed933b397f0
SHA512ecbac794f991c9a6883c2dbe8feb9a0d9066c12f4e8f70ba16ead1f61b5946131100829a0671504666db7cd26704571b003ae0016d7673e5a0536cda4bfe41ce