Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 16:43
Behavioral task
behavioral1
Sample
NEAS.504d17a12979a4b9de5d58f6074d5d30.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.504d17a12979a4b9de5d58f6074d5d30.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.504d17a12979a4b9de5d58f6074d5d30.exe
-
Size
116KB
-
MD5
504d17a12979a4b9de5d58f6074d5d30
-
SHA1
8f469972a2ead49b23766e207427d0ae75ba06e5
-
SHA256
e2149b893b02c75d2948ca5063c1b43adfea0e0e68d1f2014de8c8a70658b25d
-
SHA512
46642fe8dd1e7c11b2bc52dd7a278c7288cf6a6a4af3465f3cb098d1acc2e47cb18430660d65bca8a0ef9f7aa4a204e312a076ad877d5eeff446f88927e8a42b
-
SSDEEP
3072:bvWK5CiTVUqSZnIh5MgJY6R6vpK0HYAQBiiZhZzazTF:TN5xVUxZnIXMgJY6UeAQBishZzazp
Malware Config
Signatures
-
Malware Backdoor - Berbew 2 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x0003000000004ed5-10.dat family_berbew behavioral1/files/0x0003000000004ed5-16.dat family_berbew -
Deletes itself 1 IoCs
pid Process 1732 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe -
Executes dropped EXE 1 IoCs
pid Process 1732 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe -
Loads dropped DLL 1 IoCs
pid Process 2620 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2620 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2620 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe 1732 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2620 wrote to memory of 1732 2620 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe 30 PID 2620 wrote to memory of 1732 2620 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe 30 PID 2620 wrote to memory of 1732 2620 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe 30 PID 2620 wrote to memory of 1732 2620 NEAS.504d17a12979a4b9de5d58f6074d5d30.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.504d17a12979a4b9de5d58f6074d5d30.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.504d17a12979a4b9de5d58f6074d5d30.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\NEAS.504d17a12979a4b9de5d58f6074d5d30.exeC:\Users\Admin\AppData\Local\Temp\NEAS.504d17a12979a4b9de5d58f6074d5d30.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1732
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5c2b570c71304ba8376cffaeced8b9b08
SHA14d71ab1872b0217957237cc32dc1c994a97f3acb
SHA2569123e9b60ee9936d38247dab7cd9aba32397d4aa2da5f05662303c5f71e6ffce
SHA512067d8076b526e59a4cef61863f0e849b5e179937525705be38c161381a8a7e3432ba2d1623f98e6f2be776e5fc7e1e0d6170eef7a1fae6aec67e48ad0c51207b
-
Filesize
116KB
MD5c2b570c71304ba8376cffaeced8b9b08
SHA14d71ab1872b0217957237cc32dc1c994a97f3acb
SHA2569123e9b60ee9936d38247dab7cd9aba32397d4aa2da5f05662303c5f71e6ffce
SHA512067d8076b526e59a4cef61863f0e849b5e179937525705be38c161381a8a7e3432ba2d1623f98e6f2be776e5fc7e1e0d6170eef7a1fae6aec67e48ad0c51207b