Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 01:30
Behavioral task
behavioral1
Sample
NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe
-
Size
3.7MB
-
MD5
48ae509398be100ecad1bb9a7a7e04a0
-
SHA1
1abff718574bc27c60313fac52edec8d8bec2eae
-
SHA256
d2bc98a391a69702a17caa0d357785ee3992415c1b5916ca18945021633a8522
-
SHA512
88988d59dd2a4d065b3189033e9eb831681436ec89bca50eb10b6d4ad2128aecbb7c76fb1f36e086e6dd8f4b780a0456ecd3425fff05d67848f11da01e145342
-
SSDEEP
98304:AjXtWHdmxQlhhQNNiujTiptKSl1g4kfGlsXFAXPYHYhQ:mumxQlhhQNNiujTiptKSl1g4kfGlsXF3
Malware Config
Signatures
-
Malware Backdoor - Berbew 5 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x00070000000120ca-4.dat family_berbew behavioral1/files/0x00070000000120ca-9.dat family_berbew behavioral1/files/0x00070000000120ca-13.dat family_berbew behavioral1/files/0x00070000000120ca-12.dat family_berbew behavioral1/files/0x00070000000120ca-14.dat family_berbew -
Deletes itself 1 IoCs
pid Process 2896 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2896 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe -
Loads dropped DLL 4 IoCs
pid Process 2352 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2468 2896 WerFault.exe 29 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2352 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2896 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2896 2352 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 29 PID 2352 wrote to memory of 2896 2352 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 29 PID 2352 wrote to memory of 2896 2352 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 29 PID 2352 wrote to memory of 2896 2352 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 29 PID 2896 wrote to memory of 2468 2896 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 30 PID 2896 wrote to memory of 2468 2896 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 30 PID 2896 wrote to memory of 2468 2896 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 30 PID 2896 wrote to memory of 2468 2896 NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exeC:\Users\Admin\AppData\Local\Temp\NEAS.48ae509398be100ecad1bb9a7a7e04a0_JC.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2468
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD5fc50647f665a6a31f3f2857d6c01f57b
SHA1e34649b6ff14b9aef7757e7f4e2c72baac8925b8
SHA25670bc280a90e84a0c4a55f8ee7a5461b440cf8cf105c4bc47cbdd57566f6cd402
SHA51239d17800ac64305d6b198361bb6e3c0f427a73e2e44ab94da00b6eca78c4b7ce2067343a1a0aa67b5d9389d8bd0a2090f56330f5c3750b64c8aac1126060ae32
-
Filesize
3.7MB
MD5fc50647f665a6a31f3f2857d6c01f57b
SHA1e34649b6ff14b9aef7757e7f4e2c72baac8925b8
SHA25670bc280a90e84a0c4a55f8ee7a5461b440cf8cf105c4bc47cbdd57566f6cd402
SHA51239d17800ac64305d6b198361bb6e3c0f427a73e2e44ab94da00b6eca78c4b7ce2067343a1a0aa67b5d9389d8bd0a2090f56330f5c3750b64c8aac1126060ae32
-
Filesize
3.7MB
MD5fc50647f665a6a31f3f2857d6c01f57b
SHA1e34649b6ff14b9aef7757e7f4e2c72baac8925b8
SHA25670bc280a90e84a0c4a55f8ee7a5461b440cf8cf105c4bc47cbdd57566f6cd402
SHA51239d17800ac64305d6b198361bb6e3c0f427a73e2e44ab94da00b6eca78c4b7ce2067343a1a0aa67b5d9389d8bd0a2090f56330f5c3750b64c8aac1126060ae32
-
Filesize
3.7MB
MD5fc50647f665a6a31f3f2857d6c01f57b
SHA1e34649b6ff14b9aef7757e7f4e2c72baac8925b8
SHA25670bc280a90e84a0c4a55f8ee7a5461b440cf8cf105c4bc47cbdd57566f6cd402
SHA51239d17800ac64305d6b198361bb6e3c0f427a73e2e44ab94da00b6eca78c4b7ce2067343a1a0aa67b5d9389d8bd0a2090f56330f5c3750b64c8aac1126060ae32
-
Filesize
3.7MB
MD5fc50647f665a6a31f3f2857d6c01f57b
SHA1e34649b6ff14b9aef7757e7f4e2c72baac8925b8
SHA25670bc280a90e84a0c4a55f8ee7a5461b440cf8cf105c4bc47cbdd57566f6cd402
SHA51239d17800ac64305d6b198361bb6e3c0f427a73e2e44ab94da00b6eca78c4b7ce2067343a1a0aa67b5d9389d8bd0a2090f56330f5c3750b64c8aac1126060ae32