Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
04/11/2023, 19:08
Behavioral task
behavioral1
Sample
NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe
-
Size
1024KB
-
MD5
07202bce0fea3db0897f88992f8f2620
-
SHA1
83c3313d2f9802e9c23babc4b6e40f656eb4dfb6
-
SHA256
d4c265c05c7ba4edb94c5f838cc9b046eaaa21c1bf2527e492290d8a466049e8
-
SHA512
e41707394f545929fa8321ea1c61525d60568118fe7c39ff391af859f398e9087557f67a45c9afad4fab999412202a908f3d27ca42c1887b255d0bbfa033e846
-
SSDEEP
24576:Tax5QWMM0WdczyxWZQdsk5ueMLZmN1DUZmSordfq6H:Tax5+M0WqzyEQdVOZmXYZmSadfq+
Malware Config
Signatures
-
Malware Backdoor - Berbew 2 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x000a000000012266-1.dat family_berbew behavioral1/files/0x000a000000012266-4.dat family_berbew -
Deletes itself 1 IoCs
pid Process 2840 8601.tmp -
Executes dropped EXE 1 IoCs
pid Process 2840 8601.tmp -
Loads dropped DLL 1 IoCs
pid Process 1296 NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2840 1296 NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe 28 PID 1296 wrote to memory of 2840 1296 NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe 28 PID 1296 wrote to memory of 2840 1296 NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe 28 PID 1296 wrote to memory of 2840 1296 NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.07202bce0fea3db0897f88992f8f2620_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\8601.tmp"C:\Users\Admin\AppData\Local\Temp\8601.tmp"2⤵
- Deletes itself
- Executes dropped EXE
PID:2840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5dc478d26941fc14c1c4cf466f2d1435b
SHA19251b12516a4b98a6cb7919a3233ff759cb09eea
SHA2562c0ea3b94f79ea2d2e49b47aec3ade29050d9ea5816d4107adf0c0814d5e75bc
SHA5125e92300c819666a0d453dd22f2e81bf34c538d1ec23244de1c859ed5dc5fa263273d328a13ac5be6c7c2f129271a3b44b9a843fe3c14b751102936aac4cdf69f
-
Filesize
1024KB
MD5dc478d26941fc14c1c4cf466f2d1435b
SHA19251b12516a4b98a6cb7919a3233ff759cb09eea
SHA2562c0ea3b94f79ea2d2e49b47aec3ade29050d9ea5816d4107adf0c0814d5e75bc
SHA5125e92300c819666a0d453dd22f2e81bf34c538d1ec23244de1c859ed5dc5fa263273d328a13ac5be6c7c2f129271a3b44b9a843fe3c14b751102936aac4cdf69f