Analysis

  • max time kernel
    178s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2023 20:06

General

  • Target

    NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe

  • Size

    378KB

  • MD5

    065c76545953749ec743f5ebc26b4a60

  • SHA1

    a177afbe1ec6bbe4212b690d5069bf77869e29dd

  • SHA256

    4c9e8c91df6ae0e7633d69f1bef4030c7e63496bcbcfcbb018bfd6cc0edf1137

  • SHA512

    881e2d5f4e01dfefc9f2622ed06f4587567bcda5500e65313b911dd75907c8b418d217a8843bc63f44d7e62d5a80e47c765a6ec8ed0389a710f2b261661af1e5

  • SSDEEP

    6144:r257JqSyDExeYr75lHzpaF2e6UK+42GTQMJSZO5f7M0rx7/hP66qve6UK+42GTQ+:e7EAxeYr75lTefkY660fIaDZkY660f28

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Malware Backdoor - Berbew 12 IoCs

    Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\SysWOW64\Decmjjie.exe
      C:\Windows\system32\Decmjjie.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Windows\SysWOW64\Dbgndoho.exe
        C:\Windows\system32\Dbgndoho.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4692
        • C:\Windows\SysWOW64\Dicbfhni.exe
          C:\Windows\system32\Dicbfhni.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1272
          • C:\Windows\SysWOW64\Ejdonq32.exe
            C:\Windows\system32\Ejdonq32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4240
            • C:\Windows\SysWOW64\Eangjkkd.exe
              C:\Windows\system32\Eangjkkd.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3096
  • C:\Windows\SysWOW64\Eldlhckj.exe
    C:\Windows\system32\Eldlhckj.exe
    1⤵
    • Executes dropped EXE
    PID:4144
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 412
      2⤵
      • Program crash
      PID:4372
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4144 -ip 4144
    1⤵
      PID:1972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Dbgndoho.exe

      Filesize

      378KB

      MD5

      fe77cb45ad4ab6d9111298f774fe075f

      SHA1

      0f1f0d4726f4c273a539bce18bc1c5f90319b19c

      SHA256

      41f5fb68e2981d8a75ff70244f48e3b2f2261adb9ad594a4476fb1ec3e640da0

      SHA512

      19a78adfb7105710a53b665eaa5d2170a61b68f5c973e36e955ae9e2c717f913527df8ebe756e1c0152666728b57de00a3f817f6960b5d083a7d94a6ad4fc408

    • C:\Windows\SysWOW64\Dbgndoho.exe

      Filesize

      378KB

      MD5

      fe77cb45ad4ab6d9111298f774fe075f

      SHA1

      0f1f0d4726f4c273a539bce18bc1c5f90319b19c

      SHA256

      41f5fb68e2981d8a75ff70244f48e3b2f2261adb9ad594a4476fb1ec3e640da0

      SHA512

      19a78adfb7105710a53b665eaa5d2170a61b68f5c973e36e955ae9e2c717f913527df8ebe756e1c0152666728b57de00a3f817f6960b5d083a7d94a6ad4fc408

    • C:\Windows\SysWOW64\Decmjjie.exe

      Filesize

      378KB

      MD5

      570c9d6f377a7e24ae943dfaa2dffc63

      SHA1

      012553f6bbd01f3a006071116c659ccaacaa13bd

      SHA256

      6986cced95f93066786a67b17360072e962f7b651c6fe20c86e133c9b54c1983

      SHA512

      23af15263996b8454174bcb43c8e2be20af5e6cec471ff46f83519745c59f32ffef358d2b36e3356950f458d1126f2091add5893bb6fd3f5bc6e849e7d925e12

    • C:\Windows\SysWOW64\Decmjjie.exe

      Filesize

      378KB

      MD5

      570c9d6f377a7e24ae943dfaa2dffc63

      SHA1

      012553f6bbd01f3a006071116c659ccaacaa13bd

      SHA256

      6986cced95f93066786a67b17360072e962f7b651c6fe20c86e133c9b54c1983

      SHA512

      23af15263996b8454174bcb43c8e2be20af5e6cec471ff46f83519745c59f32ffef358d2b36e3356950f458d1126f2091add5893bb6fd3f5bc6e849e7d925e12

    • C:\Windows\SysWOW64\Dicbfhni.exe

      Filesize

      378KB

      MD5

      64c63e6445d11bca446ddfba65005ea3

      SHA1

      5975c25634ff7eca1f96bfe0a7ccfd5838d74a8f

      SHA256

      299026efe3f066119cb500d30d12306de1cd8028ed2ed873ae2281ba9cf201d0

      SHA512

      8b11e27beb2de5e93c7cdc214683e97c72e3b14b8592c68cc8b4355103ad0cf1a50037d82d0bd03115234af781d6cb097cd2e3baac2595fd8dc46c3ecd2176fa

    • C:\Windows\SysWOW64\Dicbfhni.exe

      Filesize

      378KB

      MD5

      64c63e6445d11bca446ddfba65005ea3

      SHA1

      5975c25634ff7eca1f96bfe0a7ccfd5838d74a8f

      SHA256

      299026efe3f066119cb500d30d12306de1cd8028ed2ed873ae2281ba9cf201d0

      SHA512

      8b11e27beb2de5e93c7cdc214683e97c72e3b14b8592c68cc8b4355103ad0cf1a50037d82d0bd03115234af781d6cb097cd2e3baac2595fd8dc46c3ecd2176fa

    • C:\Windows\SysWOW64\Eangjkkd.exe

      Filesize

      378KB

      MD5

      5ded937eabe21e3d5ea3e94dcb69e79a

      SHA1

      e88628c704728d7b1149a38da6cebf7f28cebe84

      SHA256

      41a97363b7900183234f06604517ee0c32f7e16551d586e72f516db8d115364f

      SHA512

      edfcfed943a53e8cb69f86da8fb08baddfccaf4eb117ce6c80610aaa014eda056c046ddc0cb8590aedf559cde1701962009688d45e4d1bdeda529c1dabac6bd2

    • C:\Windows\SysWOW64\Eangjkkd.exe

      Filesize

      378KB

      MD5

      5ded937eabe21e3d5ea3e94dcb69e79a

      SHA1

      e88628c704728d7b1149a38da6cebf7f28cebe84

      SHA256

      41a97363b7900183234f06604517ee0c32f7e16551d586e72f516db8d115364f

      SHA512

      edfcfed943a53e8cb69f86da8fb08baddfccaf4eb117ce6c80610aaa014eda056c046ddc0cb8590aedf559cde1701962009688d45e4d1bdeda529c1dabac6bd2

    • C:\Windows\SysWOW64\Ejdonq32.exe

      Filesize

      378KB

      MD5

      8a896c4058a46e98fa22686486c815b1

      SHA1

      a2c843af775f758a985595e746e0bbc1045cfe38

      SHA256

      ff7f39e29a989c8515cc132fe68be36a9d91ef07a7b5d87bc87f444c9914a2d6

      SHA512

      01e615db57a9d0cad010139daec160ab8faf0ade38834126457bd5587b03df879a97d99c6054bfc342293bac6bc54b4209d783e6c302be153f10c0496d3065d9

    • C:\Windows\SysWOW64\Ejdonq32.exe

      Filesize

      378KB

      MD5

      8a896c4058a46e98fa22686486c815b1

      SHA1

      a2c843af775f758a985595e746e0bbc1045cfe38

      SHA256

      ff7f39e29a989c8515cc132fe68be36a9d91ef07a7b5d87bc87f444c9914a2d6

      SHA512

      01e615db57a9d0cad010139daec160ab8faf0ade38834126457bd5587b03df879a97d99c6054bfc342293bac6bc54b4209d783e6c302be153f10c0496d3065d9

    • C:\Windows\SysWOW64\Eldlhckj.exe

      Filesize

      378KB

      MD5

      20d6422020a4ba47b92807b9ef0a1ca5

      SHA1

      8e81edafa54ccac991d3ed5d74e65d9839e56fc6

      SHA256

      db110b562d50d0eac767a3c6bb8ca70a455b69cb194ced4ed332fbd814efdf16

      SHA512

      a356b78660ccb8a464b2ed71a86e4e7e6198423e04ca6d3b180e288cdc11d18ec5f694524fd11afe31756bfd50bb0b62a8dca421568b20d8e8fcd25f04195dcb

    • C:\Windows\SysWOW64\Eldlhckj.exe

      Filesize

      378KB

      MD5

      20d6422020a4ba47b92807b9ef0a1ca5

      SHA1

      8e81edafa54ccac991d3ed5d74e65d9839e56fc6

      SHA256

      db110b562d50d0eac767a3c6bb8ca70a455b69cb194ced4ed332fbd814efdf16

      SHA512

      a356b78660ccb8a464b2ed71a86e4e7e6198423e04ca6d3b180e288cdc11d18ec5f694524fd11afe31756bfd50bb0b62a8dca421568b20d8e8fcd25f04195dcb

    • C:\Windows\SysWOW64\Foaeccgp.dll

      Filesize

      7KB

      MD5

      2d91f70e9b6d569eeffbbec18993f7ca

      SHA1

      89902ab77f380d53a881828290bc3bedba36be1e

      SHA256

      1f5bdd4afeee882476159ddf507c5f06e3cdb5f92767282b9992668e505e6213

      SHA512

      85544341574f4a6335c3ce00693050f5cb66552a5b7ed1b1d37ed3803bee7306f75d062ba70ee5b8fc328745901bc57b297c0f4dfad5a608e652465f50e0dc5e

    • memory/1140-50-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1140-7-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1272-23-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1272-52-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/3096-44-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/3448-0-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/3448-49-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4144-48-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4144-53-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4240-36-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4692-51-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4692-15-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB