Analysis
-
max time kernel
178s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 20:06
Behavioral task
behavioral1
Sample
NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe
-
Size
378KB
-
MD5
065c76545953749ec743f5ebc26b4a60
-
SHA1
a177afbe1ec6bbe4212b690d5069bf77869e29dd
-
SHA256
4c9e8c91df6ae0e7633d69f1bef4030c7e63496bcbcfcbb018bfd6cc0edf1137
-
SHA512
881e2d5f4e01dfefc9f2622ed06f4587567bcda5500e65313b911dd75907c8b418d217a8843bc63f44d7e62d5a80e47c765a6ec8ed0389a710f2b261661af1e5
-
SSDEEP
6144:r257JqSyDExeYr75lHzpaF2e6UK+42GTQMJSZO5f7M0rx7/hP66qve6UK+42GTQ+:e7EAxeYr75lTefkY660fIaDZkY660f28
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Decmjjie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Decmjjie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbgndoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dicbfhni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eangjkkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eangjkkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dbgndoho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dicbfhni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejdonq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejdonq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe -
Malware Backdoor - Berbew 12 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0007000000022df3-8.dat family_berbew behavioral2/files/0x0007000000022df3-6.dat family_berbew behavioral2/files/0x0007000000022df5-14.dat family_berbew behavioral2/files/0x0007000000022df5-16.dat family_berbew behavioral2/files/0x0006000000022dfa-22.dat family_berbew behavioral2/files/0x0006000000022dfa-24.dat family_berbew behavioral2/files/0x0006000000022dfe-38.dat family_berbew behavioral2/files/0x0006000000022dfe-39.dat family_berbew behavioral2/files/0x0006000000022e00-46.dat family_berbew behavioral2/files/0x0006000000022e00-47.dat family_berbew behavioral2/files/0x0006000000022dfc-30.dat family_berbew behavioral2/files/0x0006000000022dfc-31.dat family_berbew -
Executes dropped EXE 6 IoCs
pid Process 1140 Decmjjie.exe 4692 Dbgndoho.exe 1272 Dicbfhni.exe 4240 Ejdonq32.exe 3096 Eangjkkd.exe 4144 Eldlhckj.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Decmjjie.exe NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe File created C:\Windows\SysWOW64\Dicbfhni.exe Dbgndoho.exe File opened for modification C:\Windows\SysWOW64\Ejdonq32.exe Dicbfhni.exe File created C:\Windows\SysWOW64\Apleaenp.dll Eangjkkd.exe File created C:\Windows\SysWOW64\Ebjjjj32.dll Decmjjie.exe File created C:\Windows\SysWOW64\Ejdonq32.exe Dicbfhni.exe File opened for modification C:\Windows\SysWOW64\Eldlhckj.exe Eangjkkd.exe File created C:\Windows\SysWOW64\Iamlhdea.dll NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe File created C:\Windows\SysWOW64\Pdjmdkgg.dll Dicbfhni.exe File created C:\Windows\SysWOW64\Eangjkkd.exe Ejdonq32.exe File created C:\Windows\SysWOW64\Eldlhckj.exe Eangjkkd.exe File opened for modification C:\Windows\SysWOW64\Eangjkkd.exe Ejdonq32.exe File created C:\Windows\SysWOW64\Foaeccgp.dll Ejdonq32.exe File created C:\Windows\SysWOW64\Decmjjie.exe NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe File created C:\Windows\SysWOW64\Dbgndoho.exe Decmjjie.exe File opened for modification C:\Windows\SysWOW64\Dbgndoho.exe Decmjjie.exe File opened for modification C:\Windows\SysWOW64\Dicbfhni.exe Dbgndoho.exe File created C:\Windows\SysWOW64\Gbkkfg32.dll Dbgndoho.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4372 4144 WerFault.exe 94 -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dbgndoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbkkfg32.dll" Dbgndoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Foaeccgp.dll" Ejdonq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eangjkkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iamlhdea.dll" NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Decmjjie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dbgndoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apleaenp.dll" Eangjkkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Decmjjie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebjjjj32.dll" Decmjjie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dicbfhni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eangjkkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdjmdkgg.dll" Dicbfhni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dicbfhni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ejdonq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ejdonq32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3448 wrote to memory of 1140 3448 NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe 90 PID 3448 wrote to memory of 1140 3448 NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe 90 PID 3448 wrote to memory of 1140 3448 NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe 90 PID 1140 wrote to memory of 4692 1140 Decmjjie.exe 91 PID 1140 wrote to memory of 4692 1140 Decmjjie.exe 91 PID 1140 wrote to memory of 4692 1140 Decmjjie.exe 91 PID 4692 wrote to memory of 1272 4692 Dbgndoho.exe 92 PID 4692 wrote to memory of 1272 4692 Dbgndoho.exe 92 PID 4692 wrote to memory of 1272 4692 Dbgndoho.exe 92 PID 1272 wrote to memory of 4240 1272 Dicbfhni.exe 93 PID 1272 wrote to memory of 4240 1272 Dicbfhni.exe 93 PID 1272 wrote to memory of 4240 1272 Dicbfhni.exe 93 PID 4240 wrote to memory of 3096 4240 Ejdonq32.exe 95 PID 4240 wrote to memory of 3096 4240 Ejdonq32.exe 95 PID 4240 wrote to memory of 3096 4240 Ejdonq32.exe 95 PID 3096 wrote to memory of 4144 3096 Eangjkkd.exe 94 PID 3096 wrote to memory of 4144 3096 Eangjkkd.exe 94 PID 3096 wrote to memory of 4144 3096 Eangjkkd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.065c76545953749ec743f5ebc26b4a60_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\Decmjjie.exeC:\Windows\system32\Decmjjie.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\Dbgndoho.exeC:\Windows\system32\Dbgndoho.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\Dicbfhni.exeC:\Windows\system32\Dicbfhni.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Ejdonq32.exeC:\Windows\system32\Ejdonq32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\Eangjkkd.exeC:\Windows\system32\Eangjkkd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3096
-
-
-
-
-
-
C:\Windows\SysWOW64\Eldlhckj.exeC:\Windows\system32\Eldlhckj.exe1⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 4122⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4144 -ip 41441⤵PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5fe77cb45ad4ab6d9111298f774fe075f
SHA10f1f0d4726f4c273a539bce18bc1c5f90319b19c
SHA25641f5fb68e2981d8a75ff70244f48e3b2f2261adb9ad594a4476fb1ec3e640da0
SHA51219a78adfb7105710a53b665eaa5d2170a61b68f5c973e36e955ae9e2c717f913527df8ebe756e1c0152666728b57de00a3f817f6960b5d083a7d94a6ad4fc408
-
Filesize
378KB
MD5fe77cb45ad4ab6d9111298f774fe075f
SHA10f1f0d4726f4c273a539bce18bc1c5f90319b19c
SHA25641f5fb68e2981d8a75ff70244f48e3b2f2261adb9ad594a4476fb1ec3e640da0
SHA51219a78adfb7105710a53b665eaa5d2170a61b68f5c973e36e955ae9e2c717f913527df8ebe756e1c0152666728b57de00a3f817f6960b5d083a7d94a6ad4fc408
-
Filesize
378KB
MD5570c9d6f377a7e24ae943dfaa2dffc63
SHA1012553f6bbd01f3a006071116c659ccaacaa13bd
SHA2566986cced95f93066786a67b17360072e962f7b651c6fe20c86e133c9b54c1983
SHA51223af15263996b8454174bcb43c8e2be20af5e6cec471ff46f83519745c59f32ffef358d2b36e3356950f458d1126f2091add5893bb6fd3f5bc6e849e7d925e12
-
Filesize
378KB
MD5570c9d6f377a7e24ae943dfaa2dffc63
SHA1012553f6bbd01f3a006071116c659ccaacaa13bd
SHA2566986cced95f93066786a67b17360072e962f7b651c6fe20c86e133c9b54c1983
SHA51223af15263996b8454174bcb43c8e2be20af5e6cec471ff46f83519745c59f32ffef358d2b36e3356950f458d1126f2091add5893bb6fd3f5bc6e849e7d925e12
-
Filesize
378KB
MD564c63e6445d11bca446ddfba65005ea3
SHA15975c25634ff7eca1f96bfe0a7ccfd5838d74a8f
SHA256299026efe3f066119cb500d30d12306de1cd8028ed2ed873ae2281ba9cf201d0
SHA5128b11e27beb2de5e93c7cdc214683e97c72e3b14b8592c68cc8b4355103ad0cf1a50037d82d0bd03115234af781d6cb097cd2e3baac2595fd8dc46c3ecd2176fa
-
Filesize
378KB
MD564c63e6445d11bca446ddfba65005ea3
SHA15975c25634ff7eca1f96bfe0a7ccfd5838d74a8f
SHA256299026efe3f066119cb500d30d12306de1cd8028ed2ed873ae2281ba9cf201d0
SHA5128b11e27beb2de5e93c7cdc214683e97c72e3b14b8592c68cc8b4355103ad0cf1a50037d82d0bd03115234af781d6cb097cd2e3baac2595fd8dc46c3ecd2176fa
-
Filesize
378KB
MD55ded937eabe21e3d5ea3e94dcb69e79a
SHA1e88628c704728d7b1149a38da6cebf7f28cebe84
SHA25641a97363b7900183234f06604517ee0c32f7e16551d586e72f516db8d115364f
SHA512edfcfed943a53e8cb69f86da8fb08baddfccaf4eb117ce6c80610aaa014eda056c046ddc0cb8590aedf559cde1701962009688d45e4d1bdeda529c1dabac6bd2
-
Filesize
378KB
MD55ded937eabe21e3d5ea3e94dcb69e79a
SHA1e88628c704728d7b1149a38da6cebf7f28cebe84
SHA25641a97363b7900183234f06604517ee0c32f7e16551d586e72f516db8d115364f
SHA512edfcfed943a53e8cb69f86da8fb08baddfccaf4eb117ce6c80610aaa014eda056c046ddc0cb8590aedf559cde1701962009688d45e4d1bdeda529c1dabac6bd2
-
Filesize
378KB
MD58a896c4058a46e98fa22686486c815b1
SHA1a2c843af775f758a985595e746e0bbc1045cfe38
SHA256ff7f39e29a989c8515cc132fe68be36a9d91ef07a7b5d87bc87f444c9914a2d6
SHA51201e615db57a9d0cad010139daec160ab8faf0ade38834126457bd5587b03df879a97d99c6054bfc342293bac6bc54b4209d783e6c302be153f10c0496d3065d9
-
Filesize
378KB
MD58a896c4058a46e98fa22686486c815b1
SHA1a2c843af775f758a985595e746e0bbc1045cfe38
SHA256ff7f39e29a989c8515cc132fe68be36a9d91ef07a7b5d87bc87f444c9914a2d6
SHA51201e615db57a9d0cad010139daec160ab8faf0ade38834126457bd5587b03df879a97d99c6054bfc342293bac6bc54b4209d783e6c302be153f10c0496d3065d9
-
Filesize
378KB
MD520d6422020a4ba47b92807b9ef0a1ca5
SHA18e81edafa54ccac991d3ed5d74e65d9839e56fc6
SHA256db110b562d50d0eac767a3c6bb8ca70a455b69cb194ced4ed332fbd814efdf16
SHA512a356b78660ccb8a464b2ed71a86e4e7e6198423e04ca6d3b180e288cdc11d18ec5f694524fd11afe31756bfd50bb0b62a8dca421568b20d8e8fcd25f04195dcb
-
Filesize
378KB
MD520d6422020a4ba47b92807b9ef0a1ca5
SHA18e81edafa54ccac991d3ed5d74e65d9839e56fc6
SHA256db110b562d50d0eac767a3c6bb8ca70a455b69cb194ced4ed332fbd814efdf16
SHA512a356b78660ccb8a464b2ed71a86e4e7e6198423e04ca6d3b180e288cdc11d18ec5f694524fd11afe31756bfd50bb0b62a8dca421568b20d8e8fcd25f04195dcb
-
Filesize
7KB
MD52d91f70e9b6d569eeffbbec18993f7ca
SHA189902ab77f380d53a881828290bc3bedba36be1e
SHA2561f5bdd4afeee882476159ddf507c5f06e3cdb5f92767282b9992668e505e6213
SHA51285544341574f4a6335c3ce00693050f5cb66552a5b7ed1b1d37ed3803bee7306f75d062ba70ee5b8fc328745901bc57b297c0f4dfad5a608e652465f50e0dc5e