Analysis
-
max time kernel
100s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 21:50
Behavioral task
behavioral1
Sample
NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe
-
Size
1.4MB
-
MD5
6b820b018cbfadbbe6162a588f5e3c10
-
SHA1
f34a183737326ca62ff62a586fe9b52a2d3f60e1
-
SHA256
2fbb770fa3c792375c1db152fbedf0bcb0e8db645411db63c23e55c9f97584b3
-
SHA512
97f32d7e1ead571c2514f66bb4a3b81f312a57b1a9738db728189359a87927980a36f28e136431102faa4410f8597fc2828945a6415dec50a20be8ab2fe91bdc
-
SSDEEP
12288:PKxcEeha5sAIfMiBHjVDa/ZSF1q26JHnhvMCtjW:PKc9h2n4Fa/ZSF1q26NueC
Malware Config
Signatures
-
Malware Backdoor - Berbew 5 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/4784-0-0x0000000000400000-0x00000000004F2000-memory.dmp family_berbew behavioral2/memory/4476-6-0x0000000000400000-0x00000000004F2000-memory.dmp family_berbew behavioral2/memory/4784-7-0x0000000000400000-0x00000000004F2000-memory.dmp family_berbew behavioral2/files/0x000a000000022df7-5.dat family_berbew behavioral2/memory/4476-8-0x0000000005040000-0x0000000005132000-memory.dmp family_berbew -
Deletes itself 1 IoCs
pid Process 4476 NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe -
Executes dropped EXE 1 IoCs
pid Process 4476 NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 732 4784 WerFault.exe 85 3940 4476 WerFault.exe 95 856 4476 WerFault.exe 95 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4784 NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4476 NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4476 4784 NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe 95 PID 4784 wrote to memory of 4476 4784 NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe 95 PID 4784 wrote to memory of 4476 4784 NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 3442⤵
- Program crash
PID:732
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6b820b018cbfadbbe6162a588f5e3c10.exeC:\Users\Admin\AppData\Local\Temp\NEAS.6b820b018cbfadbbe6162a588f5e3c10.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 3443⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 3723⤵
- Program crash
PID:856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4784 -ip 47841⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4476 -ip 44761⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4476 -ip 44761⤵PID:2056
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD55033988ac698dfa3291b7d66eae8a08d
SHA1b2096ded592fb9533facdd1d247601694a9b2944
SHA256e855fe33dbe60b3105f2d48a5b5ee8792da25eec42fff02ed2ebaf152c60e0a2
SHA51275a41502827b984fc488f068fbfa507a1bc8ecbe2c48d2c161d017ce92034a2779418392f5f49ec4a38c4577f5fcd5301141badd27545852497c16408c397ce6