Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 23:04
Behavioral task
behavioral1
Sample
NEAS.d9a43961c899fc2947ec5a26cd263c30.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d9a43961c899fc2947ec5a26cd263c30.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.d9a43961c899fc2947ec5a26cd263c30.exe
-
Size
341KB
-
MD5
d9a43961c899fc2947ec5a26cd263c30
-
SHA1
0770410f5e9e3c1a58afbf8211ada5df36894236
-
SHA256
35cf3ad040e370ea6febd200318776837ece71f06fc7e46392f2f6e55e860851
-
SHA512
b65acb18ce381c9fd6976205d3802b49063e173e7f620b328a8d89317056b378eb2db328fcd52c652bb44ed13cbcee6b066d5efb2de71b62baf39cba6a2b22e1
-
SSDEEP
6144:grnkP+6bB0H9rj3fMMICM4kfBbSVtxzcdNg/SOPOoUkZUuOsOjbSMu6l3bS64u5U:gQ+Qu9yus9exo/iSuU8OsitH5og+
Malware Config
Signatures
-
Malware Backdoor - Berbew 3 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0005000000000035-5.dat family_berbew behavioral2/files/0x0007000000022112-9.dat family_berbew behavioral2/files/0x0006000000000035-10.dat family_berbew -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\spools.exe NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File created C:\Windows\SysWOW64\drivers\spools.exe NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File created C:\Windows\SysWOW64\drivers\spools.exe NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Enumerates connected drives 3 TTPs 38 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\W: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\X: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\I: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\J: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\O: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\R: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\S: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\W: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\T: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\I: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\Q: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\L: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\N: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\G: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\R: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\U: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\X: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\H: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\L: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\T: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\H: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\M: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\N: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\V: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\K: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\P: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\J: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\M: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\O: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\P: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\E: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\G: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\Q: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\U: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\E: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\K: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe File opened (read-only) \??\S: NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1512 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 1512 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 3540 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 3540 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1512 wrote to memory of 3200 1512 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 89 PID 1512 wrote to memory of 3200 1512 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 89 PID 1512 wrote to memory of 3200 1512 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 89 PID 1512 wrote to memory of 3540 1512 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 91 PID 1512 wrote to memory of 3540 1512 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 91 PID 1512 wrote to memory of 3540 1512 NEAS.d9a43961c899fc2947ec5a26cd263c30.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d9a43961c899fc2947ec5a26cd263c30.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d9a43961c899fc2947ec5a26cd263c30.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f2⤵
- Installs/modifies Browser Helper Object
PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d9a43961c899fc2947ec5a26cd263c30.exeC:\Users\Admin\AppData\Local\Temp\NEAS.d9a43961c899fc2947ec5a26cd263c30.exe2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\NEAS.d9a43961c899fc2947ec5a26cd263c30.exeC:\Users\Admin\AppData\Local\Temp\NEAS.d9a43961c899fc2947ec5a26cd263c30.exe3⤵PID:1936
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Browser Extensions
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5ed0ada789da7478b777584027890a619
SHA1b08830d89e033e920fe4f9843408fb5ac3662671
SHA256fc2506840a0b95f998dc686de04706399b7500a300543acfea5181caaf622af9
SHA5123a7e3145b0cda20a1201f0398cfac28df19096d5b379a73133486f137d3a3ecfeac2c59dc381b7c3fdb9bc28712d762e0834ec1838f32701ad70a458bdfdbb13
-
Filesize
355KB
MD583e93b09ec01a3b5b5f5a1e19d029d81
SHA18f91854505dd2d88bd6cab944cb7d3e51ed92597
SHA25671754a2982098de1d9756b6735768ebee7163f40106da784e330694cc94eddf1
SHA512de721985a04b513941d0c3194f6dfffdb5a10b37b5ef3fec6acd6e8eea8ccbadc4ce7cf06d9f5de954e1650cbaf9a489131871686a31331efd1e9dd0dfa002cb
-
Filesize
348KB
MD57de2ced4b24a0b8fb00b31954535fac3
SHA1110489fb72f86d54c8794433d82a0aac6a155e9d
SHA256ae2cb134fb88b003be8ee77cec35d8b329678c2ad26cd84765ffc32f13774d27
SHA512113339a7af8e91a01f0024bf15d1c99293e8536a9a21d6d1b9288781abdce122f077d44c8e84e86eedf63aaf383ae9a6fbc84c5989e5ce8fd620d110f442d312
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a