Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 02:32
Behavioral task
behavioral1
Sample
NEAS.cf4a16098a5a2159255195d0241ad900.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.cf4a16098a5a2159255195d0241ad900.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.cf4a16098a5a2159255195d0241ad900.exe
-
Size
123KB
-
MD5
cf4a16098a5a2159255195d0241ad900
-
SHA1
21474316094ef07473b2aee7e5f22fdb63101701
-
SHA256
3d05c92ef7ce1e094d59a336cfd72c07f96ab54e02435e3ff7c2864916053169
-
SHA512
eaa854accce1458574b0db6fdd732378a941177e137eef47e0a1d64d6a69ea77e0e6034e04bf9c1ec626d8aac0d3db189741333cced514dd78a8da4b3c5ea750
-
SSDEEP
3072:jRiQH4uSIrdRKtARM1nJfBbd4ounTf8yE7Dmzve:ZHQIRRKoedqnTfad
Malware Config
Signatures
-
Malware Backdoor - Berbew 1 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0006000000022dea-11.dat family_berbew -
Deletes itself 1 IoCs
pid Process 5008 NEAS.cf4a16098a5a2159255195d0241ad900.exe -
Executes dropped EXE 1 IoCs
pid Process 5008 NEAS.cf4a16098a5a2159255195d0241ad900.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4548 NEAS.cf4a16098a5a2159255195d0241ad900.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 980 svchost.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4548 NEAS.cf4a16098a5a2159255195d0241ad900.exe 5008 NEAS.cf4a16098a5a2159255195d0241ad900.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 5008 4548 NEAS.cf4a16098a5a2159255195d0241ad900.exe 87 PID 4548 wrote to memory of 5008 4548 NEAS.cf4a16098a5a2159255195d0241ad900.exe 87 PID 4548 wrote to memory of 5008 4548 NEAS.cf4a16098a5a2159255195d0241ad900.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cf4a16098a5a2159255195d0241ad900.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cf4a16098a5a2159255195d0241ad900.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\NEAS.cf4a16098a5a2159255195d0241ad900.exeC:\Users\Admin\AppData\Local\Temp\NEAS.cf4a16098a5a2159255195d0241ad900.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5008
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:928
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5b1ee9010abe9d8a4acf01859bd648ee8
SHA15f925fb302565beebefaa462547a79d337b3aedc
SHA2567577c7a0a60b7e9a053e460d4ed38d67eecce4a2fd412c71eb3be2f925189700
SHA51237e4337b0600bea529a5f5a77b3f9fde7bc5bdc02f10da808ed60bd78518ab2ff0485410204179d95e802e05f9777c973d4912b2e21c83459584110bc712956b