Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 14:27
Behavioral task
behavioral1
Sample
NEAS.4de516c725c6ad8b4efa69177efa2642.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.4de516c725c6ad8b4efa69177efa2642.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.4de516c725c6ad8b4efa69177efa2642.exe
-
Size
187KB
-
MD5
4de516c725c6ad8b4efa69177efa2642
-
SHA1
396334d17e5411e1d832956102a7cf75e71db761
-
SHA256
6af00548e6860b7514280275545254574aaf0a9ece94fa3d231a3700d0b19988
-
SHA512
cc29436e9608b3999f4bee5f395228d7389feb09eb80c5622081d2986b3808eeb34ce876701b4386e29aaf4544e803ddcf4dc49b4222ab16aaa244e6f3ba3965
-
SSDEEP
3072:Dv5Ls27BIJHluLyXuEQ00UIIIhg6XXXDzXXX13612IIIre36TAXXXhgavcXXXLIX:DBs27GluLyXxQQIIIhg6XXXDzXXX13sE
Malware Config
Signatures
-
Malware Backdoor - Berbew 2 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0007000000022e43-2.dat family_berbew behavioral2/files/0x0007000000022e43-3.dat family_berbew -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation NEAS.4de516c725c6ad8b4efa69177efa2642.exe -
Executes dropped EXE 1 IoCs
pid Process 2888 hauhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Debug\hauhost.exe NEAS.4de516c725c6ad8b4efa69177efa2642.exe File created C:\Windows\Debug\hauhost.exe NEAS.4de516c725c6ad8b4efa69177efa2642.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 hauhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz hauhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4984 NEAS.4de516c725c6ad8b4efa69177efa2642.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4440 4984 NEAS.4de516c725c6ad8b4efa69177efa2642.exe 89 PID 4984 wrote to memory of 4440 4984 NEAS.4de516c725c6ad8b4efa69177efa2642.exe 89 PID 4984 wrote to memory of 4440 4984 NEAS.4de516c725c6ad8b4efa69177efa2642.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4de516c725c6ad8b4efa69177efa2642.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4de516c725c6ad8b4efa69177efa2642.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEAS4D~1.EXE > nul2⤵PID:4440
-
-
C:\Windows\Debug\hauhost.exeC:\Windows\Debug\hauhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD5e87d0669dc3f9322459c38b66176fbf3
SHA1f289623c799eac3da3e943b8ce18e33b5b7bebf9
SHA256df6db9192f9e8aebb62bc8f4ebc8c44f7815d694be286c312ff62094b2ac39bb
SHA512b72ff37f1dc43de897e57d23b36386d67dd1ba477ce1f14cdeb00b2b6b59ff0bc86d088bc507ec780b4984aba178140b43060304bc9c0be6e7c7e9e5bc8671d8
-
Filesize
187KB
MD5e87d0669dc3f9322459c38b66176fbf3
SHA1f289623c799eac3da3e943b8ce18e33b5b7bebf9
SHA256df6db9192f9e8aebb62bc8f4ebc8c44f7815d694be286c312ff62094b2ac39bb
SHA512b72ff37f1dc43de897e57d23b36386d67dd1ba477ce1f14cdeb00b2b6b59ff0bc86d088bc507ec780b4984aba178140b43060304bc9c0be6e7c7e9e5bc8671d8