Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2023 10:02

General

  • Target

    NEAS.0d2ba1326266aa983877b285877a4c02.exe

  • Size

    227KB

  • MD5

    0d2ba1326266aa983877b285877a4c02

  • SHA1

    8b041452e8f4a4ddc7c4edbc6b0b73e7a5844fdc

  • SHA256

    a3629f081ed90fb2c18cbfb4c708d459fe8b2f4e381792381acc8f85852dddbd

  • SHA512

    582abf4ffe65c72501c1935fca805f531ada77442e346ba28645c77044dbdacbe2cec5a01291caf44fa397359be6ad35422ae12ae543ffbcf50a951c34bebe69

  • SSDEEP

    3072:N1j1klt51m2nn8NYP/4WZeyjpwoTRBmDRGGurhUXvBj2QE2HegPelTeIdI7jFHu:N1pkvmWJqVm7U5j2QE2+g24Id2jFHu

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Malware Backdoor - Berbew 2 IoCs

    Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0d2ba1326266aa983877b285877a4c02.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0d2ba1326266aa983877b285877a4c02.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Windows\SysWOW64\Dmllipeg.exe
      C:\Windows\system32\Dmllipeg.exe
      2⤵
      • Executes dropped EXE
      PID:4756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 228
        3⤵
        • Program crash
        PID:764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4756 -ip 4756
    1⤵
      PID:1168

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      227KB

      MD5

      4a34aa18af6ef6828f6a2605b10dc986

      SHA1

      5c08b165895a21e177ad0218843c354158661cce

      SHA256

      7589eb9ce4a1d07f3f0fac7ab2d60f51de088b0f0406a610334a5686d0047d63

      SHA512

      a9cca744c14a828332850efbebd5d2587dc2442c71415c7d83f6f258c816578278c322ccaa6500142c962486718ded2b7912f0e2736e1b01bde372708c3aefee

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      227KB

      MD5

      4a34aa18af6ef6828f6a2605b10dc986

      SHA1

      5c08b165895a21e177ad0218843c354158661cce

      SHA256

      7589eb9ce4a1d07f3f0fac7ab2d60f51de088b0f0406a610334a5686d0047d63

      SHA512

      a9cca744c14a828332850efbebd5d2587dc2442c71415c7d83f6f258c816578278c322ccaa6500142c962486718ded2b7912f0e2736e1b01bde372708c3aefee

    • memory/4756-8-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4756-10-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4904-0-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4904-9-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB