Analysis
-
max time kernel
175s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 06:57
Behavioral task
behavioral1
Sample
NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe
-
Size
203KB
-
MD5
db6e1ea8d3838342c0250e4fb6dd8890
-
SHA1
2f7d1558049692299e2f1c0ca6bdd4773a68fb31
-
SHA256
3d3a22a846413a1abd25d0304dbe63734f817ede5e2f5a6b055941dd0c518619
-
SHA512
195d23db6720fb031eed68b87d6085247ef21625769d5f5881992037dfa04629b0e4b98dbd695f9bb898f95f931361b8b4d7293d12724586fea7bbc2935fc8dd
-
SSDEEP
6144:gZqmrnoSEW+pEkyMeQxqqF4jiZaCXojcKredsIgWsZ:gFoSEZLeQXg
Malware Config
Signatures
-
Malware Backdoor - Berbew 5 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/2772-0-0x0000000000400000-0x000000000043E000-memory.dmp family_berbew behavioral2/memory/2964-6-0x0000000000400000-0x000000000043E000-memory.dmp family_berbew behavioral2/memory/2772-7-0x0000000000400000-0x000000000043E000-memory.dmp family_berbew behavioral2/files/0x000700000002209a-5.dat family_berbew behavioral2/memory/2964-8-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_berbew -
Deletes itself 1 IoCs
pid Process 2964 NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 2892 2772 WerFault.exe 76 4488 2964 WerFault.exe 94 992 2964 WerFault.exe 94 2244 2964 WerFault.exe 94 2820 2964 WerFault.exe 94 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2772 NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2964 NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2964 2772 NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe 94 PID 2772 wrote to memory of 2964 2772 NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe 94 PID 2772 wrote to memory of 2964 2772 NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 3842⤵
- Program crash
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exeC:\Users\Admin\AppData\Local\Temp\NEAS.db6e1ea8d3838342c0250e4fb6dd8890.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 3643⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 7683⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 7883⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 7763⤵
- Program crash
PID:2820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2772 -ip 27721⤵PID:2908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2964 -ip 29641⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2964 -ip 29641⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2964 -ip 29641⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2964 -ip 29641⤵PID:2840
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD555e82afe889adf13a17b91674544eff3
SHA14edbaffc54252341474e4cddcb5dce0c0f6dbc36
SHA256fb1d8abdc122548d95d9227b2d31caf8f047c440809c224a88130d11591c11e1
SHA5126d0c64704243188615fe92ddbbae7d7b8e2ecf2bc8667b4cfd775cca412550a042c25f79a2db6f30f4378e95d62cd20c81681c3faf3c5f9870765b35507d715e