Analysis
-
max time kernel
96s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 10:43
Behavioral task
behavioral1
Sample
NEAS.dc8b3214a48245897f0e5247dbeeba80.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.dc8b3214a48245897f0e5247dbeeba80.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.dc8b3214a48245897f0e5247dbeeba80.exe
-
Size
407KB
-
MD5
dc8b3214a48245897f0e5247dbeeba80
-
SHA1
589efde8edc7b8dce07effd7ff1e19fa74e32b3d
-
SHA256
34ef025da929c87c0a040ee186f2f70ce6659d61481bdfd579d87957e6bb5bd0
-
SHA512
deba7ebf4e237ddc6ffdff0d5d5a240fba13a455b871ef82bbf7c5cb3acd47c6383340d855f677955d179516fea9252caa454a747d7e8f2e4c576faefb063d21
-
SSDEEP
12288:J4aJO/awrSmfyiPFg8prNdw+C7797TnPtLU8deJUP//zk9FGB:JDJO/awrSmfyiPFg8prNdw+C7797TnP/
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbibfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mbibfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njbgmjgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nckkfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nckkfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.dc8b3214a48245897f0e5247dbeeba80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.dc8b3214a48245897f0e5247dbeeba80.exe -
Malware Backdoor - Berbew 17 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/752-0-0x0000000000400000-0x0000000000446000-memory.dmp family_berbew behavioral2/files/0x0006000000022e15-6.dat family_berbew behavioral2/files/0x0006000000022e15-8.dat family_berbew behavioral2/memory/1420-7-0x0000000000400000-0x0000000000446000-memory.dmp family_berbew behavioral2/files/0x0006000000022e17-9.dat family_berbew behavioral2/files/0x0006000000022e17-14.dat family_berbew behavioral2/files/0x0006000000022e17-15.dat family_berbew behavioral2/memory/4236-16-0x0000000000400000-0x0000000000446000-memory.dmp family_berbew behavioral2/files/0x0006000000022e19-22.dat family_berbew behavioral2/files/0x0006000000022e19-23.dat family_berbew behavioral2/files/0x0006000000022e1d-30.dat family_berbew behavioral2/files/0x0006000000022e1d-31.dat family_berbew behavioral2/memory/2392-32-0x0000000000400000-0x0000000000446000-memory.dmp family_berbew behavioral2/memory/3696-29-0x0000000000400000-0x0000000000446000-memory.dmp family_berbew behavioral2/memory/752-33-0x0000000000400000-0x0000000000446000-memory.dmp family_berbew behavioral2/memory/4236-35-0x0000000000400000-0x0000000000446000-memory.dmp family_berbew behavioral2/memory/1420-34-0x0000000000400000-0x0000000000446000-memory.dmp family_berbew -
Executes dropped EXE 4 IoCs
pid Process 1420 Mbibfm32.exe 4236 Njbgmjgl.exe 3696 Nckkfp32.exe 2392 Pififb32.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mbibfm32.exe NEAS.dc8b3214a48245897f0e5247dbeeba80.exe File created C:\Windows\SysWOW64\Fjoiip32.dll NEAS.dc8b3214a48245897f0e5247dbeeba80.exe File created C:\Windows\SysWOW64\Alapqh32.dll Mbibfm32.exe File opened for modification C:\Windows\SysWOW64\Nckkfp32.exe Njbgmjgl.exe File created C:\Windows\SysWOW64\Bkfmmb32.dll Njbgmjgl.exe File created C:\Windows\SysWOW64\Gaaklfpn.dll Nckkfp32.exe File created C:\Windows\SysWOW64\Mbibfm32.exe NEAS.dc8b3214a48245897f0e5247dbeeba80.exe File created C:\Windows\SysWOW64\Njbgmjgl.exe Mbibfm32.exe File opened for modification C:\Windows\SysWOW64\Njbgmjgl.exe Mbibfm32.exe File created C:\Windows\SysWOW64\Nckkfp32.exe Njbgmjgl.exe File created C:\Windows\SysWOW64\Pififb32.exe Nckkfp32.exe File opened for modification C:\Windows\SysWOW64\Pififb32.exe Nckkfp32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1952 2392 WerFault.exe 93 -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nckkfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjoiip32.dll" NEAS.dc8b3214a48245897f0e5247dbeeba80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" NEAS.dc8b3214a48245897f0e5247dbeeba80.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mbibfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkfmmb32.dll" Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alapqh32.dll" Mbibfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mbibfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} NEAS.dc8b3214a48245897f0e5247dbeeba80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nckkfp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 NEAS.dc8b3214a48245897f0e5247dbeeba80.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.dc8b3214a48245897f0e5247dbeeba80.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.dc8b3214a48245897f0e5247dbeeba80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaaklfpn.dll" Nckkfp32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 752 wrote to memory of 1420 752 NEAS.dc8b3214a48245897f0e5247dbeeba80.exe 89 PID 752 wrote to memory of 1420 752 NEAS.dc8b3214a48245897f0e5247dbeeba80.exe 89 PID 752 wrote to memory of 1420 752 NEAS.dc8b3214a48245897f0e5247dbeeba80.exe 89 PID 1420 wrote to memory of 4236 1420 Mbibfm32.exe 90 PID 1420 wrote to memory of 4236 1420 Mbibfm32.exe 90 PID 1420 wrote to memory of 4236 1420 Mbibfm32.exe 90 PID 4236 wrote to memory of 3696 4236 Njbgmjgl.exe 92 PID 4236 wrote to memory of 3696 4236 Njbgmjgl.exe 92 PID 4236 wrote to memory of 3696 4236 Njbgmjgl.exe 92 PID 3696 wrote to memory of 2392 3696 Nckkfp32.exe 93 PID 3696 wrote to memory of 2392 3696 Nckkfp32.exe 93 PID 3696 wrote to memory of 2392 3696 Nckkfp32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.dc8b3214a48245897f0e5247dbeeba80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.dc8b3214a48245897f0e5247dbeeba80.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\Mbibfm32.exeC:\Windows\system32\Mbibfm32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\Njbgmjgl.exeC:\Windows\system32\Njbgmjgl.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\Nckkfp32.exeC:\Windows\system32\Nckkfp32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\Pififb32.exeC:\Windows\system32\Pififb32.exe5⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 4126⤵
- Program crash
PID:1952
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2392 -ip 23921⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD533e989341885d71d81eb7d3819d74456
SHA1f451c48f5bc394e644e7a925c0ec32cd811c2195
SHA2565e954f146bd74dd8214285fecbcbcdea4b73c5db1ceeee5e5e3f996a8c176ef8
SHA512d65dd8863e513fd31cf9dfd49d9d538c0df8d9d9d44a455997b8ec61f347cda2cd5873d57ddf7ba705df70576f9359e084116a00753ef7345ee8ccb7e08eabe8
-
Filesize
407KB
MD533e989341885d71d81eb7d3819d74456
SHA1f451c48f5bc394e644e7a925c0ec32cd811c2195
SHA2565e954f146bd74dd8214285fecbcbcdea4b73c5db1ceeee5e5e3f996a8c176ef8
SHA512d65dd8863e513fd31cf9dfd49d9d538c0df8d9d9d44a455997b8ec61f347cda2cd5873d57ddf7ba705df70576f9359e084116a00753ef7345ee8ccb7e08eabe8
-
Filesize
407KB
MD5a03f171bd36eca64073819f8a3d9c77b
SHA120d93aeeb9ba4220dbc8b3cb6621f574b50a3454
SHA2564a10eec225b072806ad1f36de48c116ebb5737acf377c27a665fcd1bf86c12ef
SHA512abbf50cb2966bcf6d7d96922010a8bb16ca8437d84f3f9728012e534623850add05a8454fb852f02fcb1409b535b96d1f01a941912218fa613d47df93754a320
-
Filesize
407KB
MD5a03f171bd36eca64073819f8a3d9c77b
SHA120d93aeeb9ba4220dbc8b3cb6621f574b50a3454
SHA2564a10eec225b072806ad1f36de48c116ebb5737acf377c27a665fcd1bf86c12ef
SHA512abbf50cb2966bcf6d7d96922010a8bb16ca8437d84f3f9728012e534623850add05a8454fb852f02fcb1409b535b96d1f01a941912218fa613d47df93754a320
-
Filesize
407KB
MD58efc275d1f2c2d93cdb2c520cabc14d1
SHA1878e7438e88c0b581e7fcfc58b3c7c2c979e8f98
SHA2563527d5718d93cfc906af802552c8c4147f1a800e741f5200611cf9372aa2772d
SHA512c9228b2ddea81c94b360142b049b6de762826d8304f1b8c076aa41474411f483e58792193b5632d83e2b456e4a4300afcc697b055627f6896c4317aecbaca5bb
-
Filesize
407KB
MD58efc275d1f2c2d93cdb2c520cabc14d1
SHA1878e7438e88c0b581e7fcfc58b3c7c2c979e8f98
SHA2563527d5718d93cfc906af802552c8c4147f1a800e741f5200611cf9372aa2772d
SHA512c9228b2ddea81c94b360142b049b6de762826d8304f1b8c076aa41474411f483e58792193b5632d83e2b456e4a4300afcc697b055627f6896c4317aecbaca5bb
-
Filesize
407KB
MD533e989341885d71d81eb7d3819d74456
SHA1f451c48f5bc394e644e7a925c0ec32cd811c2195
SHA2565e954f146bd74dd8214285fecbcbcdea4b73c5db1ceeee5e5e3f996a8c176ef8
SHA512d65dd8863e513fd31cf9dfd49d9d538c0df8d9d9d44a455997b8ec61f347cda2cd5873d57ddf7ba705df70576f9359e084116a00753ef7345ee8ccb7e08eabe8
-
Filesize
407KB
MD59b61459d187c9839d479e1434f418158
SHA1db7b948afb5f4cb979c24ab78efb1d61ad8c77da
SHA2568df677da8b2554ae7189bf06d3e15cb38cf6634c39ff8c660ae0815f4867bfea
SHA512d1dc6eb7e464adf3e20b0673b53a0dbe3c41e8cc69c62ff16b702a08b9d97aa2d9ff904a705183333a8995defd0d9d714645cf589aae0318099d46edfe6006ba
-
Filesize
407KB
MD59b61459d187c9839d479e1434f418158
SHA1db7b948afb5f4cb979c24ab78efb1d61ad8c77da
SHA2568df677da8b2554ae7189bf06d3e15cb38cf6634c39ff8c660ae0815f4867bfea
SHA512d1dc6eb7e464adf3e20b0673b53a0dbe3c41e8cc69c62ff16b702a08b9d97aa2d9ff904a705183333a8995defd0d9d714645cf589aae0318099d46edfe6006ba