Analysis
-
max time kernel
152s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2023 04:35
Behavioral task
behavioral1
Sample
NEAS.5896424208b7d73422d34670a7930990.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.5896424208b7d73422d34670a7930990.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.5896424208b7d73422d34670a7930990.exe
-
Size
237KB
-
MD5
5896424208b7d73422d34670a7930990
-
SHA1
173117585e43c1f4aa81ad4583833699b220089f
-
SHA256
adc3feb1749f9588df1709944c51c378ba2f7674084bf5311a189bbdd0eb7082
-
SHA512
0c51d372c375aac1e8deaa2ae13b9e5ac53b0324e464ed07c53396eb5adb69dd29799925d48f4b48d278d27aefd5f36f8f1d51b2ba7c7796485127a260ca2a4d
-
SSDEEP
1536:9RsvcdCQjosnvnjs6SQ1EVrPdDG/PEzxVJsPcbYDOYrmwd8eCwe5cJ4a:LsKjRvnhSGYB0EzXJsPcEDOHDzF55a
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Malware Backdoor - Berbew 5 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x0031000000015ea9-5.dat family_berbew behavioral1/files/0x0031000000015ea9-9.dat family_berbew behavioral1/files/0x0031000000015ea9-8.dat family_berbew behavioral1/files/0x0031000000015ea9-14.dat family_berbew behavioral1/files/0x0031000000015ea9-16.dat family_berbew -
Executes dropped EXE 1 IoCs
pid Process 2840 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2216 NEAS.5896424208b7d73422d34670a7930990.exe 2216 NEAS.5896424208b7d73422d34670a7930990.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.5896424208b7d73422d34670a7930990.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF NEAS.5896424208b7d73422d34670a7930990.exe File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.5896424208b7d73422d34670a7930990.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe 2840 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2840 2216 NEAS.5896424208b7d73422d34670a7930990.exe 28 PID 2216 wrote to memory of 2840 2216 NEAS.5896424208b7d73422d34670a7930990.exe 28 PID 2216 wrote to memory of 2840 2216 NEAS.5896424208b7d73422d34670a7930990.exe 28 PID 2216 wrote to memory of 2840 2216 NEAS.5896424208b7d73422d34670a7930990.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5896424208b7d73422d34670a7930990.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5896424208b7d73422d34670a7930990.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5a97ef69c400bbd440e42e80c80479d5a
SHA1c0e05b860e69b2c47bdef7679ce2185c00d8e527
SHA256d4eb17f78add76247358e9ab5fe421923b8facdd5ab4d75a401e2fe618710fb1
SHA512f3d153418a79d40cc486a63b166d2b8582b40bd47988ce29082b03578903f47ae733b4ab1887c452aec368672cd7c52506a51069548ab736ef2b7a3342dc0589
-
Filesize
237KB
MD5a97ef69c400bbd440e42e80c80479d5a
SHA1c0e05b860e69b2c47bdef7679ce2185c00d8e527
SHA256d4eb17f78add76247358e9ab5fe421923b8facdd5ab4d75a401e2fe618710fb1
SHA512f3d153418a79d40cc486a63b166d2b8582b40bd47988ce29082b03578903f47ae733b4ab1887c452aec368672cd7c52506a51069548ab736ef2b7a3342dc0589
-
Filesize
237KB
MD5a97ef69c400bbd440e42e80c80479d5a
SHA1c0e05b860e69b2c47bdef7679ce2185c00d8e527
SHA256d4eb17f78add76247358e9ab5fe421923b8facdd5ab4d75a401e2fe618710fb1
SHA512f3d153418a79d40cc486a63b166d2b8582b40bd47988ce29082b03578903f47ae733b4ab1887c452aec368672cd7c52506a51069548ab736ef2b7a3342dc0589
-
Filesize
237KB
MD5a97ef69c400bbd440e42e80c80479d5a
SHA1c0e05b860e69b2c47bdef7679ce2185c00d8e527
SHA256d4eb17f78add76247358e9ab5fe421923b8facdd5ab4d75a401e2fe618710fb1
SHA512f3d153418a79d40cc486a63b166d2b8582b40bd47988ce29082b03578903f47ae733b4ab1887c452aec368672cd7c52506a51069548ab736ef2b7a3342dc0589
-
Filesize
237KB
MD5a97ef69c400bbd440e42e80c80479d5a
SHA1c0e05b860e69b2c47bdef7679ce2185c00d8e527
SHA256d4eb17f78add76247358e9ab5fe421923b8facdd5ab4d75a401e2fe618710fb1
SHA512f3d153418a79d40cc486a63b166d2b8582b40bd47988ce29082b03578903f47ae733b4ab1887c452aec368672cd7c52506a51069548ab736ef2b7a3342dc0589