Analysis
-
max time kernel
159s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 04:35
Behavioral task
behavioral1
Sample
NEAS.5896424208b7d73422d34670a7930990.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.5896424208b7d73422d34670a7930990.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.5896424208b7d73422d34670a7930990.exe
-
Size
237KB
-
MD5
5896424208b7d73422d34670a7930990
-
SHA1
173117585e43c1f4aa81ad4583833699b220089f
-
SHA256
adc3feb1749f9588df1709944c51c378ba2f7674084bf5311a189bbdd0eb7082
-
SHA512
0c51d372c375aac1e8deaa2ae13b9e5ac53b0324e464ed07c53396eb5adb69dd29799925d48f4b48d278d27aefd5f36f8f1d51b2ba7c7796485127a260ca2a4d
-
SSDEEP
1536:9RsvcdCQjosnvnjs6SQ1EVrPdDG/PEzxVJsPcbYDOYrmwd8eCwe5cJ4a:LsKjRvnhSGYB0EzXJsPcEDOHDzF55a
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Malware Backdoor - Berbew 3 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0009000000022d03-6.dat family_berbew behavioral2/files/0x0009000000022d03-11.dat family_berbew behavioral2/files/0x0009000000022d03-9.dat family_berbew -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation NEAS.5896424208b7d73422d34670a7930990.exe -
Executes dropped EXE 1 IoCs
pid Process 1792 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.5896424208b7d73422d34670a7930990.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.5896424208b7d73422d34670a7930990.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF NEAS.5896424208b7d73422d34670a7930990.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe 1792 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1792 1448 NEAS.5896424208b7d73422d34670a7930990.exe 90 PID 1448 wrote to memory of 1792 1448 NEAS.5896424208b7d73422d34670a7930990.exe 90 PID 1448 wrote to memory of 1792 1448 NEAS.5896424208b7d73422d34670a7930990.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5896424208b7d73422d34670a7930990.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5896424208b7d73422d34670a7930990.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD580dc05ce3fb73a48960305caabc20166
SHA1c867ea07fa9d2b281ec526caca4d74e4cf4eefcb
SHA2565700ee19cfc182b8d1873120aab0f5da70ef3d6db02072478b7011b548ecb778
SHA51237f87608bf95dd305485db03c71c39de08ca756ddec6681494570d2f81414caf38b7b49be7380473584999eedf28075ca1c21e047e9d5704be29c121a2d65e61
-
Filesize
237KB
MD580dc05ce3fb73a48960305caabc20166
SHA1c867ea07fa9d2b281ec526caca4d74e4cf4eefcb
SHA2565700ee19cfc182b8d1873120aab0f5da70ef3d6db02072478b7011b548ecb778
SHA51237f87608bf95dd305485db03c71c39de08ca756ddec6681494570d2f81414caf38b7b49be7380473584999eedf28075ca1c21e047e9d5704be29c121a2d65e61
-
Filesize
237KB
MD580dc05ce3fb73a48960305caabc20166
SHA1c867ea07fa9d2b281ec526caca4d74e4cf4eefcb
SHA2565700ee19cfc182b8d1873120aab0f5da70ef3d6db02072478b7011b548ecb778
SHA51237f87608bf95dd305485db03c71c39de08ca756ddec6681494570d2f81414caf38b7b49be7380473584999eedf28075ca1c21e047e9d5704be29c121a2d65e61