Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 01:36
Behavioral task
behavioral1
Sample
479f6814e183c664c1c455483cdbd7e0_NEAS.exe
Resource
win7-20240419-en
General
-
Target
479f6814e183c664c1c455483cdbd7e0_NEAS.exe
-
Size
283KB
-
MD5
479f6814e183c664c1c455483cdbd7e0
-
SHA1
c50c256b64938857c8ce48f24b3d22552f70e2d6
-
SHA256
60f3cb1036b9387b46586d4382383b7f332c4a0b34eeb15dbf5e9971a15f5a58
-
SHA512
b7e3502ef834115198ee49ab9aa67eacfd93a1b8ab786097bac9f2ea8519f8b2b6cd6b76821952dfb9001e3e13b2e73cb5d1281b812df7c1e27c947372a3c466
-
SSDEEP
6144:fTX8UhWolZjLypAJybvXKXNcMkZhP7xzFFaWJ2iMIqVC/CWPssZkVRnr5:z8UhVZfy+0bv1MkbP7hFEWtqVVWPssZQ
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x000c0000000233f2-5.dat family_berbew -
Deletes itself 1 IoCs
pid Process 4868 479f6814e183c664c1c455483cdbd7e0_NEAS.exe -
Executes dropped EXE 1 IoCs
pid Process 4868 479f6814e183c664c1c455483cdbd7e0_NEAS.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 940 4380 WerFault.exe 81 1916 4868 WerFault.exe 89 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4380 479f6814e183c664c1c455483cdbd7e0_NEAS.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4868 479f6814e183c664c1c455483cdbd7e0_NEAS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4868 4380 479f6814e183c664c1c455483cdbd7e0_NEAS.exe 89 PID 4380 wrote to memory of 4868 4380 479f6814e183c664c1c455483cdbd7e0_NEAS.exe 89 PID 4380 wrote to memory of 4868 4380 479f6814e183c664c1c455483cdbd7e0_NEAS.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\479f6814e183c664c1c455483cdbd7e0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\479f6814e183c664c1c455483cdbd7e0_NEAS.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 3962⤵
- Program crash
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\479f6814e183c664c1c455483cdbd7e0_NEAS.exeC:\Users\Admin\AppData\Local\Temp\479f6814e183c664c1c455483cdbd7e0_NEAS.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 3643⤵
- Program crash
PID:1916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4380 -ip 43801⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4868 -ip 48681⤵PID:2308
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5b51c21fe5f15cab85df3a280d9e02ea9
SHA17c8af6dc53b007864b30d14cf2d730b6360bb813
SHA2561fa4dabac98192b82282483d66c65ffed60f57a9efd2fc8beb033adfafcac7c9
SHA5125eb6dce9add97f5f20364e8914c4dc4478f9780a41cecbbb18022d34e0627cb5021e16eedbf6287af889e63c260f2f1dbaac01d14a35700c972c5b516ead274e