Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 04:49
Behavioral task
behavioral1
Sample
d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe
-
Size
672KB
-
MD5
d67cd03e6868d06deff1606dc1ce6750
-
SHA1
8d419a5e013ff999ded2971292ba29d21f580dd1
-
SHA256
6884729dabe92b1ae25f7031ab534881d14bdd4535da1e90797310a777274f5b
-
SHA512
7cb7ea6fc05725810d72238d53e19569ffbca82920c6874fd07330e043b348b75ea4cb9497fe751b0ea163266d2b884a371108d1601ad0badc85e43b3237f7db
-
SSDEEP
12288:29Bm+95nHfF2mgewFx53DEaHnL3TonTpT7xWQ1kfgjdkAqUKkD57lc0fzEV/d9Ru:29Bz95ndbgfx53DXzTSp/2gjTqUKkD5t
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x000c0000000136fc-2.dat family_berbew -
Deletes itself 1 IoCs
pid Process 1732 253C.tmp -
Executes dropped EXE 1 IoCs
pid Process 1732 253C.tmp -
Loads dropped DLL 1 IoCs
pid Process 1756 d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1732 1756 d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe 28 PID 1756 wrote to memory of 1732 1756 d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe 28 PID 1756 wrote to memory of 1732 1756 d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe 28 PID 1756 wrote to memory of 1732 1756 d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\253C.tmp"C:\Users\Admin\AppData\Local\Temp\253C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\d67cd03e6868d06deff1606dc1ce6750_NEIKI.exe 24F7DE5F3A7126F8E4D38C621D70B556B3FF136398D36F195577E1D62D13E73C20114ADFB192CDF928D0B51BED2205CC64B9F1604FA17C672FF004B58E619C702⤵
- Deletes itself
- Executes dropped EXE
PID:1732
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD52be26cf074195bb154b1256b7b6f9231
SHA12429cccae31478994facbce7c96c04ee294a597c
SHA256a1b15f0db83e2144ffa1903054faef85d1f3f96e5763a8e15dc4726a95767bcf
SHA51256878a592144989c3d093b90302b3acd393bbc2b27fb1d5d98ad1ca40da00e186cd9b773773862a6b578779cf0ddce9e11bdc18ea40318caa79858bbf1ecafdf