Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 21:51

General

  • Target

    10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe

  • Size

    143KB

  • MD5

    10c5b1dfe80dbc4aee5b0218f985bdb0

  • SHA1

    18b9e9215f3cd027837f2d592fa7e1d4ac35fd93

  • SHA256

    0aeaba709710e722d2b5221ed70b407ffb172bee91e5860b9eeb14fc764ed5d7

  • SHA512

    93a266a62faa9bffbc682aafc4d586b74a4f4a08fb43f98626c616b08cf3f62505b73c8406af384460808cc5a90c9c6fdf531de7ddd721df00bfc4b3bd93c074

  • SSDEEP

    3072:23Yqp6QHbSc2dHGReRRXIu5PR5idF3N93bsGfhv0vt3y:FE6QHbSc2dHGReh5P2dF3vLsGZv0vti

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
  • Malware Dropper & Backdoor - Berbew 41 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 14 IoCs
  • Drops file in System32 directory 42 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\Mpdelajl.exe
      C:\Windows\system32\Mpdelajl.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4388
      • C:\Windows\SysWOW64\Nkjjij32.exe
        C:\Windows\system32\Nkjjij32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Windows\SysWOW64\Njljefql.exe
          C:\Windows\system32\Njljefql.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Windows\SysWOW64\Nqfbaq32.exe
            C:\Windows\system32\Nqfbaq32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2232
            • C:\Windows\SysWOW64\Ngpjnkpf.exe
              C:\Windows\system32\Ngpjnkpf.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1672
              • C:\Windows\SysWOW64\Njogjfoj.exe
                C:\Windows\system32\Njogjfoj.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4752
                • C:\Windows\SysWOW64\Ncgkcl32.exe
                  C:\Windows\system32\Ncgkcl32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3252
                  • C:\Windows\SysWOW64\Njacpf32.exe
                    C:\Windows\system32\Njacpf32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3628
                    • C:\Windows\SysWOW64\Nnmopdep.exe
                      C:\Windows\system32\Nnmopdep.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1752
                      • C:\Windows\SysWOW64\Ncihikcg.exe
                        C:\Windows\system32\Ncihikcg.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3200
                        • C:\Windows\SysWOW64\Nnolfdcn.exe
                          C:\Windows\system32\Nnolfdcn.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2344
                          • C:\Windows\SysWOW64\Nqmhbpba.exe
                            C:\Windows\system32\Nqmhbpba.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:3844
                            • C:\Windows\SysWOW64\Ncldnkae.exe
                              C:\Windows\system32\Ncldnkae.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:4736
                              • C:\Windows\SysWOW64\Nkcmohbg.exe
                                C:\Windows\system32\Nkcmohbg.exe
                                15⤵
                                • Executes dropped EXE
                                PID:4576
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 400
                                  16⤵
                                  • Program crash
                                  PID:3372
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4576 -ip 4576
    1⤵
      PID:3788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Mpdelajl.exe

      Filesize

      143KB

      MD5

      e2ecaf4ff1b574490aa41f57b63d0b10

      SHA1

      639e21367f7c9d002413b244edb337dce88947a1

      SHA256

      c849494c67960cc8f5009efab57401d056e5696da4ca6073fd5751900de0c3e7

      SHA512

      9b54840cd5b993b010ea137c2f5b2867d5f4ae61948f7c08194e0b54b1a5d14f13e460b799a08f5cf5a5107be6d9b87213be800b4da2a2a524301ebebc090888

    • C:\Windows\SysWOW64\Ncgkcl32.exe

      Filesize

      143KB

      MD5

      a0617aea1763f69051628b627be5c919

      SHA1

      48889a9b4bcd844a96565ac5bed7422dc003dd4a

      SHA256

      7eb107e2be78af3b05e785df930aa1842594c285506790b7bb4c8ac794da120b

      SHA512

      6de4e6fd52137ed5e04b0e325dad96d7ea27f48225f8d41ba17d2e5a82bbb1f180d8769edfecda4198b5d332d9b931647455c1cb88a5d6ae0345258459ca7e96

    • C:\Windows\SysWOW64\Ncihikcg.exe

      Filesize

      143KB

      MD5

      cf9b4d9102d518494ace3c4949628aec

      SHA1

      406d410d51c70416b13c9c99da984838ea9f48fc

      SHA256

      ecf1a0038d780923a72c42c4f73e14d56cde25b90f1b1388d4ec529c0b5482b5

      SHA512

      45e72bec33745f51df730577eae451bec2234fe3f43b9a93864061fcf53e5dcbe6624288d4403b260a5681ce2b6f1446aa20ee13e40286d0e8d1c395c5e9acd5

    • C:\Windows\SysWOW64\Ncldnkae.exe

      Filesize

      143KB

      MD5

      8fe673a573d330c19e168a013c083787

      SHA1

      aece292f5a210caeee86d57bc97fde7916b8f0ca

      SHA256

      db8fde4f75e7e5271cbda7c9b53d7b219f171068e59d9c09444215a1058faab9

      SHA512

      2fa951f4186385332bbc6b4dcda4e6827bd0819bc96683219f686de82e28f2a812b88563cfe96cde40f9a7aa25feb02379817ce7164e976a04f31545cb384ddb

    • C:\Windows\SysWOW64\Ngpjnkpf.exe

      Filesize

      143KB

      MD5

      12ae5f5808c047bcbaa4e74764b4fbc8

      SHA1

      5887b71cbf132a276e4c0f4fc9e8db18cde0efa1

      SHA256

      659d51aa5a01023f29ed7747e673b72403025e488c541b614ff8176386e44819

      SHA512

      e53a2fe730b25a6c58d621d5c0195b232c8bf9960789873e5be4ee4572d81d6765c31b95f28246b9c7df004e5d442d7778ed7e7d7f76c95ce8442d0ca151c82b

    • C:\Windows\SysWOW64\Njacpf32.exe

      Filesize

      143KB

      MD5

      93e1e3b3ada19589d94163df12b3bfb7

      SHA1

      797b1b2eb52898709da4a0fc400c452008031f99

      SHA256

      3101023a9dca9c0d630db0124fd22204f843d479da38a7d66399cef0f6a92e91

      SHA512

      06b820677bffe9394878030c8d744d5f22bb532111a82aaa09b4073f62584fc7065a4ec5824129383698d62d147bd712eccfd8c26646a08afcc2c237fb26a368

    • C:\Windows\SysWOW64\Njljefql.exe

      Filesize

      143KB

      MD5

      a32cd88d1f74a22bc5661dbfdbef8303

      SHA1

      ba7653498977521a93a535539f2d77c51b4fda56

      SHA256

      2377841aedb1c6ef42e8039bf5b58571ada712f4137c47c3db51dd2ad61b4107

      SHA512

      e1916907806c4b2ceebdde74015d8fddec0d2323c76415978bcf27b29fa458cd8e412113bd41e5ba01470a679ccdc2343322889eb5f5bc7454145c1cfea8c37f

    • C:\Windows\SysWOW64\Njogjfoj.exe

      Filesize

      143KB

      MD5

      48e9cbad01d99d1247bc63a4e3941a8b

      SHA1

      cf35e5424b9a5b7da38c10b6275127996fe06e9d

      SHA256

      dd3164fff58b056deea6c19589a226488124beb29bd23a1ec39ea82cb58d01db

      SHA512

      e35a3a646baef185566edcca6e851f7e7744a2ce111358f40b7e6601e7bfd6b59d15a8470b868e769df801f5c00c716a9ba5e8914350f8367f8ef9cddcfd7e56

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      143KB

      MD5

      7bf97bafdc05c4e35001615cead29ac7

      SHA1

      7fc10d73ab294acd12e0855cefe9deb59403a02e

      SHA256

      63e75dd215392509ef1130631ff7d0ca62e93037f0ebea3e48a370dd114817d8

      SHA512

      a604a4338132f6ee7d9012faeffad5a85cf58417568292d55fdffb2697733eaf358fcec0b062af4e7913de9ecd3a7c6a8686a180e37cee4199c789c952ab84f8

    • C:\Windows\SysWOW64\Nkjjij32.exe

      Filesize

      143KB

      MD5

      e648f82ced7fa5ed2703bfc4a9aef167

      SHA1

      15a87a8116434641007269a46bcc4f26b960700f

      SHA256

      67b6689cb4723b08175e5aab1ea35a3291fc0432276c671adcd335a2cd56ebbe

      SHA512

      c24d0b9809f0828bbc70d396ada3264f9ca2c6fdc3b89859260765c5165c1fe6d1cebf487667b6ea6bf1bb691ddfd050efc406761c4826f4e51c915ba0c46369

    • C:\Windows\SysWOW64\Nnmopdep.exe

      Filesize

      143KB

      MD5

      66cf4860e0adf132f406bfb06b73cab1

      SHA1

      62065529ca4f1fd9af00cc0476580f9e876487d5

      SHA256

      d07ab1ca1a543e873efa94628873aecad8338f35253f74e63be9e9ec3756dcda

      SHA512

      34800cf1b7d7e7f8b8c25b012eba304a45ecc062c24fc21b7bf194125a49da20c4b9416f41499001d17c803c9567ff6a1964e4ec8ee8c51b263705ac6cd27b30

    • C:\Windows\SysWOW64\Nnolfdcn.exe

      Filesize

      143KB

      MD5

      471d2f2eca17aa99e548ba80dbdae00f

      SHA1

      6921d23d8f043a4847a233d9fd56ec69771a13c4

      SHA256

      9e6624c6596a5840e8bff40b80d3b53863413463b3ac271bb4ca2b0f37dfd108

      SHA512

      07e0c360d4a55ec023f700182579cc37104adf9d1722f959946e899ff4484a456bbf9a422ae3b4a28b233646ea692074eb0f4a10d9cde7c21df6fc8b8ef66b78

    • C:\Windows\SysWOW64\Nqfbaq32.exe

      Filesize

      143KB

      MD5

      9c54dbdc86ad5b5fbd74d53c5ac514c7

      SHA1

      51fea86b71e6a83b4a33d624c32fa7bf2a9ce69e

      SHA256

      ef28d11f5d423bd6b58e9d00f0b1ca938457564852db847bc6009cc4544e4094

      SHA512

      697f5b769300f977568d0bbfc217f76925220c4c8aed727b029b8006f4e507af3450ad33d57f3b10a523ff7942d1422fb20243eb20292f6cad14a2aa7f4b243f

    • C:\Windows\SysWOW64\Nqmhbpba.exe

      Filesize

      143KB

      MD5

      6310b5147e6a4bde641ae44b14df4ce6

      SHA1

      29e5aea254e99b4343cafa0a30890117b5cd918f

      SHA256

      1858c2171e065a5db6f2599ce3932d96a65302862e3bf1bbda6e7686ac259216

      SHA512

      ac55332969e029e0a09f8433d0391b4ded5503abc7e2809ba54bf35f0555ef7a3af015054195102700e10a38fcd774dc168414310abb53275456600562c67960

    • memory/1244-0-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1244-120-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1672-44-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1752-74-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1752-118-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2196-27-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2196-121-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2232-36-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2344-116-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2344-92-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2388-20-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3200-117-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3200-79-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3252-123-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3252-55-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3628-119-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3628-64-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3844-115-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3844-96-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4388-124-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4388-8-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4576-111-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4576-113-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4736-104-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4736-114-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4752-122-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4752-52-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB