Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 18:46

General

  • Target

    414d4cf562af0c9eaca881230ccdb370_NeikiAnalytics.exe

  • Size

    199KB

  • MD5

    414d4cf562af0c9eaca881230ccdb370

  • SHA1

    4ce444f4a2adcbddd5d866091875bca5804c164b

  • SHA256

    f9b1401504ad4ad03638674eba71f8a1ff969ba8fbea6eda845c943c5102baf8

  • SHA512

    7c81be802e59b36fefe51558b25c6d9a2538c8b98aaa140991acc36e4df57bf495bfa487364f4d20850dec9f58bd3497794fb6daa4ebdf1cfb9ee597bee8b590

  • SSDEEP

    6144:3jXH4JJc9AySZSCZj81+jq4peBK034YOmFz1h:37im9IZSCG1+jheBbOmFxh

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 36 IoCs
  • Malware Dropper & Backdoor - Berbew 18 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 18 IoCs
  • Drops file in System32 directory 54 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\414d4cf562af0c9eaca881230ccdb370_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\414d4cf562af0c9eaca881230ccdb370_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\Mdkhapfj.exe
      C:\Windows\system32\Mdkhapfj.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1816
      • C:\Windows\SysWOW64\Mgidml32.exe
        C:\Windows\system32\Mgidml32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Windows\SysWOW64\Mjhqjg32.exe
          C:\Windows\system32\Mjhqjg32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2340
          • C:\Windows\SysWOW64\Mncmjfmk.exe
            C:\Windows\system32\Mncmjfmk.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:5108
            • C:\Windows\SysWOW64\Mcpebmkb.exe
              C:\Windows\system32\Mcpebmkb.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1224
              • C:\Windows\SysWOW64\Mjjmog32.exe
                C:\Windows\system32\Mjjmog32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4752
                • C:\Windows\SysWOW64\Maaepd32.exe
                  C:\Windows\system32\Maaepd32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:5112
                  • C:\Windows\SysWOW64\Mcbahlip.exe
                    C:\Windows\system32\Mcbahlip.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1012
                    • C:\Windows\SysWOW64\Nnhfee32.exe
                      C:\Windows\system32\Nnhfee32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4360
                      • C:\Windows\SysWOW64\Ndbnboqb.exe
                        C:\Windows\system32\Ndbnboqb.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:4504
                        • C:\Windows\SysWOW64\Ngpjnkpf.exe
                          C:\Windows\system32\Ngpjnkpf.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2344
                          • C:\Windows\SysWOW64\Nqiogp32.exe
                            C:\Windows\system32\Nqiogp32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4960
                            • C:\Windows\SysWOW64\Ngcgcjnc.exe
                              C:\Windows\system32\Ngcgcjnc.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:4312
                              • C:\Windows\SysWOW64\Nbhkac32.exe
                                C:\Windows\system32\Nbhkac32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:3832
                                • C:\Windows\SysWOW64\Ncihikcg.exe
                                  C:\Windows\system32\Ncihikcg.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:1260
                                  • C:\Windows\SysWOW64\Nbkhfc32.exe
                                    C:\Windows\system32\Nbkhfc32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:1480
                                    • C:\Windows\SysWOW64\Ncldnkae.exe
                                      C:\Windows\system32\Ncldnkae.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:4648
                                      • C:\Windows\SysWOW64\Nkcmohbg.exe
                                        C:\Windows\system32\Nkcmohbg.exe
                                        19⤵
                                        • Executes dropped EXE
                                        PID:3852
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 400
                                          20⤵
                                          • Program crash
                                          PID:4872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3852 -ip 3852
    1⤵
      PID:2964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Maaepd32.exe

      Filesize

      199KB

      MD5

      4e481cd97a6c2acdacd47db403675c63

      SHA1

      d8564b3364dd139ca206176654a77a4d5e4e7c68

      SHA256

      c0aa436c412dba71968f9fd625cbe746d200c0ef436df65f42f43e5380794570

      SHA512

      2ed8161c80b5c02064a1a52bd899fadc97999eeff5b2df36c7f9b8e8aa5906910ef0640beb2ccb3f7a863d0f2839f6eab2616f1b306f92e8fa195c924cc60efd

    • C:\Windows\SysWOW64\Mcbahlip.exe

      Filesize

      199KB

      MD5

      fea3d8fd28ed4bc9ee76285627ace8ec

      SHA1

      869c2cf235f5ee255ddacf20dbb9e866fddde859

      SHA256

      2dac6cbbf3a4f9a7574f724f4a9c3f05c3c1608f75cfc8129853fa33f6637258

      SHA512

      3cb2ade5dbeffd1392afd64aaadfb20a2a6b1a6aafb0e31f2e3321ae55d663c88f61e93c1070ba1c3a424f910d53b642acca8010fa06a8be3e8cf01a0b60d7eb

    • C:\Windows\SysWOW64\Mcpebmkb.exe

      Filesize

      199KB

      MD5

      84af633505c962a043430446f73c8332

      SHA1

      bc87b1862cd667ecb76159c08b8bfe9dd0751ab9

      SHA256

      f5aa669c602daca08f177348bc771755ce52ee20bc1199fc231e974c32521bbd

      SHA512

      1d1190ae6fddf239aefdabae266ad1c761b3c6784434a35bc59173a781e7ad78bc01a029391cd44df76d63b09194dd3028269175ca227b3b4523afef472194b3

    • C:\Windows\SysWOW64\Mdkhapfj.exe

      Filesize

      199KB

      MD5

      a70f05cf8699854881707e55f44170ed

      SHA1

      e2d9a182dd7b3ffca8f5676db6574ef0aa2b0bc5

      SHA256

      09e7d2e6203b8ca70bc58fa4fbfe891cb712d2ec9587a20af3196178f0c7bc76

      SHA512

      8fcffedb362303f205ca7ac6c0f180964f2e57e04ae2d929aa5c0e62ff7cb8241f319d742534017d4a9a0b9386a4a968d2da818036deb7d1a371bc57732a0f1f

    • C:\Windows\SysWOW64\Mgidml32.exe

      Filesize

      199KB

      MD5

      6d1be1cb09345cbabf50b8977ed03896

      SHA1

      122352377f90f46260caded66d814e4c5cb7eba2

      SHA256

      2db2e149e737cc1c65e0625f7373aa9301f39467692b58ab400c0a5426171d5b

      SHA512

      23b769fb8ec268ae6e1c010b73e1b4b91ca1c5fd141eab1328489cc010e96fcf286792542f72c20514f024183b895514c8a090743b26f4315881ccd9a16fd628

    • C:\Windows\SysWOW64\Mjhqjg32.exe

      Filesize

      199KB

      MD5

      ca82f0eb6c8b25674c54b2e4271d2dc7

      SHA1

      a8cc33470e68b03c1450a027713f96c0648929d7

      SHA256

      b7cc54141478c6037fe5a28eb6a4274899a7dc545cd2d351f1a68e94a65a02f7

      SHA512

      0650a84e24dbf1522c02bee43437ee7b7d8ca039e969089fcfc298a5f3f644bc5f3f8c3696e40fee28be910f2c8cb75147450fa33bcf13f8a22035b82c3e2efd

    • C:\Windows\SysWOW64\Mjjmog32.exe

      Filesize

      199KB

      MD5

      5b0fcbf943c881360abca40ab7121e0f

      SHA1

      63de96077a730cf675c983471d4a5dee2b539e36

      SHA256

      c9a1b73d1dee042813ea85f5a57376b969fba2c8b1f29de50d7847e96536ec63

      SHA512

      0f61c934e4a5e28277be173dc0a7b1458a0fdd7acf1f254ca87ea113a1c073e8aa3bdefbc522b66419df89dc1389f0ecb9cf96f974c694ce0abba38f7a7eb3e4

    • C:\Windows\SysWOW64\Mncmjfmk.exe

      Filesize

      199KB

      MD5

      56b1fefa0e339f1129e7bf5123ff2454

      SHA1

      7ea436b577796c4d5a2fac369aa7c55528728923

      SHA256

      9e8183abb574016323689ab87fdfb45128ea994cf12441f55e75a756d5f558e0

      SHA512

      2befa6c787ede704fcd42ecbd61d1aa4d232e0db9ab09fea1d2e544d796ed3416eca2633ea7363e49b88520f6de98e57d868e93d946bab1a2b4b6c1106f7781a

    • C:\Windows\SysWOW64\Nbhkac32.exe

      Filesize

      199KB

      MD5

      4dbef3d4ba12fae23759d1670e640474

      SHA1

      ac91b6454bbb8016c8375961f543a8b6e6edcc2e

      SHA256

      29830d4869c9c2af72d76f42eb88bb5dc2f3c7446934196ae372104b4d64e69a

      SHA512

      8fc6453b131f80ce442eabe9cec45bbf6f6360b209af7c2a4adde3073a6e27d9cc1bdf8272dbabe1a85b3737c075dbdfa5262a23074e70f5642e1efdd39cea25

    • C:\Windows\SysWOW64\Nbkhfc32.exe

      Filesize

      199KB

      MD5

      91ffc5b21c833afdfc28e0f0d69ee571

      SHA1

      e47a2e6364bc4d47a0f61c2fa581dd11d80eace3

      SHA256

      1f7cad6d9ec6e4099ceef385928a863a1db3b237da43bb82eeeaafc824cbd0d3

      SHA512

      129ffab6185a6121b7321b6b6410b511b40a23630f5a35d07be8c2f8dbf9aef205df67fa51b56f83501d35142d8f82b17ba9561bebf1115bb388a9d35b2b196d

    • C:\Windows\SysWOW64\Ncihikcg.exe

      Filesize

      199KB

      MD5

      4cf1a1f6fcdce7e0c2b2039bdf628604

      SHA1

      d25ee151bad019afe10a2dea86aa28b8e1326436

      SHA256

      e507377f550a9474bb4e94b7f4518b26b13f49756c91988dbbb39d07ba778162

      SHA512

      8414ee6f3196352f0a621f9059830d4051fc588dce1be0dd42fa728a04ba86ae6b07d277102a19b779e75ae4a21243ef2f83eb56387353ac78adff052375b9e4

    • C:\Windows\SysWOW64\Ncldnkae.exe

      Filesize

      199KB

      MD5

      0a252208aa1f2a5316712a579543e1e4

      SHA1

      32052fee7d1ebbe82e64e84d9264d41a6f1d55cb

      SHA256

      8cbdb99e325ddbbc734f2ec006f54b0e1856f2b6e759630e22398a6fc4526fb0

      SHA512

      431d2c2df565e10d47ca9e8e890df61002a6f15a1c096ceb9a9ff3faf8f8b38372915d52be7b178fa3efb62d9211046c1ba32e688ebaf5cbcccdf3fd232c4071

    • C:\Windows\SysWOW64\Ndbnboqb.exe

      Filesize

      199KB

      MD5

      b716081c6e1209bc05c3df0ba8404753

      SHA1

      1abc3bc68cf346af19704ed106d9a25d44952486

      SHA256

      7d55f58ea66ed7372499bdb803c6ac6930fff6b322544c0c40111595ec36c1e0

      SHA512

      7b19f97bfb8539b9308ed2925ae58bda590a11b68d58172069e2096dbc6f3752f0de5ad1fa702c528075293c6a4b732d7bb105a961fe50988d26afed29f31d2c

    • C:\Windows\SysWOW64\Ngcgcjnc.exe

      Filesize

      199KB

      MD5

      e19d110b686362f33871fa3b78acf8e8

      SHA1

      f36cadf448ef37893b27eeb3468efcc33b863125

      SHA256

      609ee73fdc07ed8e0b4babedea30d2881b7490f0d181bc8fcb8bc8a2199fb827

      SHA512

      398fa72fcf7a2ece8fe6abcdcda623cc1f4377c5462e8425d965486fba3b6183cfa71e36243aca63fe786214627d8cc6776e90d40176848809b3f59a76332845

    • C:\Windows\SysWOW64\Ngpjnkpf.exe

      Filesize

      199KB

      MD5

      25e66fff93c65d1afb9d0a14b555d70f

      SHA1

      f589b4195a9020193f53e2890ec71a061ea61909

      SHA256

      ef6f61cd78353c671f6bb62b0f8e6da874840fd09ed3aa150081aec5a6a23a90

      SHA512

      25144edda2707d2fe71344edef7302a21cf25c91c49b900d83fe2affa36cb8936ca40a6c8deb796496304564f2070c47f5bc5ccee5023ecbfda10bc95e522dd2

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      199KB

      MD5

      d5d624bec873b386e638e0721e5a8b1c

      SHA1

      422f9de5ffdb312dbeef283feb7fc9a0b0255e91

      SHA256

      5691c530f46d07a32ab97ca6e6a2500142061b1b966db41179f25a9502199332

      SHA512

      a504677e26b03997711d77982f0fb5e5984ce122206ec6364b9250fc07e4d590f4a24c736ef2fe0afd70fac4dfd066825b63da2c5bf751aef156ba1d686ee779

    • C:\Windows\SysWOW64\Nnhfee32.exe

      Filesize

      199KB

      MD5

      7ec399aabf539a064fb0125afe986b01

      SHA1

      f5d42fe861c15f39a01f04f8d5e74a357ef7d297

      SHA256

      a21ca7cc06f55e8535a2e251e1a36a198a63f1ce5c18eee5b7851d17930c8ed6

      SHA512

      13bdea78e639f3afa4ac6602a55bb479dd3162d4785a685ab2573f361bda33116b1adbab1e9299bd236cd0d8ccb0a6f478efafd3853a2e4e55f0cd0843fe3e6a

    • C:\Windows\SysWOW64\Nqiogp32.exe

      Filesize

      199KB

      MD5

      d6a0f4ade58c111f58f1228edfc5b75a

      SHA1

      6079843a0c6635f3965ab8be2e38c33b2b978cef

      SHA256

      5a3bf6153168ccde3dd17cc5396a0f02faa49dc8a2ec6dceebedaeb1e35a4fbb

      SHA512

      971039c2903333425238cfa781ac54092cb44d75b431ab122fa747f5acb0244cfa91b75ef11a3c9956b53093b57f44297551c3bb6d0474e9b79a1b18f7a2c69e

    • memory/952-160-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/952-16-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1012-156-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1012-64-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1224-158-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1224-41-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1260-121-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1260-149-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1480-129-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1480-148-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1816-161-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1816-9-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2340-29-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2344-89-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2344-153-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2908-4-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2908-5-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/2908-162-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3832-150-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3832-113-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3852-146-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3852-144-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4312-151-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4312-105-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4360-73-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4360-155-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4504-154-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4504-81-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4648-137-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4648-147-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4752-54-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4960-152-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4960-97-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/5108-159-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/5108-36-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/5112-157-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/5112-56-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB