Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 18:51

General

  • Target

    140549cfa8703b51a0df50e512f5f7c0_NeikiAnalytics.exe

  • Size

    128KB

  • MD5

    140549cfa8703b51a0df50e512f5f7c0

  • SHA1

    34f7f61217d608fab36f55cafec5ca532dc37371

  • SHA256

    55ae0f102ce2544bbf007a55e06b88cad62be40e89c726494478922198e87978

  • SHA512

    a9829b1ed914f89f89acbdccb0721969984d70c8b83a3ba199645c7ee199f283e8a0d6ff01298ca6aceadd8b066445802242c0a8bc4d66269624a150d2a90f88

  • SSDEEP

    3072:Lzum0PZbwtlK2hM/fz3XrmW2wS7IrHrYj:fxeInuXT7mHwMOHm

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 18 IoCs
  • Malware Dropper & Backdoor - Berbew 9 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 22 IoCs
  • Drops file in System32 directory 27 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\140549cfa8703b51a0df50e512f5f7c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\140549cfa8703b51a0df50e512f5f7c0_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\Hiqbndpb.exe
      C:\Windows\system32\Hiqbndpb.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\Hgdbhi32.exe
        C:\Windows\system32\Hgdbhi32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Windows\SysWOW64\Hpmgqnfl.exe
          C:\Windows\system32\Hpmgqnfl.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Windows\SysWOW64\Hpocfncj.exe
            C:\Windows\system32\Hpocfncj.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2516
            • C:\Windows\SysWOW64\Hjhhocjj.exe
              C:\Windows\system32\Hjhhocjj.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2536
              • C:\Windows\SysWOW64\Hpapln32.exe
                C:\Windows\system32\Hpapln32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1520
                • C:\Windows\SysWOW64\Hkkalk32.exe
                  C:\Windows\system32\Hkkalk32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1720
                  • C:\Windows\SysWOW64\Ihoafpmp.exe
                    C:\Windows\system32\Ihoafpmp.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2780
                    • C:\Windows\SysWOW64\Iagfoe32.exe
                      C:\Windows\system32\Iagfoe32.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:2956
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 140
                        11⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:1376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Fenhecef.dll

    Filesize

    7KB

    MD5

    4077c1328171ddc71525ea95622b11bf

    SHA1

    f1dc2a9091df825640471a9a4265df45cdf39943

    SHA256

    42fb27c58315771b57442af7bbbf1c1083bb982e4e73ea7c1e5aeffd0eb6ffb2

    SHA512

    1a669a8d2896e2540aaa7b55a2d68240a25201e9605a8e5dd45be88439dbd97ab26a6a538e405ce326f7585c03705295d8eb7018184f7b5848883de91b6b4bd5

  • \Windows\SysWOW64\Hgdbhi32.exe

    Filesize

    128KB

    MD5

    001ebb0e531f5d4aacc8d670a97912cf

    SHA1

    8eb11f2cd9dfffaf502ed1472e238fd23194afc7

    SHA256

    ace33e62acf8612443e98a21ab3d263bff610db86b87e27ebe105a1d278b0247

    SHA512

    c8e3bd9ed1bdf995ee36df6e0625c634a8b6685dbf87f179a14d47d6200a8c7470404e3fa73e8f8e88cf8d79e8499cf86bffa0985d4852d6c5365526e33afa68

  • \Windows\SysWOW64\Hiqbndpb.exe

    Filesize

    128KB

    MD5

    71568faeeb5b7626788c747cd98b7b39

    SHA1

    b9f86151a6fe112265e46652320a794c2b9e2218

    SHA256

    195fbd2c38e6d0cc42bd01f3d76dccef48a14db5ba9a0516e84beba8e1836164

    SHA512

    6a6a253e0ffef7fc6f322b737c84d4d47cc7a4f31f397b6f93f0270b5bcd9387cc5fa3c8353091f6940508dd72a41e2a1e05dbb392bb3033bdeeddb14d322fce

  • \Windows\SysWOW64\Hjhhocjj.exe

    Filesize

    128KB

    MD5

    5ee1362cc38ba68c2d473b0863846b71

    SHA1

    fd69a85d269a71bd54f491e9e84149efd2be7ed4

    SHA256

    333873efc555076006290038fc3bf01e0ac245c8715dc60b65c8fd0694f1a9e7

    SHA512

    367d374a23f0c08b136895c5446d6a457fc354f74033d8d00664a2e293d1882bb8dd509609e3786a66681485ce8666d41c4b5b3b0199f8555153b167fb4c7d7a

  • \Windows\SysWOW64\Hkkalk32.exe

    Filesize

    128KB

    MD5

    b0c8b793e64e171385a2e4f070e76ae1

    SHA1

    20c5362ec6ff8a633d4e9c8ea15ed034a1a90db1

    SHA256

    5a649fdcad9b1f12e1ab9ca54f3328f647da49060653122123b7f357e1f9f2b7

    SHA512

    ad4a20c5cc01d8f105ecf1547bcccb105afed0ab96fef6a9016112e0ce1441f973d6125a742ce6a84ea87022b927069fa88856f38d6a9940f75952ffd99dd7cd

  • \Windows\SysWOW64\Hpapln32.exe

    Filesize

    128KB

    MD5

    b8f8cc8bdc1cb901336de99ae83cc5e0

    SHA1

    f94faaade8024d775499271e87732c58300630a8

    SHA256

    63b195a4fd296d3c24fc35f72500aa922c32b6e8da18f6e16c95f49adc094849

    SHA512

    b7dcc6fd845036410fa231ed33b5196d0868123763d27a03468f30ac6758ab469d15f0818fde011c01a44ebaaedab21d840ce099b48c7cb65696b833a0645f6f

  • \Windows\SysWOW64\Hpmgqnfl.exe

    Filesize

    128KB

    MD5

    ba003d36b85c9565c4a5f4de19fde1b5

    SHA1

    3511deb61b7dc06aa8f3736eb8be078472bde4b4

    SHA256

    7b4fc593f5e5002de4ed22d887bed6d4fe491def7ea58b27e2bccf72e8a53e93

    SHA512

    40a88f4a34f5c39cd70873e719db75f7ecaec10568d35ab39cee6f77db9ba68c4f882e514865e3fbddf6016d4620ce9a744f3b260ced8f4d3d7136b20f6f6eb5

  • \Windows\SysWOW64\Hpocfncj.exe

    Filesize

    128KB

    MD5

    60b522a6b82ac3e256251fb0b3815583

    SHA1

    4f57ddb575308280574e697ccf293264f8c0e02e

    SHA256

    c09aa572e888885384c8fe0bdbe61a33bf951716464f2e12a32bcccd39ee5303

    SHA512

    eff63815a32b4aeaa6519f02688a312e4436b78d5da107b32484ffdacb9e4a979f18808666dcfd72de9d6b95efc0ca44d5ac45718063b8350d0fa979472bea4d

  • \Windows\SysWOW64\Iagfoe32.exe

    Filesize

    128KB

    MD5

    5256e2483a5589a468431392b10dd712

    SHA1

    c548e363f4e3ded9634d28d1b7e756b7c86e6728

    SHA256

    15bd631ec5f966e848d16e173b47a26db21e08e0941d7a5cf304947d19e1c8db

    SHA512

    8a60b2797d10255af107031568789d113d45d09b0c33566399bb55f3a00b992484e1a4c83290614dd5223d0f140898b9475c3bdcf8b1156e880b97a75098bb70

  • \Windows\SysWOW64\Ihoafpmp.exe

    Filesize

    128KB

    MD5

    dd55121d6f5d215df769cdd2ac48e466

    SHA1

    bab4290acd5c4660146b5d4cc9bc2c600f1c7c70

    SHA256

    53683a4582bb316d0412e95f6411ddd9b9949d74bbe2d5c6870c56ea3531f55b

    SHA512

    ee80ef13c3fe6e0c5841b7ff95d76abbaac4b3cd5a40162946f3dd5e91cfbacb84dcf4d0b28f89666e5129c199890c849b5e1f0eae6de61a1d80f295fca73826

  • memory/1520-130-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1520-79-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1520-87-0x00000000004B0000-0x00000000004F0000-memory.dmp

    Filesize

    256KB

  • memory/1720-131-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2112-33-0x00000000002F0000-0x0000000000330000-memory.dmp

    Filesize

    256KB

  • memory/2112-26-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2112-126-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2192-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2192-6-0x0000000000250000-0x0000000000290000-memory.dmp

    Filesize

    256KB

  • memory/2192-124-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2216-25-0x0000000000250000-0x0000000000290000-memory.dmp

    Filesize

    256KB

  • memory/2216-125-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2516-128-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2516-59-0x0000000000270000-0x00000000002B0000-memory.dmp

    Filesize

    256KB

  • memory/2516-52-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2536-70-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2536-129-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2552-127-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2780-117-0x0000000000250000-0x0000000000290000-memory.dmp

    Filesize

    256KB

  • memory/2780-105-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2780-132-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2956-119-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB