Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 20:45
Behavioral task
behavioral1
Sample
2f9938704352db51d15f25037da26080_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
2f9938704352db51d15f25037da26080_NeikiAnalytics.exe
-
Size
480KB
-
MD5
2f9938704352db51d15f25037da26080
-
SHA1
6d875d12965cf31e8ecdb8085328974983c239e0
-
SHA256
ff2eb4afd9d5d590b96d5f59ad3a6f4b2ce2228f716a174d50b4f14a975c2df9
-
SHA512
65eafad136e9e674e0c8075539f46ceacf9e282d8bc9f03b802956d8b6fea96059fb7b56246971dc4e2b70e900438fd324fbba71df4648f97e29962f3075b550
-
SSDEEP
12288:Y4lCjJCqtHyS/lAWdlVe91W1BUAn1Mo7a:9CjJttHyMlAWdlVe9YyV
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 5 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/1500-0-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/1500-6-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000b000000023402-5.dat family_berbew behavioral2/memory/2264-7-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/2264-13-0x00000000014C0000-0x0000000001507000-memory.dmp family_berbew -
Deletes itself 1 IoCs
pid Process 2264 2f9938704352db51d15f25037da26080_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 2f9938704352db51d15f25037da26080_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5096 1500 WerFault.exe 82 184 2264 WerFault.exe 90 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1500 2f9938704352db51d15f25037da26080_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2264 2f9938704352db51d15f25037da26080_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2264 1500 2f9938704352db51d15f25037da26080_NeikiAnalytics.exe 90 PID 1500 wrote to memory of 2264 1500 2f9938704352db51d15f25037da26080_NeikiAnalytics.exe 90 PID 1500 wrote to memory of 2264 1500 2f9938704352db51d15f25037da26080_NeikiAnalytics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f9938704352db51d15f25037da26080_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2f9938704352db51d15f25037da26080_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 3962⤵
- Program crash
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\2f9938704352db51d15f25037da26080_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\2f9938704352db51d15f25037da26080_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 3723⤵
- Program crash
PID:184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1500 -ip 15001⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2264 -ip 22641⤵PID:3568
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5b1edfd4c1b7de5b313a18f8e95cfc740
SHA1716102d585573a326a9fa38cbe4a00b6525f784e
SHA256cb21f4ff56b182561ae14cd84f1ea024e708d34047a6eab5e3a0b670f04f5320
SHA51270138d6c7e9a9ab35897871a19e6fe11ef6e44dc757a3e8b55adc11dc12de568fff0af6ce45523c3742210d435a77ed618b301ae461e237a08010e32c24ca0e5