Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 07:41
Behavioral task
behavioral1
Sample
d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe
-
Size
664KB
-
MD5
d4f6ff430554f03ff243cb3411ada820
-
SHA1
78032bece3b62baf8650b9068649cb721f503437
-
SHA256
09e532a9ff0607aa914a56627993d9c6a3cfbe63b0dd89d59c0a1666e825e5e8
-
SHA512
9d8bdd5a57ec06a338de1f67793aafbe4c7896102e5d7e651577e54c6288cb404f990762e1c976f17dbe7c91806472fc6aa68913e8ba0517c832a38052c5ef37
-
SSDEEP
12288:pYIW0p98Oh8P7h8K/+HH99mZp2As80fnb2ZrRsq2dVNLlgjOETn4/5BWpUohOqH:dW298E8ucwHqr2t21RsqONLlgjOETn4a
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x000b0000000122ee-1.dat family_berbew -
Executes dropped EXE 1 IoCs
pid Process 2680 10B3.tmp -
Loads dropped DLL 1 IoCs
pid Process 2424 d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2636 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2680 10B3.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 WINWORD.EXE 2636 WINWORD.EXE 2636 WINWORD.EXE 2636 WINWORD.EXE 2636 WINWORD.EXE 2636 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2680 2424 d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe 28 PID 2424 wrote to memory of 2680 2424 d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe 28 PID 2424 wrote to memory of 2680 2424 d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe 28 PID 2424 wrote to memory of 2680 2424 d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe 28 PID 2680 wrote to memory of 2636 2680 10B3.tmp 29 PID 2680 wrote to memory of 2636 2680 10B3.tmp 29 PID 2680 wrote to memory of 2636 2680 10B3.tmp 29 PID 2680 wrote to memory of 2636 2680 10B3.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\10B3.tmp"C:\Users\Admin\AppData\Local\Temp\10B3.tmp" --pingC:\Users\Admin\AppData\Local\Temp\d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.exe 22BB5D28BC538A1D9801915A3BEF4BAC6BF99714816C52B99BF055EC5A8DB2D569267DA6634F98B2B7A91110F9FDEFDAA123BB4D3876E209A6C2481D4C8A1AB52⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d4f6ff430554f03ff243cb3411ada820_NeikiAnalytics.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
664KB
MD56c63d396f92925fa16d1d59f05f09979
SHA107f4b3e375160a091d82d2639afa46e393f67a44
SHA2566283081beec69165512d389ccef3adf8ea75efa0da67209d2dd63e2a31da5afb
SHA512b3d2d11202bc2102cc5a538d03cc0894cb40a878d1013a5da30ebcea6ebb9e24316840b21c4aa195dcec69be6a51e562d8da20fa9828a7d8702f631c8b1a72f3