Analysis Overview
SHA256
b58902c91c4c7ee5167fddf45947c029efc319029479ca443f413784f75018f5
Threat Level: Known bad
The file a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe was found to be: Known bad.
Malicious Activity Summary
Berbew family
Malware Dropper & Backdoor - Berbew
Loads dropped DLL
Executes dropped EXE
Deletes itself
Program crash
Unsigned PE
Suspicious behavior: RenamesItself
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-05-23 17:10
Signatures
Berbew family
Malware Dropper & Backdoor - Berbew
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-23 17:10
Reported
2024-05-23 17:13
Platform
win10v2004-20240426-en
Max time kernel
132s
Max time network
127s
Command Line
Signatures
Malware Dropper & Backdoor - Berbew
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Program crash
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1224 wrote to memory of 5076 | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe |
| PID 1224 wrote to memory of 5076 | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe |
| PID 1224 wrote to memory of 5076 | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1224 -ip 1224
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 396
C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe
C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5076 -ip 5076
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 372
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| BE | 88.221.83.210:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 210.83.221.88.in-addr.arpa | udp |
| BE | 88.221.83.210:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.58.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 52.111.227.11:443 | tcp | |
| US | 8.8.8.8:53 | 138.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
Files
memory/1224-0-0x0000000000400000-0x0000000000441000-memory.dmp
memory/1224-6-0x0000000000400000-0x0000000000441000-memory.dmp
memory/5076-7-0x0000000000400000-0x0000000000441000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe
| MD5 | cb6141c3a05b6d8ac111906883b1429d |
| SHA1 | 1f2c8ec57c04a057b64a4b5ef7ce6bd6f351404a |
| SHA256 | b764dae0e069f940e20edde5a0886645e9483bf9f19ddbae758a198a0ed73b14 |
| SHA512 | 97dc94bf57495d3b7110afbe5a4f23912b58a655b07cd56f0c83554a96b655cb2684c18a2fd5dd9d1861dbb3cbbe887d9840cbc15ffa034da43cc25637d32b1e |
memory/5076-8-0x0000000000400000-0x000000000041A000-memory.dmp
memory/5076-13-0x0000000000190000-0x00000000001D1000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-23 17:10
Reported
2024-05-23 17:13
Platform
win7-20240419-en
Max time kernel
118s
Max time network
122s
Command Line
Signatures
Malware Dropper & Backdoor - Berbew
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1824 wrote to memory of 2028 | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe |
| PID 1824 wrote to memory of 2028 | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe |
| PID 1824 wrote to memory of 2028 | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe |
| PID 1824 wrote to memory of 2028 | N/A | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe
C:\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe
Network
Files
memory/1824-0-0x0000000000400000-0x0000000000441000-memory.dmp
\Users\Admin\AppData\Local\Temp\a9f673baac302188ab4e850345bd3b40_NeikiAnalytics.exe
| MD5 | d4fc49fdd38c98519a8d89e4bc031c8f |
| SHA1 | eac9696c482a5a79d43d914f471dd493859846a3 |
| SHA256 | d6b4dd2ba71f9aa1968c02c303a439714ba69a7180aaa3af7371124d80607a5b |
| SHA512 | 970f10e0768afd1877ad75f02ace00c6f3ab356718ffef2953b7aa12d747b762a50b2dfdf6f1a8a776db4968ae148be58a89cabe1923e5782ecff5b97d6dc49c |
memory/1824-6-0x0000000000130000-0x0000000000171000-memory.dmp
memory/2028-11-0x0000000000400000-0x0000000000441000-memory.dmp
memory/1824-10-0x0000000000400000-0x0000000000441000-memory.dmp
memory/2028-13-0x0000000000400000-0x000000000041A000-memory.dmp
memory/2028-17-0x0000000000150000-0x0000000000191000-memory.dmp