Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 02:28
Behavioral task
behavioral1
Sample
52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe
-
Size
283KB
-
MD5
52c412ace9966ca8e5ab3bccaf2fc550
-
SHA1
64eac199d27fa5452a4522a5e3a0d5c7cd4fe22d
-
SHA256
455764574fabee324239757d969e49bd385ef2aa5d4a9d542dbf823e2268fdde
-
SHA512
fbe3f55b3302e316d0e8c0c8524bec225d7d853fbfcb5be37437f1285c6ddcf7820f2dbea634cb4f8cdf27b8853f9236da413be9f8e81bf2a4e2fbe4b300ae37
-
SSDEEP
3072:N9cG4qS6pYv1gtC1ad2w4KVgw19p/FABLJMGfBB8tYyCTifSIr6fxVOiwX/CpGf0:uSA9yeK8L3E2XIqVC/CWPssZkVRnr5
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe family_berbew -
Deletes itself 1 IoCs
Processes:
52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exepid process 3592 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exepid process 3592 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2864 3112 WerFault.exe 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe 3584 3592 WerFault.exe 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exepid process 3112 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exepid process 3592 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exedescription pid process target process PID 3112 wrote to memory of 3592 3112 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe PID 3112 wrote to memory of 3592 3112 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe PID 3112 wrote to memory of 3592 3112 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe 52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 3962⤵
- Program crash
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 3643⤵
- Program crash
PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3112 -ip 31121⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3592 -ip 35921⤵PID:5040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:81⤵PID:1548
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\52c412ace9966ca8e5ab3bccaf2fc550_NeikiAnalytics.exeFilesize
283KB
MD54268212218e947be08a8ea634779aa9b
SHA102f0d274059377c5aeb44a58e39f9972c250fe2f
SHA256dd413b4f1e071d81855b1e4ebd2e819cff91e8716afa900543a9b1166e4b472e
SHA5127f74b0b349d14b269554eee9592fadb96d5f9347000cb03657b30bff66ab5637e05a6c73c9c5e3601716b4a7f148d35d9412b04c9c6b6081ad495501b8b140c1
-
memory/3112-0-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/3112-6-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/3592-7-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/3592-8-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/3592-13-0x0000000000190000-0x00000000001D1000-memory.dmpFilesize
260KB