Analysis

  • max time kernel
    135s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 05:14

General

  • Target

    6ed87402ae8fcd6e7ce44ee57f6866c0_NeikiAnalytics.exe

  • Size

    457KB

  • MD5

    6ed87402ae8fcd6e7ce44ee57f6866c0

  • SHA1

    f8995f184c83c135b0f1c66fe53165ccb3698102

  • SHA256

    e4d180dfe0db42e473e29b62c6487543a04a4af4831da5dd9e11d4c04ddc39e8

  • SHA512

    c15f62f84c39f6f1623484d53d63087207a41c14d79484669361d8c9e4a4ba07e091e37bf95d6f73a07764b332153ac8610a8bd36add30484bae1f9f9ec629ab

  • SSDEEP

    12288:ugy4RVmNR84VPoyEDFEW7wmBk58HbnCTBZb92LOaWqnlUi:ug7ms4VPoyEDFEW7wmBk58HbnCTBZb9k

Score
10/10

Malware Config

Signatures

  • Malware Dropper & Backdoor - Berbew 1 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ed87402ae8fcd6e7ce44ee57f6866c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6ed87402ae8fcd6e7ce44ee57f6866c0_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 396
      2⤵
      • Program crash
      PID:3108
    • C:\Users\Admin\AppData\Local\Temp\6ed87402ae8fcd6e7ce44ee57f6866c0_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\6ed87402ae8fcd6e7ce44ee57f6866c0_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 364
        3⤵
        • Program crash
        PID:4888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3976 -ip 3976
    1⤵
      PID:2360
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4976 -ip 4976
      1⤵
        PID:3788

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\6ed87402ae8fcd6e7ce44ee57f6866c0_NeikiAnalytics.exe
        Filesize

        457KB

        MD5

        04894b85ba49c47307b206469dd9d608

        SHA1

        da145e3cc95f19dc0222bd91ff83b36a9bc8b636

        SHA256

        c8389cd697f2196c7a29d918dbe34a820fa5114a3fea25d86550f35bf6438b53

        SHA512

        1fefb32e2d902336321a75bd639d84d3bbae0e130edbea5dadcd435509d40f148ff43037206d127054d68f8508d51a7c4afb984cf9eeac8bf2338240830f22dc

      • memory/3976-0-0x0000000000400000-0x0000000000439000-memory.dmp
        Filesize

        228KB

      • memory/3976-6-0x0000000000400000-0x0000000000439000-memory.dmp
        Filesize

        228KB

      • memory/4976-7-0x0000000000400000-0x0000000000439000-memory.dmp
        Filesize

        228KB

      • memory/4976-8-0x0000000000400000-0x000000000041A000-memory.dmp
        Filesize

        104KB

      • memory/4976-13-0x0000000000140000-0x0000000000179000-memory.dmp
        Filesize

        228KB