Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 07:02
Behavioral task
behavioral1
Sample
8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe
-
Size
283KB
-
MD5
8308d16ebf76f59565d371d3e03a1b50
-
SHA1
51262fed9ff5e3dced0c9ae2eca5a2d3f559008b
-
SHA256
9f7b2752bbf92bc460d563111e83aec9b23f8e0bc24e2d4dee3a365e957f57b9
-
SHA512
3ec41856e9278894d5992810e75f92672e6b36cd32fe7439d3756136314863c74bb5e0c70704ec7403dfaa0d4592ee04c1b730d1ac384b3bf5dc4c0ffb12b57e
-
SSDEEP
6144:RPeNbxR6k0AHWeuD5xqH/YtjPbIqVC/CWPssZkVRnr5:oNbxR6k0i5Y5xwwJ8qVVWPssZGr5
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe family_berbew -
Deletes itself 1 IoCs
Processes:
8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exepid process 2916 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exepid process 2916 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
Processes:
8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exepid process 2040 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exepid process 2040 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exepid process 2916 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exedescription pid process target process PID 2040 wrote to memory of 2916 2040 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe PID 2040 wrote to memory of 2916 2040 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe PID 2040 wrote to memory of 2916 2040 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe PID 2040 wrote to memory of 2916 2040 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe 8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\8308d16ebf76f59565d371d3e03a1b50_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5a8376b39fc50b5881152b3610830c713
SHA1b330b4082c1cc111cca8963df9b61cba86517c27
SHA25661be59729f662b4c60bf6b04b14028a24e747fa8e6078dc07f5204c84f474fc9
SHA51228c4652e8502578d1aa267e3bedb10051231c2f17e2f9bc500af8a0e532c889df45381c32123f49d358e1b5d2bdcfcfeda38d7e647edca3d360f79e8246e6309