Analysis
-
max time kernel
124s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 04:47
Behavioral task
behavioral1
Sample
1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
1fab2c6e63761fb11bfc67073c1a7450
-
SHA1
2a1700745e6b7bb49cbf63476c6afe2dc9fd2b15
-
SHA256
5a263e1964484df64bd2f665f55223967f0e35dd56d90aa944bc31dec84fd4e2
-
SHA512
2dd034d957e2118d89e9a91a22fa6cee03cd1587d2d32be6c2a9af45c70be7aa5234503aba63146fc09b214b6e1459a2e918366363776320ced00d93349db7b4
-
SSDEEP
24576:qVZj6AR51wrjsOBvpCphWYt/TBb4eBTWa/ZSjXuF77Lv+f6T8Qnskb2i6OBKaBWE:qV8RrJuphWYN9bjQgGXuFbq4TT+E
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe family_berbew -
Deletes itself 1 IoCs
Processes:
1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exepid process 1392 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exepid process 1392 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Program crash 16 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 712 2268 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 1624 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 4484 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 2288 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 3928 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 4348 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 3804 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 1616 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 3308 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 224 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 4436 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 4648 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 4368 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 3628 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 2256 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 4668 1392 WerFault.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exepid process 1392 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 1392 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exepid process 2268 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exepid process 1392 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exedescription pid process target process PID 2268 wrote to memory of 1392 2268 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe PID 2268 wrote to memory of 1392 2268 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe PID 2268 wrote to memory of 1392 2268 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe 1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 3442⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 3443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 6283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 6803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 6803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 6603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 9003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 14123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 14643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 16363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 16403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 14803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 14683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 16803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 16683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 6723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2268 -ip 22681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1392 -ip 13921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1392 -ip 13921⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1fab2c6e63761fb11bfc67073c1a7450_NeikiAnalytics.exeFilesize
1.3MB
MD50df886082e1e34a220ce57940cfea69d
SHA16a52170ca30ec87ca911aa949c3367109aff26d7
SHA256e0db181607c660b0d2cfd6d1f0f3210136c8b32e215cf1bfe8899574bba6c5b3
SHA51251968224e4319c127645a6875bd879a8611d4bbdb7910f109debcb08c44ee397ef12cd63a3d8f775c5517832b94f021ed707bf14dc5458a1ca501e40d2dfacfb
-
memory/1392-7-0x0000000000400000-0x00000000004EF000-memory.dmpFilesize
956KB
-
memory/1392-8-0x0000000000400000-0x00000000004A3000-memory.dmpFilesize
652KB
-
memory/1392-14-0x0000000004EB0000-0x0000000004F9F000-memory.dmpFilesize
956KB
-
memory/1392-22-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/1392-27-0x000000000B970000-0x000000000BA13000-memory.dmpFilesize
652KB
-
memory/1392-28-0x0000000000400000-0x00000000004EF000-memory.dmpFilesize
956KB
-
memory/2268-0-0x0000000000400000-0x00000000004EF000-memory.dmpFilesize
956KB
-
memory/2268-6-0x0000000000400000-0x00000000004EF000-memory.dmpFilesize
956KB