Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 14:41

General

  • Target

    9100c1204d5b4ae4d8defa34f86c0ce0_NeikiAnalytics.exe

  • Size

    407KB

  • MD5

    9100c1204d5b4ae4d8defa34f86c0ce0

  • SHA1

    3dd940af5c650007f5c339aba95bc134c27eaefb

  • SHA256

    f82d55f32aabf3dbae69907386641f740c172efce3f3781ddaf06836c6bbfa10

  • SHA512

    f894da97ce1ec7e399cd93892461c3d067b8e9635cfc9ea862d3552229a2213e960547d3ff1c7b85e108b7fc375c47db49ebcf2f32b63c9f62cb3b6232cff7bf

  • SSDEEP

    12288:WU6CRBzwvj0EPgV5V6te0LkRxWw7BvSa05VhGLZCzEf88BiH5QsT:WUDRB0vYwuV6te0LkRxWw7BvSa05VhGy

Score
10/10

Malware Config

Signatures

  • Malware Dropper & Backdoor - Berbew 1 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9100c1204d5b4ae4d8defa34f86c0ce0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9100c1204d5b4ae4d8defa34f86c0ce0_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 396
      2⤵
      • Program crash
      PID:2100
    • C:\Users\Admin\AppData\Local\Temp\9100c1204d5b4ae4d8defa34f86c0ce0_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\9100c1204d5b4ae4d8defa34f86c0ce0_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2160
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 376
        3⤵
        • Program crash
        PID:4888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3868 -ip 3868
    1⤵
      PID:3104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2160 -ip 2160
      1⤵
        PID:2860
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4764

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\9100c1204d5b4ae4d8defa34f86c0ce0_NeikiAnalytics.exe

          Filesize

          407KB

          MD5

          0e618fdb8b6646c9c7e9fe05c5cfa1dc

          SHA1

          a4423d920cc2246a2662141c0d60704cd8588bf4

          SHA256

          caa4ec368c9c19107a1dc550aa33d215d4ea4557d6bf25a350b0207ded2a3ac4

          SHA512

          328fa71e545d11c518a0b57b367b7153f5d7c4d10c2b9a96d22f37313b880d2cdb31e9e6af2403bf0c294807492977aadf915e2ee062c4398d2992191f031ec6

        • memory/2160-7-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2160-8-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2160-13-0x0000000003D90000-0x0000000003DC9000-memory.dmp

          Filesize

          228KB

        • memory/3868-0-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/3868-6-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB