Analysis
-
max time kernel
133s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 02:53
Behavioral task
behavioral1
Sample
8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe
-
Size
235KB
-
MD5
8abed194f4c442f56912d34444a027c0
-
SHA1
ffa7a210532ac371b86248fe3b8696b685ee1b9c
-
SHA256
e8273d6bb89616af332f21361808087615d3c2018475e6287ad1dcf9f37d1ebe
-
SHA512
b5ad5cf2b4515c4584c876bb7f22df5eca1ebdbfa10cbfbd7c2d5ecde314e7c2e9eb133a4326c9b9cb7ede74a7f1f1188a52e70cb8d25c1d877a359d7a02a7e7
-
SSDEEP
6144:5gj99v5/bV7qfdqHQECCw+ecWVWYMlAWCX79+1D:Cj9rzqkQECp+WV0lAWdD
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 5 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/212-0-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/2684-7-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000b0000000233f4-5.dat family_berbew behavioral2/memory/212-6-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/2684-13-0x00000000014D0000-0x0000000001517000-memory.dmp family_berbew -
Deletes itself 1 IoCs
pid Process 2684 8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2300 212 WerFault.exe 82 2124 2684 WerFault.exe 89 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 212 8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2684 8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 2684 212 8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe 89 PID 212 wrote to memory of 2684 212 8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe 89 PID 212 wrote to memory of 2684 212 8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 3962⤵
- Program crash
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\8abed194f4c442f56912d34444a027c0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 3643⤵
- Program crash
PID:2124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 212 -ip 2121⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2684 -ip 26841⤵PID:920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD507618b5286eb2c61e423160764fb365d
SHA102e46777ef974c1cee473f92d347b5cc03c0ba9b
SHA256943fff5ca85a93d2d1a81ab699e02347bb1c2b5af2f05299c49da387482e515b
SHA5123369bccb735d93206e164d4856944c088a849433bb289cbb9ecded48aeb666b758ca07e3cf3cd44d32524adbc6d91b07c25a00b3bde5c16de7c0eba3838fafa2