Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 21:46
Behavioral task
behavioral1
Sample
08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe
-
Size
991KB
-
MD5
08619ac1578420c0f0bd4ad406da8110
-
SHA1
472368b4baca14d20e1cd374db65a2cf26f0ff4e
-
SHA256
c5812afa52b3c7c256e36316905f691e2adc77ae3a5a7534395cb4c816d419b1
-
SHA512
f76bdb8808186c4c2f7c57bd97749ecf8287d70f6dc110a816a57be01186f2b725f9862f3b674e77a40a0b2c295dd6aa847821405d92daae07a57994cc2616dc
-
SSDEEP
24576:BxlQKXIJojIj7qH3QGUONWvgQ0Ha/ZSMQugi8ndZ5G:uKDa2sE00Hg1Qugi8ndZ5G
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe family_berbew -
Deletes itself 1 IoCs
Processes:
08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exepid process 4984 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exepid process 4984 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1524 1852 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 764 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 4844 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 4892 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 4232 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 992 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 3360 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 2488 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 5108 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 2588 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 2608 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 2372 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 544 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 5112 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 1576 4984 WerFault.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exepid process 4984 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 4984 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exepid process 1852 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exepid process 4984 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exedescription pid process target process PID 1852 wrote to memory of 4984 1852 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe PID 1852 wrote to memory of 4984 1852 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe PID 1852 wrote to memory of 4984 1852 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe 08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 3522⤵
- Program crash
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\08619ac1578420c0f0bd4ad406da8110_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 3443⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 6283⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 6363⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 6723⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 7203⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 9643⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 14163⤵
- Program crash
PID:2488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 14163⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 14443⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 15203⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 15003⤵
- Program crash
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 15083⤵
- Program crash
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 15283⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 5923⤵
- Program crash
PID:1576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1852 -ip 18521⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4984 -ip 49841⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4984 -ip 49841⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4984 -ip 49841⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4984 -ip 49841⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4984 -ip 49841⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4984 -ip 49841⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4984 -ip 49841⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4984 -ip 49841⤵PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4984 -ip 49841⤵PID:3068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4984 -ip 49841⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4984 -ip 49841⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4984 -ip 49841⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4984 -ip 49841⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4984 -ip 49841⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
991KB
MD5a9563ecc5e174485285431bac0e7643d
SHA13ea0268727b253167524c7d6d177de5a980e4e14
SHA256352d9dca62524f8e70f1aa4250d3fef282d5146ce8bf1e5283d87edfc359ee88
SHA5126d1fd8123cb121f41be24f1d423829fc9f38987853d0efe47ca45a9db244a45eba8a4b6099d2d971e4cddabb52e201996a0a2952caec2e4d4970bee7e44221c9