Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 07:07
Behavioral task
behavioral1
Sample
3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe
-
Size
480KB
-
MD5
3bb4cb8e725eb75dc7cc3b5d6177e390
-
SHA1
0a60cf05d32ca62a499eb9afbf067d18c3c881bd
-
SHA256
4e60b05c2421e91f0846908538c4efcc243dd58bc37f7b60a1e67080e48f4d60
-
SHA512
7dcd41315269a5479684d463e9c5bc5ab338aefc14677d9c3f769376b13aa636f68e2bb518fcee4be81b58083e6e9ffd28a01852d714a571d349bf1bbf2a14ee
-
SSDEEP
6144:JUsWiquR5+Xjdnl9ydQ1PMlAWCX79+1lV40yDMAOQFl3W1BdqAn1kYs5ibPa:BquR5+zUd7lAWdlVe91W1BUAn1Mo7a
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 5 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/memory/1680-0-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/files/0x000b00000001228a-4.dat family_berbew behavioral1/memory/2120-9-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/1680-10-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/2120-16-0x0000000000130000-0x0000000000177000-memory.dmp family_berbew -
Deletes itself 1 IoCs
pid Process 2120 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2120 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1680 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2120 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2120 1680 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe 29 PID 1680 wrote to memory of 2120 1680 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe 29 PID 1680 wrote to memory of 2120 1680 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe 29 PID 1680 wrote to memory of 2120 1680 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2120
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD59f21e6ae36c734260405a7721abc5b02
SHA1a183d588a9dbc70f86c937d1865162d74b7ca585
SHA2568a6f7ebca43d4db5f0183c582891ef61aa630ad9b2707405ce8cb2a3c9ab1bf4
SHA5126949cffda8a71d1d26f8822a94599da2fa3e5d92fa24c674f7eb0e6d2e1ac07b1683efc674c70b97dfe6451bce97ee4f76527a57bcca39a499fe4173e41310ab