Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 07:07
Behavioral task
behavioral1
Sample
3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe
-
Size
480KB
-
MD5
3bb4cb8e725eb75dc7cc3b5d6177e390
-
SHA1
0a60cf05d32ca62a499eb9afbf067d18c3c881bd
-
SHA256
4e60b05c2421e91f0846908538c4efcc243dd58bc37f7b60a1e67080e48f4d60
-
SHA512
7dcd41315269a5479684d463e9c5bc5ab338aefc14677d9c3f769376b13aa636f68e2bb518fcee4be81b58083e6e9ffd28a01852d714a571d349bf1bbf2a14ee
-
SSDEEP
6144:JUsWiquR5+Xjdnl9ydQ1PMlAWCX79+1lV40yDMAOQFl3W1BdqAn1kYs5ibPa:BquR5+zUd7lAWdlVe91W1BUAn1Mo7a
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 5 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/1708-0-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000b000000023411-5.dat family_berbew behavioral2/memory/1708-6-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/560-7-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/560-13-0x00000000014E0000-0x0000000001527000-memory.dmp family_berbew -
Deletes itself 1 IoCs
pid Process 560 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 560 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2328 1708 WerFault.exe 82 4872 560 WerFault.exe 90 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1708 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 560 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 560 1708 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe 90 PID 1708 wrote to memory of 560 1708 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe 90 PID 1708 wrote to memory of 560 1708 3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 3962⤵
- Program crash
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\3bb4cb8e725eb75dc7cc3b5d6177e390_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 3723⤵
- Program crash
PID:4872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1708 -ip 17081⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 560 -ip 5601⤵PID:1120
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5c7a5ea4aee347e3b5b8fc67dc4570679
SHA13295fa2c77002b4ad7e18f57def0f01de1ce29c3
SHA256cab02d1ee58c9110315780f5e2b85ec2c12d0c26bfbc68b74cf6c664e2009f15
SHA5122162aebb693b580f4c89fb9fba15cff041a20a6cfc6f9d50052d8feeb1decb999128f7638400f47b07b65caa71fcf9aba76cdf21e81ae3be466c187453ddf5cf