Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 03:36
Behavioral task
behavioral1
Sample
343b282644c31e95f2241296750dd950_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
343b282644c31e95f2241296750dd950_NeikiAnalytics.exe
-
Size
283KB
-
MD5
343b282644c31e95f2241296750dd950
-
SHA1
1e928ad4dafd0d0047ef3ad1bef28a9e8b33f152
-
SHA256
6d0f7c45bfe86f3e61edb8dcaaee4671e7af92ef837ea5aa9a9e270e79f4caf0
-
SHA512
20ec2b9d7832c8d771251edf198ac539ede984212baa95cc1b4e365fdd409b86984a7427e48f2a07a2d9b8d212fab22b7c2d82cf2bd063f1f7d1d9906859b290
-
SSDEEP
6144:l8hhPEo7Bzs4mHMzBFyJwN/pjvXJQ10IqVC/CWPssZkVRnr5:l65MM9FyU/FkqVVWPssZGr5
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\343b282644c31e95f2241296750dd950_NeikiAnalytics.exe family_berbew -
Deletes itself 1 IoCs
Processes:
343b282644c31e95f2241296750dd950_NeikiAnalytics.exepid process 2072 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
343b282644c31e95f2241296750dd950_NeikiAnalytics.exepid process 2072 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
Processes:
343b282644c31e95f2241296750dd950_NeikiAnalytics.exepid process 1152 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
343b282644c31e95f2241296750dd950_NeikiAnalytics.exepid process 1152 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
343b282644c31e95f2241296750dd950_NeikiAnalytics.exepid process 2072 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
343b282644c31e95f2241296750dd950_NeikiAnalytics.exedescription pid process target process PID 1152 wrote to memory of 2072 1152 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe PID 1152 wrote to memory of 2072 1152 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe PID 1152 wrote to memory of 2072 1152 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe PID 1152 wrote to memory of 2072 1152 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe 343b282644c31e95f2241296750dd950_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\343b282644c31e95f2241296750dd950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\343b282644c31e95f2241296750dd950_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\343b282644c31e95f2241296750dd950_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\343b282644c31e95f2241296750dd950_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2072
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD501d2489a61913531d4e11127142175bb
SHA121ad4d963f25c98b0c6cbf3fffc4861584bae367
SHA25667fb6911f2537a22a7a88cacdc40f19e3453b2bc3e509459272d88d0eb4f8c7f
SHA51235f604ea57249269a08fe5dad9090f77cbf7f4851869ba6f0c20b914978191aafbca1fe5f89fda46b63c2d72ac173a3076f0f5451eab5a0cc5d2ab3be3abd08d