Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 09:22
Behavioral task
behavioral1
Sample
4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe
-
Size
768KB
-
MD5
4df0ef6655cfc3d7696f740439571db0
-
SHA1
afd880e380a7a30cac065859aeb6fc5ad857a3dc
-
SHA256
04cf09d68bbc9b6e66be627b5ee48b550d7ad6421feb37f1218c0806afba0555
-
SHA512
a9c464f5bf95e71d3b81810a0876b40364807a93918538e86baf1ac0211b721158c6627c8e362512b64fabb91632b6018bda7389d27c17888245de07759c14d4
-
SSDEEP
24576:qW298E8ufgSRWPod2nRs4AKgzyw0ZN+pUdGOvCJw26cV/JKuylm69T:a98E8u4nAdJ4AKgzyw0ZN+pUdGECJwNZ
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\16AC.tmp family_berbew -
Executes dropped EXE 1 IoCs
Processes:
16AC.tmppid process 2992 16AC.tmp -
Loads dropped DLL 1 IoCs
Processes:
4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exepid process 2944 4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1940 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
16AC.tmppid process 2992 16AC.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
WINWORD.EXEpid process 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe16AC.tmpdescription pid process target process PID 2944 wrote to memory of 2992 2944 4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe 16AC.tmp PID 2944 wrote to memory of 2992 2944 4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe 16AC.tmp PID 2944 wrote to memory of 2992 2944 4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe 16AC.tmp PID 2944 wrote to memory of 2992 2944 4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe 16AC.tmp PID 2992 wrote to memory of 1940 2992 16AC.tmp WINWORD.EXE PID 2992 wrote to memory of 1940 2992 16AC.tmp WINWORD.EXE PID 2992 wrote to memory of 1940 2992 16AC.tmp WINWORD.EXE PID 2992 wrote to memory of 1940 2992 16AC.tmp WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\16AC.tmp"C:\Users\Admin\AppData\Local\Temp\16AC.tmp" --pingC:\Users\Admin\AppData\Local\Temp\4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.exe FC1E3348655B7986E77936836E9CA6A528645ACC1922807068B962E84E8EFDA1C8D322EE27E41A00CAADF75E6BA48D88DD067A6650D0788B064A770741DDD6CB2⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4df0ef6655cfc3d7696f740439571db0_NeikiAnalytics.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
768KB
MD5437a3ce8936f9fd1a7e2513285744c6f
SHA1e368df9013123f6686ed0a452f620d51daba4618
SHA25665f9489b1470c6dae8a26612ba273510a54e2d1c5efad0b1b6926b9eea2963f8
SHA51258fb3c0ab15dcd0f322da10c957e8c3d6e0192d7393d2b238d7be7f446ce24a0ccd29544f1fe5a2bb68ddecd79d225e7082b144c0e3248276bb6a2e2923e9bf0