Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 23:28
Static task
static1
Behavioral task
behavioral1
Sample
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
-
Size
231KB
-
MD5
99aaffa85ef7f0f16fb71435a1789210
-
SHA1
2c477e9ef7f055f7dab54078c9aff8eb30694b89
-
SHA256
1b8943b2ccea3ee9e464b5865711db721bae33ca0364630dfa6f75eb7f2c8a47
-
SHA512
aadc101a693d8728ade79ebfda7a34010412ed3950bc31801fda9fce160475c28740d17004d4ca25b7796fdce995d30a36bfb96026cc96f5f64d274f84bca5d7
-
SSDEEP
3072:uI71HpD138zSIQ6WoVTEEiS+IWWWkElI8ULPz6j0kmZorp:F7111MzSoPVTKIWNkEGVH6gvo
Malware Config
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1104 -
Executes dropped EXE 1 IoCs
Processes:
rjrjisgpid process 2036 rjrjisg -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exerjrjisgdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rjrjisg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rjrjisg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rjrjisg -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exepid process 1728 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe 1728 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 1104 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exerjrjisgpid process 1728 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe 2036 rjrjisg -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1104 1104 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1104 1104 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2160 wrote to memory of 2036 2160 taskeng.exe rjrjisg PID 2160 wrote to memory of 2036 2160 taskeng.exe rjrjisg PID 2160 wrote to memory of 2036 2160 taskeng.exe rjrjisg PID 2160 wrote to memory of 2036 2160 taskeng.exe rjrjisg
Processes
-
C:\Users\Admin\AppData\Local\Temp\99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1728
-
C:\Windows\system32\taskeng.exetaskeng.exe {6EA662D9-A0DC-4523-9FC2-E04779A9492D} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\rjrjisgC:\Users\Admin\AppData\Roaming\rjrjisg2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc0ef73c6ea3256b9639cdb811d463dc
SHA167224af58cdf18f6cba243444497a25c4bbfc8a5
SHA256eb99e9ecabb47957242ce7208172f900cfe5717172f7dd8e48e963baa20cea17
SHA5122b3aad910fe002018ac7f1e143ea17a798ad6a571ef5a9263d23c7c248fe0643e55cdee77bd3f1c9afc3cf2c31a5b2af8b2041032f118fea8adf62dc1606d568
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
231KB
MD599aaffa85ef7f0f16fb71435a1789210
SHA12c477e9ef7f055f7dab54078c9aff8eb30694b89
SHA2561b8943b2ccea3ee9e464b5865711db721bae33ca0364630dfa6f75eb7f2c8a47
SHA512aadc101a693d8728ade79ebfda7a34010412ed3950bc31801fda9fce160475c28740d17004d4ca25b7796fdce995d30a36bfb96026cc96f5f64d274f84bca5d7