Analysis
-
max time kernel
166s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 23:28
Static task
static1
Behavioral task
behavioral1
Sample
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
-
Size
231KB
-
MD5
99aaffa85ef7f0f16fb71435a1789210
-
SHA1
2c477e9ef7f055f7dab54078c9aff8eb30694b89
-
SHA256
1b8943b2ccea3ee9e464b5865711db721bae33ca0364630dfa6f75eb7f2c8a47
-
SHA512
aadc101a693d8728ade79ebfda7a34010412ed3950bc31801fda9fce160475c28740d17004d4ca25b7796fdce995d30a36bfb96026cc96f5f64d274f84bca5d7
-
SSDEEP
3072:uI71HpD138zSIQ6WoVTEEiS+IWWWkElI8ULPz6j0kmZorp:F7111MzSoPVTKIWNkEGVH6gvo
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3336 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exepid process 4956 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe 4956 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exepid process 4956 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:488