Analysis
-
max time kernel
300s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 07:43
Static task
static1
Behavioral task
behavioral1
Sample
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe
-
Size
231KB
-
MD5
99aaffa85ef7f0f16fb71435a1789210
-
SHA1
2c477e9ef7f055f7dab54078c9aff8eb30694b89
-
SHA256
1b8943b2ccea3ee9e464b5865711db721bae33ca0364630dfa6f75eb7f2c8a47
-
SHA512
aadc101a693d8728ade79ebfda7a34010412ed3950bc31801fda9fce160475c28740d17004d4ca25b7796fdce995d30a36bfb96026cc96f5f64d274f84bca5d7
-
SSDEEP
3072:uI71HpD138zSIQ6WoVTEEiS+IWWWkElI8ULPz6j0kmZorp:F7111MzSoPVTKIWNkEGVH6gvo
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1248 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exepid process 2240 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe 2240 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1248 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
99aaffa85ef7f0f16fb71435a1789210_NEIKI.exepid process 2240 99aaffa85ef7f0f16fb71435a1789210_NEIKI.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1248 Token: SeShutdownPrivilege 1248 Token: SeShutdownPrivilege 1248 Token: SeShutdownPrivilege 1248 Token: SeShutdownPrivilege 1248 Token: SeShutdownPrivilege 1248 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1248 1248 -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
pid process 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.