Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe
-
Size
227KB
-
MD5
31a0566dc46129543335b523e7336900
-
SHA1
dddeac01bd8afa707173d1a73e74707c766f16c6
-
SHA256
1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727
-
SHA512
06111add34f7fa9e1fc566442abcb8069b8525ff1eebb6dc58f8c166e9189f5e18d3e22522908e91456a0dafe7db960b590f833368511cad657e2b4baa4fe162
-
SSDEEP
3072:IuU8KLcZklCWZh+ramRHtLgmYT3sgehMjbr/4G2XKQGb3VqnF23MXX:wDc6CWKrBHtLNCJehMDc8zVWF23M
Malware Config
Extracted
smokeloader
pub2
Extracted
smokeloader
2022
http://movlat.com/tmp/
http://llcbc.org/tmp/
http://lindex24.ru/tmp/
http://qeqei.xyz/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3364 -
Executes dropped EXE 1 IoCs
Processes:
rsccdbvpid process 520 rsccdbv -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
rsccdbv1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rsccdbv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rsccdbv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rsccdbv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exepid process 1972 1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe 1972 1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exersccdbvpid process 1972 1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe 520 rsccdbv -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727_NeikiAnalytics.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3732 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵
-
C:\Users\Admin\AppData\Roaming\rsccdbvC:\Users\Admin\AppData\Roaming\rsccdbv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\rsccdbvFilesize
227KB
MD531a0566dc46129543335b523e7336900
SHA1dddeac01bd8afa707173d1a73e74707c766f16c6
SHA2561ebdfc9620bd08105808d59cc890bbe5c9eb5c27d6167fc19a6fa50475ba6727
SHA51206111add34f7fa9e1fc566442abcb8069b8525ff1eebb6dc58f8c166e9189f5e18d3e22522908e91456a0dafe7db960b590f833368511cad657e2b4baa4fe162
-
memory/520-16-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/520-17-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/520-21-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/1972-1-0x00000000004D0000-0x00000000005D0000-memory.dmpFilesize
1024KB
-
memory/1972-2-0x00000000005D0000-0x00000000005DB000-memory.dmpFilesize
44KB
-
memory/1972-3-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1972-5-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/1972-8-0x00000000005D0000-0x00000000005DB000-memory.dmpFilesize
44KB
-
memory/1972-9-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/3364-4-0x0000000002900000-0x0000000002916000-memory.dmpFilesize
88KB
-
memory/3364-18-0x00000000026C0000-0x00000000026D6000-memory.dmpFilesize
88KB