Overview
overview
7Static
static
1SD-N Shimeji.zip
windows7-x64
1SD-N Shimeji.zip
windows10-2004-x64
1Shimeji-ee.jar
windows7-x64
7Shimeji-ee.jar
windows10-2004-x64
7ShimejieeLog0.xml
windows7-x64
1ShimejieeLog0.xml
windows10-2004-x64
1ShimejieeLog1.xml
windows7-x64
1ShimejieeLog1.xml
windows10-2004-x64
1conf/Mascot.xml
windows7-x64
1conf/Mascot.xml
windows10-2004-x64
1conf/behaviors.xml
windows7-x64
1conf/behaviors.xml
windows10-2004-x64
1conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3conf/langu...erties
windows7-x64
3conf/langu...erties
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
SD-N Shimeji.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SD-N Shimeji.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Shimeji-ee.jar
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Shimeji-ee.jar
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
ShimejieeLog0.xml
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ShimejieeLog0.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
ShimejieeLog1.xml
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
ShimejieeLog1.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
conf/Mascot.xml
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
conf/Mascot.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
conf/behaviors.xml
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
conf/behaviors.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
conf/language_ar.properties
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
conf/language_ar.properties
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
conf/language_de.properties
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
conf/language_de.properties
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
conf/language_es.properties
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
conf/language_es.properties
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
conf/language_fr.properties
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
conf/language_fr.properties
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
conf/language_it.properties
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
conf/language_it.properties
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
conf/language_ko.properties
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
conf/language_ko.properties
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
conf/language_pl.properties
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
conf/language_pl.properties
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
conf/language_pt_PT.properties
Resource
win7-20240319-en
Behavioral task
behavioral28
Sample
conf/language_pt_PT.properties
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
conf/language_ru.properties
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
conf/language_ru.properties
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
conf/language_vi.properties
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
conf/language_vi.properties
Resource
win10v2004-20240412-en
General
-
Target
conf/language_it.properties
-
Size
6KB
-
MD5
3573e440531bb563d9db046e2e979eb4
-
SHA1
99e4c889f5f9e164f097a29113b2a02a15ebad18
-
SHA256
1d9d6f0f7eac22da91610438c02f454c5bcb9e4335396ec5464e3436ed4a9794
-
SHA512
9db7b332dc1cc735ef290fd89d80fe7cfb67bbd1bb6d559c9b7c6623251c7d69d7641ae08cbee9576b2eb5498644a9b4b7b5426a65b7747e13abcc32f64d167e
-
SSDEEP
192:nC6X3CvlNmaIyFtqgA5Mr8+8yaF/MSjGG:nC6elNmaIUqgA5MZQ/H
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\properties_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.properties\ = "properties_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\properties_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.properties rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\properties_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\properties_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\properties_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\properties_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2564 AcroRd32.exe 2564 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2632 2080 cmd.exe 29 PID 2080 wrote to memory of 2632 2080 cmd.exe 29 PID 2080 wrote to memory of 2632 2080 cmd.exe 29 PID 2632 wrote to memory of 2564 2632 rundll32.exe 30 PID 2632 wrote to memory of 2564 2632 rundll32.exe 30 PID 2632 wrote to memory of 2564 2632 rundll32.exe 30 PID 2632 wrote to memory of 2564 2632 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\conf\language_it.properties1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\conf\language_it.properties2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\conf\language_it.properties"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a308e5c8928a6ebfae437d1a085e3dcb
SHA1c8106ac9953756f496bd2522d27a56e075aba821
SHA256db483207f0abb094c81ab346d996c6b4ddd084f55019cff09cfefa163fe73a3f
SHA5126f3a2bca97a4b85cfeb7d58c456681c8117f3bc36ee1bda73041bd8fffdff1049096e8b8e95f6b5334b9c81a77337e8a97f17f77742087aeb0bb75d704af3357