Overview
overview
7Static
static
3916c6a3260...18.exe
windows7-x64
7916c6a3260...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Spy Monitor Help.chm
windows7-x64
1Spy Monitor Help.chm
windows10-2004-x64
1ijl15.dll
windows7-x64
3ijl15.dll
windows10-2004-x64
3setalc.exe
windows7-x64
3setalc.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7wmispe.exe
windows7-x64
6wmispe.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
916c6a32602001110ea3aaa636c6a682_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
916c6a32602001110ea3aaa636c6a682_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Spy Monitor Help.chm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Spy Monitor Help.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ijl15.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ijl15.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
setalc.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
setalc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
wmispe.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
wmispe.exe
Resource
win10v2004-20241007-en
General
-
Target
wmispe.exe
-
Size
684KB
-
MD5
69058bba0b0ce086c23d0b50fb712fd6
-
SHA1
73c45dcf072ebeac0f7e8ddce7a80ad5e9df9049
-
SHA256
c60d6122c82f694d05e4e54446ddbf980bed657c6131ba51e4c359dc56dec701
-
SHA512
2bd8a8520c185e94dfa98abfe2433e79599a150b0a97edc8b8f0f74d45ca6a524a14f3aa633a22c8989dfd008248f4739614b3caf623cbedf983f323ce80ccb1
-
SSDEEP
12288:Ly0mm/XdI/uQ/hUEBk/XXpy5MlE2Xxioxc46bgk76+esTCmpi:LVu/PDsXpy5pqio2bH2mpi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wmispe.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmispe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wmispe.exesetalc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmispe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setalc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
wmispe.exepid Process 3812 wmispe.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
wmispe.exepid Process 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe 3812 wmispe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wmispe.exepid Process 3812 wmispe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wmispe.exedescription pid Process procid_target PID 3812 wrote to memory of 2768 3812 wmispe.exe 83 PID 3812 wrote to memory of 2768 3812 wmispe.exe 83 PID 3812 wrote to memory of 2768 3812 wmispe.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\wmispe.exe"C:\Users\Admin\AppData\Local\Temp\wmispe.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\setalc.exe"C:\Users\Admin\AppData\Local\Temp\setalc.exe" /SETDATE2⤵
- System Location Discovery: System Language Discovery
PID:2768
-