Overview
overview
9Static
static
3QtCore4.dll
windows7-x64
3QtCore4.dll
windows10-2004-x64
3QtGui4.dll
windows7-x64
3QtGui4.dll
windows10-2004-x64
3QtNetwork4.dll
windows7-x64
3QtNetwork4.dll
windows10-2004-x64
3libeay32.dll
windows7-x64
1libeay32.dll
windows10-2004-x64
1nksl3_logger.exe
windows7-x64
9nksl3_logger.exe
windows10-2004-x64
9runtime/No..._0.msi
windows7-x64
6runtime/No..._0.msi
windows10-2004-x64
6runtime/handle.exe
windows7-x64
7runtime/handle.exe
windows10-2004-x64
7runtime/vc...08.exe
windows7-x64
7runtime/vc...08.exe
windows10-2004-x64
7ssleay32.dll
windows7-x64
1ssleay32.dll
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
QtCore4.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
QtCore4.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
QtGui4.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
QtGui4.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
QtNetwork4.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
QtNetwork4.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
libeay32.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
libeay32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
nksl3_logger.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
nksl3_logger.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
runtime/Nokia_Connectivity_Cable_Driver_Version 7_1_69_0.msi
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
runtime/Nokia_Connectivity_Cable_Driver_Version 7_1_69_0.msi
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
runtime/handle.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
runtime/handle.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
runtime/vcredist_x86_2008.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
runtime/vcredist_x86_2008.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
ssleay32.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
ssleay32.dll
Resource
win10v2004-20240226-en
General
-
Target
nksl3_logger.exe
-
Size
2.2MB
-
MD5
81ea9111c486b134ea63fa0c500579f4
-
SHA1
0d0fa71f39f888a4692eaa47819f42b868217574
-
SHA256
92690cf47586af87c63228d63f36f5738c398d3f243dc6bbfe2aea03381250bf
-
SHA512
41266c626e7202ed5671d39b43a0b1bd16fc2b0453e3aa98fee642b7ccfed666212b1597d8ff068cfa0636b0b72290a9a744cd4003ba5d47a0af30a6dc1339aa
-
SSDEEP
49152:kfu22WgIny+LDsEZ3Z/1I8H9qWJBZbEswm8KYDhK22xYzFiIe2G7Sw:kuOgkyWNV8yfbx+K22ydul
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nksl3_logger.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nksl3_logger.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine nksl3_logger.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2812 nksl3_logger.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2812 nksl3_logger.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2812 nksl3_logger.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nksl3_logger.exe"C:\Users\Admin\AppData\Local\Temp\nksl3_logger.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2812