Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 07:09

General

  • Target

    Nexus-MultiTool-main/Helper/Funcs/token_formater.py

  • Size

    1KB

  • MD5

    841fef914cfb30b386bdcd666b170e6c

  • SHA1

    816752197560ba4986a29be634fe4b2daa6e2519

  • SHA256

    f0654fe19c65500e999f5ff463491d5fda63b0eb09a7d0d93a4ef98610ab458a

  • SHA512

    38eb0ad438cb50d6a4a53e186c02d17467aa70f06ad365e90af0a779f750c9ee34e8e3bdcd96949be8edf8550152c072fd929cbf7de35b3a9c7e0ae085a9845a

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\token_formater.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\token_formater.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\token_formater.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    24a1688420ef4e466fe543053b04a1a5

    SHA1

    af46cd40df018095c78d86018373e779e16a5bad

    SHA256

    281a807d9d2ce0107797dd7a491bf1f0777e1ade2c9443d4a6a740af901ebcfe

    SHA512

    9b96c3b8cd5c9eed902acf66d8180da272dcf7e26d7f219d517275e4fd8be5778d071e5f18ce8cdcca64f87561d7317a6665978df6a5668c5b34432b1bb137f9