Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 07:09

General

  • Target

    Nexus-MultiTool-main/Helper/Funcs/webhook_tool.py

  • Size

    4KB

  • MD5

    21b6d91f85774611f3aa3b19b51a9fd5

  • SHA1

    c74c9e0ec294e778f727336bb87492c7db512eb8

  • SHA256

    aac9163f1a9c6bc7c7079f06ca4fb703a07361fdc51b7f4d251e52ff965f2620

  • SHA512

    286164f4181896b86021e86f43747f0fc1ee6675691b0b78b3710a5da557c7b5933b413ebd5ba639687cd564c9f2f4ce474a63148d4ee34c0e41e198224052ec

  • SSDEEP

    96:JtTxvchTb/njTs5l1WX/kizNwMZUozw117lNX/3PVhp0LL+8:LxvqTbjg5jWP/zN9ZDzwz5NP3Pnp0LL3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\webhook_tool.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\webhook_tool.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\webhook_tool.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0e328d0de87f0dc1d5f61d7ca99f9658

    SHA1

    1eb16daae1e11812012176b34f979534d2613a6a

    SHA256

    c7e2737594f9a9532b6c3535eb689a2735e014fa5d43baa5574a74c882b8f2cb

    SHA512

    30283177c5f92bec53c1e739640775ff51ced294844b32b033bfcb54afa97609724d950b2781bd8f9427b6327521b13e558cef7ff1c46e6b18b86ed3f7769f8b