Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2024 07:09

General

  • Target

    Nexus-MultiTool-main/Helper/Funcs/start.py

  • Size

    1KB

  • MD5

    22f06d4980023fc58b8f5cd57025becc

  • SHA1

    e00edfd0dfa281a315ed6611127f18e7cee49890

  • SHA256

    0e7b36088530ba2f08513a34d715e776051a2e635b5895cf17b5e52ed76b62aa

  • SHA512

    a25b61d948344402eeb3d260bc7b8a5bc20886ed9fb3f7fe1c0e507fcc43943d8e5cb4a09534bb513e799141b0979fe95e93e5e5a5b1cbb48e29bfe7c45cb6fd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\start.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\start.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nexus-MultiTool-main\Helper\Funcs\start.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    220182c4c7f3f27aa6972048699ecb4a

    SHA1

    cf5daaa98bf1893b1cb2149af2584ba9f69d321f

    SHA256

    309b3fa9fa0ec7ac835a3a2142ac9fa9908136485af2e177c547b1eab8989fe3

    SHA512

    febcd9de48a81c771b46080c69a253a35bd04bb70c2bbe4d74b34a34ca3e605d61e9b7e21e1a313b0bc28bd1f3c345fec0fefb70c486be1bc1fe1d419e22b242