Overview
overview
3Static
static
1_collections_abc.pyc
windows10-2004-x64
3_weakrefset.pyc
windows10-2004-x64
3abc.pyc
windows10-2004-x64
3codecs.pyc
windows10-2004-x64
3collection...__.pyc
windows10-2004-x64
3collections/abc.pyc
windows10-2004-x64
3copyreg.pyc
windows10-2004-x64
3encodings/...__.pyc
windows10-2004-x64
3encodings/aliases.pyc
windows10-2004-x64
3encodings/ascii.pyc
windows10-2004-x64
3encodings/...ec.pyc
windows10-2004-x64
3encodings/big5.pyc
windows10-2004-x64
3encodings/...cs.pyc
windows10-2004-x64
3encodings/...ec.pyc
windows10-2004-x64
3encodings/charmap.pyc
windows10-2004-x64
3encodings/cp037.pyc
windows10-2004-x64
3encodings/cp1006.pyc
windows10-2004-x64
3encodings/cp1026.pyc
windows10-2004-x64
3encodings/cp1125.pyc
windows10-2004-x64
3encodings/cp1140.pyc
windows10-2004-x64
3encodings/cp1250.pyc
windows10-2004-x64
3encodings/cp1251.pyc
windows10-2004-x64
3encodings/cp1252.pyc
windows10-2004-x64
3encodings/cp1253.pyc
windows10-2004-x64
3encodings/cp1254.pyc
windows10-2004-x64
3encodings/cp1255.pyc
windows10-2004-x64
3encodings/cp1256.pyc
windows10-2004-x64
3encodings/cp1257.pyc
windows10-2004-x64
3Nexx Priva...in.pkg
windows10-2004-x64
3Nexx Priva...n.html
windows10-2004-x64
1Nexx Priva...ain.py
windows10-2004-x64
3Nexx Priva...un.bat
windows10-2004-x64
1Analysis
-
max time kernel
1792s -
max time network
1803s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
_collections_abc.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
_weakrefset.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
abc.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
codecs.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
collections/__init__.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
collections/abc.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
copyreg.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
encodings/__init__.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
encodings/aliases.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
encodings/ascii.pyc
Resource
win10v2004-20240319-en
Behavioral task
behavioral11
Sample
encodings/base64_codec.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
encodings/big5.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
encodings/big5hkscs.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
encodings/bz2_codec.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
encodings/charmap.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
encodings/cp037.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
encodings/cp1006.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
encodings/cp1026.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
encodings/cp1125.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
encodings/cp1140.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
encodings/cp1250.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
encodings/cp1251.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
encodings/cp1252.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
encodings/cp1253.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
encodings/cp1254.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
encodings/cp1255.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
encodings/cp1256.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
encodings/cp1257.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Nexx Private V2/build/main/main.pkg
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
Nexx Private V2/build/main/xref-main.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Nexx Private V2/main.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral32
Sample
Nexx Private V2/run.bat
Resource
win10v2004-20240226-en
General
-
Target
collections/abc.pyc
-
Size
218B
-
MD5
a17254bb48980ade90f84d569e0cbc92
-
SHA1
530e5fcd010cca814c37a32db604bc4efbf0f2e7
-
SHA256
16ba4900c8cc21b1c20ecf6833a88c43dacfae9b47e8f4354859a3ecaa8585a4
-
SHA512
49c85f1ab7ca5a8b1245b16622d6c897abc096a6493931dd40fdc5b6c1137f7ebfa14999899e94e8a42b473b855ab3c3c23f3d08a6c4b9cd5971a090caea8f6b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4324 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2020 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\collections\abc.pyc1⤵
- Modifies registry class
PID:2500
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3224 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:4132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4084 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:2144
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:456
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4324