Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 11:58
Static task
static1
Behavioral task
behavioral1
Sample
NexLevel.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
NexLevel.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
cpprest_2_10.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
cpprest_2_10.dll
Resource
win10v2004-20240419-en
General
-
Target
NexLevel.exe
-
Size
15.4MB
-
MD5
dc10953a5a13efb02c9364e6402a59a5
-
SHA1
46a9a168ca40850193575283327f0d76c20a7566
-
SHA256
4dff0a17f8ad9a84e2fd81179d5e6f8b2a444f4628122a5d5f249ca2080460b5
-
SHA512
56ad88e28887a8e221975dc5e5df6de1dd08ef43851f932b523292b120171bf4a8bcba0a151b22d76ce9493e495e0ebc281fab1948a76aabacade6742f04d296
-
SSDEEP
393216:2ZkFsYUXRrGRBs66V1llpoFD45BS52wh:ROEHs6AjwFDk6f
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2572 Loader.exe -
Loads dropped DLL 2 IoCs
pid Process 2952 NexLevel.exe 2572 Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2952 NexLevel.exe 2952 NexLevel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 NexLevel.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 NexLevel.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2952 NexLevel.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2572 2952 NexLevel.exe 28 PID 2952 wrote to memory of 2572 2952 NexLevel.exe 28 PID 2952 wrote to memory of 2572 2952 NexLevel.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NexLevel.exe"C:\Users\Admin\AppData\Local\Temp\NexLevel.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\490b37b4-fe58-4cee-9859-4947c4c4cce3\Loader.exe"C:\Users\Admin\AppData\Roaming\490b37b4-fe58-4cee-9859-4947c4c4cce3\Loader.exe" eypoasl keymaster 1 13372⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
949KB
MD5d17a216108f4ff1983cf1206204527ff
SHA179a3308291dfa6fed3e12b0de94ccd1b9362cdbd
SHA2569be87a4a41fbe7e966c594c4fdce39252e89c94a9d12c03efb7950e243732ff2
SHA512da1b723c116bf88e8e2cadeeebd47b3e1e20dad7dae79efd9aece398851d7d3398344670f77d707e4817171a193861082ec101b1aaf6317e21b798866ba91897
-
Filesize
1012KB
MD5d23fdc410ee9db72870f90ef8dafee52
SHA16b9ded58dbe605a29258b89da52a43c6cdf433c9
SHA256451b88b175c7dbcec8001633070294b44da9007fcc223ec3abc5159d335533ab
SHA5127af278bf5742d92bc41afae72d7e9c5da7e4c050856916806fec35a4036190440d47821c9824a05721d4718101b8d152afdd4fdd08ca43dfa1b2bda044dfdfb1