Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 11:58

General

  • Target

    NexLevel.exe

  • Size

    15.4MB

  • MD5

    dc10953a5a13efb02c9364e6402a59a5

  • SHA1

    46a9a168ca40850193575283327f0d76c20a7566

  • SHA256

    4dff0a17f8ad9a84e2fd81179d5e6f8b2a444f4628122a5d5f249ca2080460b5

  • SHA512

    56ad88e28887a8e221975dc5e5df6de1dd08ef43851f932b523292b120171bf4a8bcba0a151b22d76ce9493e495e0ebc281fab1948a76aabacade6742f04d296

  • SSDEEP

    393216:2ZkFsYUXRrGRBs66V1llpoFD45BS52wh:ROEHs6AjwFDk6f

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NexLevel.exe
    "C:\Users\Admin\AppData\Local\Temp\NexLevel.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Roaming\490b37b4-fe58-4cee-9859-4947c4c4cce3\Loader.exe
      "C:\Users\Admin\AppData\Roaming\490b37b4-fe58-4cee-9859-4947c4c4cce3\Loader.exe" eypoasl keymaster 1 1337
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\490b37b4-fe58-4cee-9859-4947c4c4cce3\cpprest_2_10.dll

    Filesize

    949KB

    MD5

    d17a216108f4ff1983cf1206204527ff

    SHA1

    79a3308291dfa6fed3e12b0de94ccd1b9362cdbd

    SHA256

    9be87a4a41fbe7e966c594c4fdce39252e89c94a9d12c03efb7950e243732ff2

    SHA512

    da1b723c116bf88e8e2cadeeebd47b3e1e20dad7dae79efd9aece398851d7d3398344670f77d707e4817171a193861082ec101b1aaf6317e21b798866ba91897

  • \Users\Admin\AppData\Roaming\490b37b4-fe58-4cee-9859-4947c4c4cce3\Loader.exe

    Filesize

    1012KB

    MD5

    d23fdc410ee9db72870f90ef8dafee52

    SHA1

    6b9ded58dbe605a29258b89da52a43c6cdf433c9

    SHA256

    451b88b175c7dbcec8001633070294b44da9007fcc223ec3abc5159d335533ab

    SHA512

    7af278bf5742d92bc41afae72d7e9c5da7e4c050856916806fec35a4036190440d47821c9824a05721d4718101b8d152afdd4fdd08ca43dfa1b2bda044dfdfb1

  • memory/2952-14-0x00000000778A0000-0x0000000077A49000-memory.dmp

    Filesize

    1.7MB

  • memory/2952-11-0x000000013FAB0000-0x00000001413F3000-memory.dmp

    Filesize

    25.3MB

  • memory/2952-13-0x000000013FAB0000-0x00000001413F3000-memory.dmp

    Filesize

    25.3MB

  • memory/2952-5-0x0000000077A60000-0x0000000077A62000-memory.dmp

    Filesize

    8KB

  • memory/2952-4-0x0000000077A50000-0x0000000077A52000-memory.dmp

    Filesize

    8KB

  • memory/2952-2-0x0000000077A50000-0x0000000077A52000-memory.dmp

    Filesize

    8KB

  • memory/2952-0-0x0000000077A50000-0x0000000077A52000-memory.dmp

    Filesize

    8KB

  • memory/2952-7-0x0000000077A60000-0x0000000077A62000-memory.dmp

    Filesize

    8KB

  • memory/2952-9-0x0000000077A60000-0x0000000077A62000-memory.dmp

    Filesize

    8KB

  • memory/2952-39-0x00000000778A0000-0x0000000077A49000-memory.dmp

    Filesize

    1.7MB

  • memory/2952-40-0x000000013FAB0000-0x00000001413F3000-memory.dmp

    Filesize

    25.3MB