Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 09:01

General

  • Target

    Nexar X.exe

  • Size

    14KB

  • MD5

    2b81e63d0b8c764e174067c32e08023b

  • SHA1

    704f153eb599702efe0d9ba02178e0fece1956e9

  • SHA256

    ad86aafc5c61db909f5206103dd0bfbd21a12107c81c36120b9cddbcbfe9c522

  • SHA512

    bc896ddb42f7e5569067c871b74a0ac73a521263e078f6ffcb04763c96a32f6fb47effec300b0a68e823f55411377066a61fbb276bf63b559d39cb90aa1758cd

  • SSDEEP

    384:3INuyM2kIIjty2H6p+ZkUhT9yWhHeHjzlH+VGqVAfX:3Ifa6SH7VGqg

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nexar X.exe
    "C:\Users\Admin\AppData\Local\Temp\Nexar X.exe"
    1⤵
      PID:220
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 1048
        2⤵
        • Program crash
        PID:5036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 220 -ip 220
      1⤵
        PID:1064
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1060

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/220-0-0x0000000074E1E000-0x0000000074E1F000-memory.dmp

        Filesize

        4KB

      • memory/220-1-0x00000000006C0000-0x00000000006CA000-memory.dmp

        Filesize

        40KB

      • memory/220-2-0x0000000005720000-0x0000000005CC4000-memory.dmp

        Filesize

        5.6MB

      • memory/220-3-0x00000000050C0000-0x0000000005152000-memory.dmp

        Filesize

        584KB

      • memory/220-5-0x0000000074E10000-0x00000000755C0000-memory.dmp

        Filesize

        7.7MB

      • memory/220-4-0x0000000005170000-0x000000000517A000-memory.dmp

        Filesize

        40KB

      • memory/220-6-0x0000000074E10000-0x00000000755C0000-memory.dmp

        Filesize

        7.7MB

      • memory/1060-7-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-9-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-8-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-19-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-18-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-17-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-16-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-15-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-14-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB

      • memory/1060-13-0x000002C721ED0000-0x000002C721ED1000-memory.dmp

        Filesize

        4KB