Overview
overview
3Static
static
3nexus.rar
windows7-x64
3nexus.rar
windows10-2004-x64
3nexus/Colo...le.dll
windows7-x64
1nexus/Colo...le.dll
windows10-2004-x64
1nexus/Leaf.xNet.dll
windows7-x64
1nexus/Leaf.xNet.dll
windows10-2004-x64
1nexus/Newt...on.dll
windows7-x64
1nexus/Newt...on.dll
windows10-2004-x64
1nexus/NexusFN.exe
windows7-x64
1nexus/NexusFN.exe
windows10-2004-x64
1Resubmissions
11/06/2024, 22:00
240611-1wsa4atclj 311/06/2024, 21:59
240611-1v3enstbqe 311/06/2024, 21:55
240611-1sssfstbkf 3Analysis
-
max time kernel
61s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
nexus.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
nexus.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
nexus/Colorful.Console.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
nexus/Colorful.Console.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
nexus/Leaf.xNet.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
nexus/Leaf.xNet.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
nexus/Newtonsoft.Json.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
nexus/Newtonsoft.Json.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
nexus/NexusFN.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
nexus/NexusFN.exe
Resource
win10v2004-20240508-en
General
-
Target
nexus.rar
-
Size
396KB
-
MD5
0a0a792644f7dff6190ab70b5b5019c0
-
SHA1
2303b3d609dfb7e50639846b623e804f0e686568
-
SHA256
02e64db97eb1426e0375aef01fcdca3dbd5a9031f8087ba3454f4c74c51fdf08
-
SHA512
4664c103e2603f3df4fd8e308ee60495f21cbc124cec6d55075db6b2d970f58110a4814928cfde53524070804ab239228843a6fcb305c6d49a0683bf045a9cbc
-
SSDEEP
12288:usW/YO53NAFGcgDN4WPf0A+icha0ylQ9sVOOxz1:uZ9NfCWngFylQ9qOW1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1864 OpenWith.exe -
Suspicious use of SetWindowsHookEx 49 IoCs
pid Process 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe 1864 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\nexus.rar1⤵
- Modifies registry class
PID:4056
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1864