Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
nexusLatest.rbxm
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
nexusLatest.rbxm
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
nexusLatest.rbxm
Resource
win11-20240508-en
General
-
Target
nexusLatest.rbxm
-
Size
88KB
-
MD5
4393ed07caf83c6f62262a1fe11f0e79
-
SHA1
1445d4ed1d91bdf33340ea10855639081a68bac4
-
SHA256
e8227a9f4a6d9f7bfd6d911ca3b7c65fc2e21f4d7c2e09fdb59f35d45ec9c539
-
SHA512
cb0e3d7194d8ac9f9f85488f3f6b8c8ffadaa3d0d524ff8c10c040299c05fd048a8c87cf065a17e92881ae0b541e06a994142e7f67015c7c96a58f8140441990
-
SSDEEP
1536:FAksIWfJ3jlUfNwbvd0MXI84mcFq3oNjz6JlArujLShy8k4:R+djIwmTNFqYdz6Xp/Shb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\rbxm_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\rbxm_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\rbxm_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\rbxm_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.rbxm rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.rbxm\ = "rbxm_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\rbxm_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\rbxm_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 AcroRd32.exe 2712 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2536 2872 cmd.exe 29 PID 2872 wrote to memory of 2536 2872 cmd.exe 29 PID 2872 wrote to memory of 2536 2872 cmd.exe 29 PID 2536 wrote to memory of 2712 2536 rundll32.exe 30 PID 2536 wrote to memory of 2712 2536 rundll32.exe 30 PID 2536 wrote to memory of 2712 2536 rundll32.exe 30 PID 2536 wrote to memory of 2712 2536 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\nexusLatest.rbxm1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\nexusLatest.rbxm2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\nexusLatest.rbxm"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
-
-