Resubmissions

24-06-2024 07:22

240624-h7nsyatfkr 3

24-06-2024 07:19

240624-h52l1stenl 4

Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 07:22

General

  • Target

    nexusLatest.rbxm

  • Size

    88KB

  • MD5

    4393ed07caf83c6f62262a1fe11f0e79

  • SHA1

    1445d4ed1d91bdf33340ea10855639081a68bac4

  • SHA256

    e8227a9f4a6d9f7bfd6d911ca3b7c65fc2e21f4d7c2e09fdb59f35d45ec9c539

  • SHA512

    cb0e3d7194d8ac9f9f85488f3f6b8c8ffadaa3d0d524ff8c10c040299c05fd048a8c87cf065a17e92881ae0b541e06a994142e7f67015c7c96a58f8140441990

  • SSDEEP

    1536:FAksIWfJ3jlUfNwbvd0MXI84mcFq3oNjz6JlArujLShy8k4:R+djIwmTNFqYdz6Xp/Shb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\nexusLatest.rbxm
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\nexusLatest.rbxm
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\nexusLatest.rbxm"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads