Overview
overview
10Static
static
10Nexus Checker.zip
windows7-x64
1Nexus Checker.zip
windows10-2004-x64
1Nexus Chec...er.exe
windows7-x64
7Nexus Chec...er.exe
windows10-2004-x64
8�G6����.pyc
windows7-x64
�G6����.pyc
windows10-2004-x64
Nexus Chec...er.exe
windows7-x64
7Nexus Chec...er.exe
windows10-2004-x64
10Stub.pyc
windows7-x64
3Stub.pyc
windows10-2004-x64
3Nexus Chec...ME.txt
windows7-x64
1Nexus Chec...ME.txt
windows10-2004-x64
1Nexus Chec...g.json
windows7-x64
3Nexus Chec...g.json
windows10-2004-x64
3Analysis
-
max time kernel
102s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 15:03
Behavioral task
behavioral1
Sample
Nexus Checker.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Nexus Checker.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Nexus Checker/Nexus Acc Verifyer.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Nexus Checker/Nexus Acc Verifyer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
�G6����.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
�G6����.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Nexus Checker/Nexus Checker.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Nexus Checker/Nexus Checker.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Stub.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Stub.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Nexus Checker/README.txt
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Nexus Checker/README.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Nexus Checker/config.json
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Nexus Checker/config.json
Resource
win10v2004-20240709-en
General
-
Target
Nexus Checker/config.json
-
Size
44B
-
MD5
1332014499b6149f2e77aaa675aa655e
-
SHA1
d5c5ff8279ead1053c49aa8b9e01c7da6c9f7d1a
-
SHA256
aa5c79f55be176639b2cf268aa24053408f9c57771f1213a0e2d2a56506aa855
-
SHA512
a5446a979851033c5e6fe17209fdfbabb2fa6bd60d9d21fb178a740d1043a5e7dc842ccd6eb0d1917382d13870172ca7098889af15b6bb7fd7f1e429744f3d1d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\json_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3044 2488 cmd.exe 30 PID 2488 wrote to memory of 3044 2488 cmd.exe 30 PID 2488 wrote to memory of 3044 2488 cmd.exe 30 PID 3044 wrote to memory of 2828 3044 rundll32.exe 31 PID 3044 wrote to memory of 2828 3044 rundll32.exe 31 PID 3044 wrote to memory of 2828 3044 rundll32.exe 31 PID 3044 wrote to memory of 2828 3044 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Nexus Checker\config.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nexus Checker\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nexus Checker\config.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5540991d51b966054e5d177cc4f6abcda
SHA1ebff4a9bd2518c877fe1a14b4b764518bab6ed9e
SHA256356168a68072d66f8960e52276eed8ee341ab04b360341d550b811a14f6da092
SHA512d96167dad963dc4e134da9ca75dd6faa70d8d8db0bce3f3710a31030f69c9c5e31af8f85e06f20d8494bd3263683991ea2019d50257df653968743ccd4ed6b0e