Overview
overview
10Static
static
10Nexus Checker.zip
windows7-x64
1Nexus Checker.zip
windows10-2004-x64
1Nexus Chec...er.exe
windows7-x64
7Nexus Chec...er.exe
windows10-2004-x64
8�G6����.pyc
windows7-x64
�G6����.pyc
windows10-2004-x64
Nexus Chec...er.exe
windows7-x64
7Nexus Chec...er.exe
windows10-2004-x64
10Stub.pyc
windows7-x64
3Stub.pyc
windows10-2004-x64
3Nexus Chec...ME.txt
windows7-x64
1Nexus Chec...ME.txt
windows10-2004-x64
1Nexus Chec...g.json
windows7-x64
3Nexus Chec...g.json
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 15:03
Behavioral task
behavioral1
Sample
Nexus Checker.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Nexus Checker.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Nexus Checker/Nexus Acc Verifyer.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Nexus Checker/Nexus Acc Verifyer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
�G6����.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
�G6����.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Nexus Checker/Nexus Checker.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Nexus Checker/Nexus Checker.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Stub.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Stub.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Nexus Checker/README.txt
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Nexus Checker/README.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Nexus Checker/config.json
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Nexus Checker/config.json
Resource
win10v2004-20240709-en
General
-
Target
Stub.pyc
-
Size
803KB
-
MD5
a8a0ac4cd2313eea6dc557a218ea3a93
-
SHA1
c9c4afaf48153320001bb288d8dabc15a8456322
-
SHA256
6bb789391161f0b409a2efbbc6ebf193e449f595bb6af345abe420b9a90e3568
-
SHA512
27f25c9cb48a05457c7cdf44c68e663f607a1d8eccbd7d0d174cc39482082412e3e260c02d1a598c443b8cd38c4b0b35648de884288a19019ee79dd87cf7c7af
-
SSDEEP
24576:+rxir6YBEGdwH7Egx/jdNco5CA0JFm9okvjp:C2Y7EJa1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 936 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 936 AcroRd32.exe 936 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 480 wrote to memory of 2332 480 cmd.exe 29 PID 480 wrote to memory of 2332 480 cmd.exe 29 PID 480 wrote to memory of 2332 480 cmd.exe 29 PID 2332 wrote to memory of 936 2332 rundll32.exe 32 PID 2332 wrote to memory of 936 2332 rundll32.exe 32 PID 2332 wrote to memory of 936 2332 rundll32.exe 32 PID 2332 wrote to memory of 936 2332 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f2afd1ae99ed026ea0a7eae1a43ee51a
SHA1c1fce0771c3276dc778e81e6fa625abb90d3d116
SHA256491c5dfe35227900bd464a74b9708ee4a490dd448d10f4439749b43b2ca9155a
SHA5124f303062a7324f19634f05a1d2e0440029f2d352d7bee70aba542b33fc31a251cd09fadd8cb8f2002b3dfc6f8c85f5cd22dd1a6096902a8ff64e6ffe0fb554ba