Overview
overview
8Static
static
3NXYEdge.exe
windows10-2004-x64
8$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/certmgr.exe
windows10-2004-x64
1NXYEdgeInput.exe
windows10-2004-x64
7NXYEdgeService.exe
windows10-2004-x64
5NXYPassGuardX.exe
windows10-2004-x64
1certmgr.exe
windows10-2004-x64
1General
-
Target
NXYEdge.exe
-
Size
6.6MB
-
Sample
240716-k6hlmsvemn
-
MD5
53d4fdeb8399179c42721b82d85a7038
-
SHA1
ec8d3dd9c83de4b92b9830fc86a070ed23c2886a
-
SHA256
96112951c9628ff19dd9be4dd43f48d236fded6f9a4383cd8547ccba12577ba9
-
SHA512
1ef2cc1c7d8a3ee28d9a4130fde5ae63f7ada228a0b6866cacfa8a3a1ec97691cad5938775a754a378530c0eb1568e41c51dbb26b0e6c9063db25c1d3d6cc723
-
SSDEEP
196608:/TxiIjOPy6ybJ1KGhOdFMkYLyL4g92OENYsLYR0:/TxiIj2WKGhO2yL4g92OE+sLYR0
Static task
static1
Behavioral task
behavioral1
Sample
NXYEdge.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/killer.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$TEMP/certmgr.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
NXYEdgeInput.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
NXYEdgeService.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
NXYPassGuardX.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
certmgr.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
NXYEdge.exe
-
Size
6.6MB
-
MD5
53d4fdeb8399179c42721b82d85a7038
-
SHA1
ec8d3dd9c83de4b92b9830fc86a070ed23c2886a
-
SHA256
96112951c9628ff19dd9be4dd43f48d236fded6f9a4383cd8547ccba12577ba9
-
SHA512
1ef2cc1c7d8a3ee28d9a4130fde5ae63f7ada228a0b6866cacfa8a3a1ec97691cad5938775a754a378530c0eb1568e41c51dbb26b0e6c9063db25c1d3d6cc723
-
SSDEEP
196608:/TxiIjOPy6ybJ1KGhOdFMkYLyL4g92OENYsLYR0:/TxiIj2WKGhO2yL4g92OE+sLYR0
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/KillProcDLL.dll
-
Size
4KB
-
MD5
99f345cf51b6c3c317d20a81acb11012
-
SHA1
b3d0355f527c536ea14a8ff51741c8739d66f727
-
SHA256
c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93
-
SHA512
937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a436db0c473a087eb61ff5c53c34ba27
-
SHA1
65ea67e424e75f5065132b539c8b2eda88aa0506
-
SHA256
75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
-
SHA512
908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
SSDEEP
192:aVL7iZJX76BisO7+UZEw+Rl59pV8ghsVJ39dx8T:d7NsOpZsfLMJ39e
Score3/10 -
-
-
Target
$PLUGINSDIR/killer.dll
-
Size
6KB
-
MD5
16205cd992d3b3827573f93ab8923e4e
-
SHA1
4eece7a206ee619264d686ca1b3021b9f482866b
-
SHA256
967d66f23cf3d9d3e5a4d6a9c6e366e792a98cc8a293196095b10cd82da9a695
-
SHA512
257b2047b8e9303457bb050a760b8d2577da55642e4fb02933e6188d0591ff8adfe0c8df2a441577466f23a8e3bff2e94e9cfcfc381c4d255935123996c06d6d
-
SSDEEP
48:CRNdQ/SbTfx6gA6IMzLvM0Aoy3TYzyixX9o1TNRgPEgt/b82ebRuqSd7:mNGajxG+PWTwlSbpx
Score3/10 -
-
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
ab73c0c2a23f913eabdc4cb24b75cbad
-
SHA1
6569d2863d54c88dcf57c843fc310f6d9571a41e
-
SHA256
3d0060c5c9400a487dbefe4ac132dd96b07d3a4ba3badab46a7410a667c93457
-
SHA512
99d287b5152944f64edc7ce8f3ebcd294699e54a5b42ac7a88e27dff8a68278a5429f4d299802ee7ddbe290f1e3b6a372a5f3bb4ecb1a3c32e384bca3ccdb2b8
-
SSDEEP
96:EBABCcnl5TKhkfLxSslykcxM2DjDf3GE+Xv8Xav+Yx4MndY7ndS27gA:E6n+0SAfRE+/8ZYxldqn420
Score3/10 -
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
14f5984b926208de2aafb55dd9971d4a
-
SHA1
e5afe0b80568135d3e259c73f93947d758a7b980
-
SHA256
030bcfa82e3bb424835a5fa53a3ff17ab08557d3bbeea4815313036fc4bdafe1
-
SHA512
e9ec97dd57ead871789d49ed38d9fde5f31d3cb2547810cae49a736e06b9f9b28cf8efea825eb83c3e07d880ee798abfb9069c6957416d5973c83e4531814e27
-
SSDEEP
96:k7GUaYNwCLuGFctpiKFlYJ8hH4RVHpwdEeY3kRlDr6dMqqyVgNJ38:Wygp3FcHi0xhYMR8dMqJVgN
Score3/10 -
-
-
Target
$TEMP/certmgr.exe
-
Size
73KB
-
MD5
d56b22e2495e4cb73aefe3faef046c93
-
SHA1
383e9460d2426a98abfaad0e8dfca7dd436733c9
-
SHA256
38fe38349068c264ff653c2d1d273f2a8154f0da485364d962b83f2a75bddb45
-
SHA512
6d6213d6122d85171b910c392c717cd1a19d14f0b483accaf33f8677c841f92ccae4092fc47740a8a2a57098b68208416197c84b62ea41bd5790cf3c1b905dfa
-
SSDEEP
1536:ZI4kDjGubbXp3aGePmImYw+WXsA9iYzv7AA18Cy/S:u4Ybbb5qxPmImt+WXsoD8Cy/S
Score1/10 -
-
-
Target
NXYEdgeInput.exe
-
Size
5.5MB
-
MD5
b85f929d952a24f4cdafeadd840ae25e
-
SHA1
96ef8ace7e53f43fd7817d02a05dfdda98b2c64d
-
SHA256
1ae5cc383a4a34be3d0dbf4c8055a25ce2472b1d6e835f653b6df1828aaa29dc
-
SHA512
e3afc5a2eb0e94a6f01d6f60b471181d41d883ef0d9b03d6236f1f547fcd3898432468a52beb15cc8a88ce3eee6e8ee01624adb4b3834c86748700340000c2f8
-
SSDEEP
98304:co1yd/vl4r4h3D4Ug/3/jW+Yc/2ixfYOdV3UE6xdCielrBCJVOmZsmCk8xaMQYfl:cl/d4M3bg/3/jrROiZPMEiLJEmOmCTxv
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
NXYEdgeService.exe
-
Size
355KB
-
MD5
e7a6b7c8398b00a009eef67844539e72
-
SHA1
9bf746c47b00df4ff4f4818010be0d6b16a7f5ad
-
SHA256
76679bedf2c5959c700796902deea745bf3b567466216fcfaf12d8692b5c85a2
-
SHA512
fd94a4f94051aa103db9077cf0c0a533811dd9f4c6046401a5bc4ffd93199f7cd6303237cb77dce0565ab35fdd2e78786b28e0aaad5b367db7750513b26a915b
-
SSDEEP
6144:0L7a/neL1hvT45VRsHo3LKZQkQsKHYq2tTZsFf5DkKnoGptdue2N4awed280:Y4eL3U53sHuOQkQsKHH1znBtdun2awey
Score5/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
NXYPassGuardX.exe
-
Size
1.0MB
-
MD5
548f3296c90ceea8c85bab693f032093
-
SHA1
b9d0aa44e47dc3784607c08d4aac47d23c3fcbc0
-
SHA256
a0dfb5ee551c888a221b2763b67560e5032deaf78c448e9d699f97d7dbd248b3
-
SHA512
35ce5962d50114682a1f7f62bbcdc83d4f6fa9e3d899df46b31d9575b24b3b202bf54bf199128069c5d03768898ef36737adeda42e5e1bdbc8b2b282afc34fc6
-
SSDEEP
24576:qLPh4AjgcRov+reCJUcvVvCAyuHsJVvUwr+I1:qLPh4DjCeCDvF1lw56y
Score1/10 -
-
-
Target
certmgr.exe
-
Size
73KB
-
MD5
d56b22e2495e4cb73aefe3faef046c93
-
SHA1
383e9460d2426a98abfaad0e8dfca7dd436733c9
-
SHA256
38fe38349068c264ff653c2d1d273f2a8154f0da485364d962b83f2a75bddb45
-
SHA512
6d6213d6122d85171b910c392c717cd1a19d14f0b483accaf33f8677c841f92ccae4092fc47740a8a2a57098b68208416197c84b62ea41bd5790cf3c1b905dfa
-
SSDEEP
1536:ZI4kDjGubbXp3aGePmImYw+WXsA9iYzv7AA18Cy/S:u4Ybbb5qxPmImt+WXsoD8Cy/S
Score1/10 -