Analysis

  • max time kernel
    425s
  • max time network
    459s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/08/2024, 09:52

General

  • Target

    NUKER FOR VM.exe

  • Size

    35KB

  • MD5

    e2dbe69e9611b8d5d766578db9ec7956

  • SHA1

    567e620c198535e4ff3283e5013c7bfba4a961ab

  • SHA256

    24a7161cdeda75a158b26be303c155b7da707d41c07d1dfdf4c389357d27f9c9

  • SHA512

    d2e8e077dfa75521e7f978a8755480e584dcd498254641061106c9fc45dccf1b5b965d735525c7147be88dc28fc8fe4976449e8e6b1cef03fdea59918bb9bbbf

  • SSDEEP

    768:ifSafnYvDnuWGQpV/gysgUq7OrRowyA7uBnTY2VL8w5KD2:gSG4nLV4an7OlJyH9TY2VL8w5KD2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NUKER FOR VM.exe
    "C:\Users\Admin\AppData\Local\Temp\NUKER FOR VM.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3604
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2852

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads