Analysis
-
max time kernel
425s -
max time network
459s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/08/2024, 09:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NUKER FOR VM.exe
Resource
win11-20240802-en
1 signatures
600 seconds
General
-
Target
NUKER FOR VM.exe
-
Size
35KB
-
MD5
e2dbe69e9611b8d5d766578db9ec7956
-
SHA1
567e620c198535e4ff3283e5013c7bfba4a961ab
-
SHA256
24a7161cdeda75a158b26be303c155b7da707d41c07d1dfdf4c389357d27f9c9
-
SHA512
d2e8e077dfa75521e7f978a8755480e584dcd498254641061106c9fc45dccf1b5b965d735525c7147be88dc28fc8fe4976449e8e6b1cef03fdea59918bb9bbbf
-
SSDEEP
768:ifSafnYvDnuWGQpV/gysgUq7OrRowyA7uBnTY2VL8w5KD2:gSG4nLV4an7OlJyH9TY2VL8w5KD2
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUKER FOR VM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NUKER FOR VM.exe"C:\Users\Admin\AppData\Local\Temp\NUKER FOR VM.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3604
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2852