Analysis

  • max time kernel
    118s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 23:58

General

  • Target

    NERO55/NERO/NEROFRA.dll

  • Size

    832KB

  • MD5

    dfeb61a4b228f42ff7a1acd4f3df7b44

  • SHA1

    39dbd9ddd63b3332fbaafc27625b0688740a3135

  • SHA256

    7782bac7f4cb075f329efcfb7cb06ca9620bd65cd364e76688b31a819d823823

  • SHA512

    67e4288a464aa5130a5a7f311bacae90bbe6c7294d44b503431c137aa54ad724bbe3239b69ee3440db65e021985c88cab10b627a73ce4604c1d9697e508c0bd3

  • SSDEEP

    6144:VFZEDXEMtIn5W8jdp0mY33/t3D+Gv6g35VjQE0/E:3UXzin5WgP0f33/t3D+GvVjQEH

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\NERO55\NERO\NEROFRA.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\NERO55\NERO\NEROFRA.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads