Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
Nuclear-Free.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Nuclear-Free.exe
Resource
win10v2004-20240802-en
General
-
Target
Nuclear-Free.exe
-
Size
124KB
-
MD5
262cc07e9bbe1eee2a04fed69fe02ca2
-
SHA1
3eedd0608fc413dc66a9eac597f755faaeaa4aef
-
SHA256
db096016b86351bff457c1ef6149a4f2680c21d79797218807a31b9ac2af3d81
-
SHA512
00789fb958107a6f631842a9f2f5abe1185c8f0fc0cf6f72cfd622e215b8c0b2d943e8e84c6b852b1e2be2ffb8aac2d848a2f2bafe2f733c529e821bf7d438d5
-
SSDEEP
1536:g7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIftwNiY8z6leO4:e7DhdC6kzWypvaQ0FxyNTBftRZz6k
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nuclear-Free.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2132 2212 Nuclear-Free.exe 31 PID 2212 wrote to memory of 2132 2212 Nuclear-Free.exe 31 PID 2212 wrote to memory of 2132 2212 Nuclear-Free.exe 31 PID 2212 wrote to memory of 2132 2212 Nuclear-Free.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nuclear-Free.exe"C:\Users\Admin\AppData\Local\Temp\Nuclear-Free.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\1F72.tmp\1F73.tmp\1F74.bat C:\Users\Admin\AppData\Local\Temp\Nuclear-Free.exe"2⤵PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e45f09baae514b0afcad5189ac51bac1
SHA19091d2b194beefe1fa4235577ae70ac8aa2d8fe6
SHA256445affc567a70d58a5184342b82d583e5523605a5b67a1937258aa5128a94d90
SHA5122d5ff1e0e299f12477e0e76582b7a4fe9da32d5443b8c8ea68988957c4b9f21c8d382795945030d56aed93f4940e93d30acc2bac97e6e28253b037406f7c79a4