Overview
overview
7Static
static
3Debug/Micr...es.xml
windows7-x64
3Debug/Micr...es.xml
windows10-2004-x64
1Debug/Mona...xclude
windows7-x64
1Debug/Mona...xclude
windows10-2004-x64
1Debug/Mona...ar.ttf
windows7-x64
4Debug/Mona...ar.ttf
windows10-2004-x64
7Debug/Mona....woff2
windows7-x64
3Debug/Mona....woff2
windows10-2004-x64
3Debug/Mona...on.ttf
windows7-x64
4Debug/Mona...on.ttf
windows10-2004-x64
7Debug/Nexa..._1.zip
windows7-x64
1Debug/Nexa..._1.zip
windows10-2004-x64
1Debug/Nexa..._1.zip
windows7-x64
1Debug/Nexa..._1.zip
windows10-2004-x64
1Debug/Nexa..._1.zip
windows7-x64
1Debug/Nexa..._1.zip
windows10-2004-x64
1Debug/Nexa..._1.zip
windows7-x64
1Debug/Nexa..._1.zip
windows10-2004-x64
1Debug/Nexa..._1.zip
windows7-x64
1Debug/Nexa..._1.zip
windows10-2004-x64
1Debug/Nexa...s.json
windows7-x64
3Debug/Nexa...s.json
windows10-2004-x64
3Debug/Nexa...af.hyb
windows7-x64
3Debug/Nexa...af.hyb
windows10-2004-x64
3Debug/Nexa...as.hyb
windows7-x64
3Debug/Nexa...as.hyb
windows10-2004-x64
3Debug/Nexa...be.hyb
windows7-x64
3Debug/Nexa...be.hyb
windows10-2004-x64
3Debug/Nexa...bg.hyb
windows7-x64
3Debug/Nexa...bg.hyb
windows10-2004-x64
3Debug/Nexa...bn.hyb
windows7-x64
3Debug/Nexa...bn.hyb
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
Debug/Microsoft.Bcl.AsyncInterfaces.xml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Debug/Microsoft.Bcl.AsyncInterfaces.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Debug/Monaco/.git/info/exclude
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Debug/Monaco/.git/info/exclude
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Debug/Monaco/Fonts/JetBrainsMono-Regular.ttf
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Debug/Monaco/Fonts/JetBrainsMono-Regular.ttf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Debug/Monaco/Fonts/JetBrainsMono-Regular.woff2
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Debug/Monaco/Fonts/JetBrainsMono-Regular.woff2
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Debug/Monaco/vs/base/browser/ui/codicons/codicon/codicon.ttf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Debug/Monaco/vs/base/browser/ui/codicons/codicon/codicon.ttf
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/fppmbhmldokgmleojlplaaodlkibgikh_1.zip
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/fppmbhmldokgmleojlplaaodlkibgikh_1.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/kpfehajjjbbcifeehjgfgnabifknmdad_1.zip
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/kpfehajjjbbcifeehjgfgnabifknmdad_1.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/ndikpojcjlepofdkaaldkinkjbeeebkl_1.zip
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/ndikpojcjlepofdkaaldkinkjbeeebkl_1.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/oankkpibpaokgecfckkdkgaoafllipag_1.zip
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/oankkpibpaokgecfckkdkgaoafllipag_1.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/ohckeflnhegojcjlcpbfpciadgikcohk_1.zip
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Debug/Nexam.exe.WebView2/EBWebView/component_crx_cache/ohckeflnhegojcjlcpbfpciadgikcohk_1.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/_metadata/verified_contents.json
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/_metadata/verified_contents.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-af.hyb
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-af.hyb
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-as.hyb
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-as.hyb
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-be.hyb
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-be.hyb
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-bg.hyb
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-bg.hyb
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-bn.hyb
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-bn.hyb
Resource
win10v2004-20241007-en
General
-
Target
Debug/Nexam.exe.WebView2/EBWebView/hyphen-data/120.0.6050.0/hyph-bn.hyb
-
Size
703B
-
MD5
8961fdd3db036dd43002659a4e4a7365
-
SHA1
7b2fa321d50d5417e6c8d48145e86d15b7ff8321
-
SHA256
c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
-
SHA512
531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2852 AcroRd32.exe 2852 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2568 2220 cmd.exe 31 PID 2220 wrote to memory of 2568 2220 cmd.exe 31 PID 2220 wrote to memory of 2568 2220 cmd.exe 31 PID 2568 wrote to memory of 2852 2568 rundll32.exe 33 PID 2568 wrote to memory of 2852 2568 rundll32.exe 33 PID 2568 wrote to memory of 2852 2568 rundll32.exe 33 PID 2568 wrote to memory of 2852 2568 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Debug\Nexam.exe.WebView2\EBWebView\hyphen-data\120.0.6050.0\hyph-bn.hyb1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Debug\Nexam.exe.WebView2\EBWebView\hyphen-data\120.0.6050.0\hyph-bn.hyb2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Debug\Nexam.exe.WebView2\EBWebView\hyphen-data\120.0.6050.0\hyph-bn.hyb"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a81038ac7ea173c602d8a137c3356b0d
SHA1fbc9fc84d326c660f34546be3fe7d9050e9e291d
SHA25683b234075c5f776f0ea4676081c20c957ae509f607e53334352adf8dfcf42a42
SHA512ae1a86b181db3e50b28a9c85580470b55de326abb247afa2b1c515ec8d9b8bb24bd703531f2a7911fdcb20c4ef483aaad30b4e51aa6c6ec7664ae30810ee94ca