Overview
overview
10Static
static
3NerestPC f....1.exe
windows7-x64
10NerestPC f....1.exe
windows10-2004-x64
10NerestPC f...db.dll
ubuntu-24.04-amd64
NerestPC f...pi.dll
windows7-x64
3NerestPC f...pi.dll
windows10-2004-x64
3NerestPC f...pi.dll
windows7-x64
3NerestPC f...pi.dll
windows10-2004-x64
3NerestPC f...db.exe
windows7-x64
3NerestPC f...db.exe
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
NerestPC free/NerestPCFree 0.31.1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
NerestPC free/NerestPCFree 0.31.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NerestPC free/bin/Adb.dll
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral4
Sample
NerestPC free/bin/AdbWinApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
NerestPC free/bin/AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
NerestPC free/bin/AdbWinUsbApi.dll
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
NerestPC free/bin/AdbWinUsbApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
NerestPC free/bin/adb.exe
Resource
win7-20241010-en
Behavioral task
behavioral9
Sample
NerestPC free/bin/adb.exe
Resource
win10v2004-20241007-en
General
-
Target
NerestPC free/bin/AdbWinUsbApi.dll
-
Size
71KB
-
MD5
f67d9ec28d19316754d7ecb0e990197d
-
SHA1
a82ba3ad1a0749dd91eaac34dced3622d10dba54
-
SHA256
13918fdab0c3ac77d077453a6036247cfeca10910aec845f188c41148c630bb2
-
SHA512
abd80e386ce282bbb4727c7bd795d7bb0046fecfe65b005c98609f18b341606166187e951a5beacb5112726eab28bf9b75b383cb55ca9d0303b286389fd25022
-
SSDEEP
1536:q72doFmOiHizFbPlspcsbj5ZsP+YeTs1pH7tsPxHt:qSSfN9+YeTs1pHJcxN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2592 1980 rundll32.exe 30 PID 1980 wrote to memory of 2592 1980 rundll32.exe 30 PID 1980 wrote to memory of 2592 1980 rundll32.exe 30 PID 1980 wrote to memory of 2592 1980 rundll32.exe 30 PID 1980 wrote to memory of 2592 1980 rundll32.exe 30 PID 1980 wrote to memory of 2592 1980 rundll32.exe 30 PID 1980 wrote to memory of 2592 1980 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\NerestPC free\bin\AdbWinUsbApi.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\NerestPC free\bin\AdbWinUsbApi.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2592
-