Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05-01-2025 16:39
Static task
static1
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Nexol.exe
-
Size
340KB
-
MD5
3fc13f168ca72a690a0d4dbd9bac0e69
-
SHA1
74010009b8944bd0d0b534a84008253fed608c9a
-
SHA256
8a3fb85846036b30c76d954ef98fe64f1a6a782b2417db1cb0229050108dd532
-
SHA512
17c849c2080a3ccb69d959849fdc02cc2d9949a98dd750287427a2395d200afc13ba8ce342dbc9fcd1290061fa80dddfe47088e2f4a55712b821756eab945690
-
SSDEEP
6144:kTtAKnCj7ZrSsfCdPTwfnC16ISWHMFdsnv/bFRibJ28mAgg8oIKdeiuCBa6khpXp:qlgZGagMfe69UGdyRibJ23iuCBwpSOH
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4816 set thread context of 896 4816 Nexol.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 1732 4816 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4816 wrote to memory of 796 4816 Nexol.exe 91 PID 4816 wrote to memory of 796 4816 Nexol.exe 91 PID 4816 wrote to memory of 796 4816 Nexol.exe 91 PID 4816 wrote to memory of 896 4816 Nexol.exe 92 PID 4816 wrote to memory of 896 4816 Nexol.exe 92 PID 4816 wrote to memory of 896 4816 Nexol.exe 92 PID 4816 wrote to memory of 896 4816 Nexol.exe 92 PID 4816 wrote to memory of 896 4816 Nexol.exe 92 PID 4816 wrote to memory of 896 4816 Nexol.exe 92 PID 4816 wrote to memory of 896 4816 Nexol.exe 92 PID 4816 wrote to memory of 896 4816 Nexol.exe 92 PID 4816 wrote to memory of 896 4816 Nexol.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 1442⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4816 -ip 48161⤵PID:3780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=5744,i,11057550979060774106,2035785093901894313,262144 --variations-seed-version --mojo-platform-channel-handle=4028 /prefetch:81⤵PID:2884
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4656,i,11057550979060774106,2035785093901894313,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:81⤵PID:2952