Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08-01-2025 12:56
Static task
static1
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Nexol.exe
-
Size
332KB
-
MD5
bc334056c86dd959ea3669c4c6f3701e
-
SHA1
02babf7c36e62232403dcf76d035a96245b6526e
-
SHA256
3efec1c708fdf1aeeb13308835684945746b79eb7012c5770b7f2c12d00a5bea
-
SHA512
c342bbdcc02e14c115388956e3897a0de13099782501ade55862a18f772e8c04e36aa8ef2c2d63c67746a8a9d75c0f36bbbb2dd749d5c278699e41f0c40d6823
-
SSDEEP
6144:thrnw2U+rkamz3p6945FjFizZ91hqtPYEy+vWLPMIUpibTMnfw7wCWlmbMNw1/m1:tJnw2Prkto9Fz2twE7wPxUsTKwnfbCwm
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
Extracted
lumma
https://soundtappysk.shop/api
https://femalsabler.shop/api
https://apporholis.shop/api
https://crowdwarek.shop/api
https://versersleep.shop/api
https://chipdonkeruz.shop/api
https://handscreamny.shop/api
https://robinsharez.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4600 set thread context of 4864 4600 Nexol.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 4556 4600 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4600 wrote to memory of 4864 4600 Nexol.exe 81 PID 4600 wrote to memory of 4864 4600 Nexol.exe 81 PID 4600 wrote to memory of 4864 4600 Nexol.exe 81 PID 4600 wrote to memory of 4864 4600 Nexol.exe 81 PID 4600 wrote to memory of 4864 4600 Nexol.exe 81 PID 4600 wrote to memory of 4864 4600 Nexol.exe 81 PID 4600 wrote to memory of 4864 4600 Nexol.exe 81 PID 4600 wrote to memory of 4864 4600 Nexol.exe 81 PID 4600 wrote to memory of 4864 4600 Nexol.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 2962⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4600 -ip 46001⤵PID:3144