Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-01-2025 12:56
Static task
static1
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Nexol.exe
-
Size
332KB
-
MD5
bc334056c86dd959ea3669c4c6f3701e
-
SHA1
02babf7c36e62232403dcf76d035a96245b6526e
-
SHA256
3efec1c708fdf1aeeb13308835684945746b79eb7012c5770b7f2c12d00a5bea
-
SHA512
c342bbdcc02e14c115388956e3897a0de13099782501ade55862a18f772e8c04e36aa8ef2c2d63c67746a8a9d75c0f36bbbb2dd749d5c278699e41f0c40d6823
-
SSDEEP
6144:thrnw2U+rkamz3p6945FjFizZ91hqtPYEy+vWLPMIUpibTMnfw7wCWlmbMNw1/m1:tJnw2Prkto9Fz2twE7wPxUsTKwnfbCwm
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3644 set thread context of 2548 3644 Nexol.exe 79 PID 3644 set thread context of 2304 3644 Nexol.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 1144 3644 WerFault.exe 76 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3644 wrote to memory of 1380 3644 Nexol.exe 78 PID 3644 wrote to memory of 1380 3644 Nexol.exe 78 PID 3644 wrote to memory of 1380 3644 Nexol.exe 78 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2548 3644 Nexol.exe 79 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80 PID 3644 wrote to memory of 2304 3644 Nexol.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 8282⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3644 -ip 36441⤵PID:1032