Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09/01/2025, 17:44
Static task
static1
General
-
Target
refx_nexus_4.5.17.exe
-
Size
793.2MB
-
MD5
421a48bd40a5f106ad5deb45ce5544df
-
SHA1
e10329037ea520b2935070abe9ed25d3b2c1d7a9
-
SHA256
027ffc79501cbef364b66eb1ed4cc0db213eb7aa2bc4bf30c8d2b52815c36ee9
-
SHA512
c3a5b0ba4640eda54f25e9419b6c2811790ee4ab20f45af02f599a5453613cf49098175e3ccbf8142edbed93644f6bcc49816d53e7cfadbf762e678a9c06b975
-
SSDEEP
393216:WfdIAmhCcTzIFvdK+ew0E8j75IYGWxTZae5qndVmzuhyxE+RuHXM0H:cNcvIBdgj5nnQ8y
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
https://breathauthorit.cyou/api
Extracted
lumma
https://breathauthorit.cyou/api
Signatures
-
Lumma family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation refx_nexus_4.5.17.exe -
Executes dropped EXE 1 IoCs
pid Process 4116 Transparency.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 688 tasklist.exe 2632 tasklist.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\CourtIrs refx_nexus_4.5.17.exe File opened for modification C:\Windows\ColumbiaMadness refx_nexus_4.5.17.exe File opened for modification C:\Windows\RobertSwim refx_nexus_4.5.17.exe File opened for modification C:\Windows\AcademicMiss refx_nexus_4.5.17.exe File opened for modification C:\Windows\PsMyspace refx_nexus_4.5.17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Transparency.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language refx_nexus_4.5.17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4116 Transparency.com 4116 Transparency.com 4116 Transparency.com 4116 Transparency.com 4116 Transparency.com 4116 Transparency.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 688 tasklist.exe Token: SeDebugPrivilege 2632 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4116 Transparency.com 4116 Transparency.com 4116 Transparency.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4116 Transparency.com 4116 Transparency.com 4116 Transparency.com -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4972 wrote to memory of 2992 4972 refx_nexus_4.5.17.exe 89 PID 4972 wrote to memory of 2992 4972 refx_nexus_4.5.17.exe 89 PID 4972 wrote to memory of 2992 4972 refx_nexus_4.5.17.exe 89 PID 2992 wrote to memory of 688 2992 cmd.exe 92 PID 2992 wrote to memory of 688 2992 cmd.exe 92 PID 2992 wrote to memory of 688 2992 cmd.exe 92 PID 2992 wrote to memory of 2804 2992 cmd.exe 93 PID 2992 wrote to memory of 2804 2992 cmd.exe 93 PID 2992 wrote to memory of 2804 2992 cmd.exe 93 PID 2992 wrote to memory of 2632 2992 cmd.exe 94 PID 2992 wrote to memory of 2632 2992 cmd.exe 94 PID 2992 wrote to memory of 2632 2992 cmd.exe 94 PID 2992 wrote to memory of 2532 2992 cmd.exe 95 PID 2992 wrote to memory of 2532 2992 cmd.exe 95 PID 2992 wrote to memory of 2532 2992 cmd.exe 95 PID 2992 wrote to memory of 4128 2992 cmd.exe 97 PID 2992 wrote to memory of 4128 2992 cmd.exe 97 PID 2992 wrote to memory of 4128 2992 cmd.exe 97 PID 2992 wrote to memory of 1692 2992 cmd.exe 98 PID 2992 wrote to memory of 1692 2992 cmd.exe 98 PID 2992 wrote to memory of 1692 2992 cmd.exe 98 PID 2992 wrote to memory of 1328 2992 cmd.exe 99 PID 2992 wrote to memory of 1328 2992 cmd.exe 99 PID 2992 wrote to memory of 1328 2992 cmd.exe 99 PID 2992 wrote to memory of 2720 2992 cmd.exe 100 PID 2992 wrote to memory of 2720 2992 cmd.exe 100 PID 2992 wrote to memory of 2720 2992 cmd.exe 100 PID 2992 wrote to memory of 2856 2992 cmd.exe 101 PID 2992 wrote to memory of 2856 2992 cmd.exe 101 PID 2992 wrote to memory of 2856 2992 cmd.exe 101 PID 2992 wrote to memory of 4116 2992 cmd.exe 102 PID 2992 wrote to memory of 4116 2992 cmd.exe 102 PID 2992 wrote to memory of 4116 2992 cmd.exe 102 PID 2992 wrote to memory of 2148 2992 cmd.exe 103 PID 2992 wrote to memory of 2148 2992 cmd.exe 103 PID 2992 wrote to memory of 2148 2992 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\refx_nexus_4.5.17.exe"C:\Users\Admin\AppData\Local\Temp\refx_nexus_4.5.17.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Airfare Airfare.cmd & Airfare.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4126413⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Game3⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Ieee" Care3⤵
- System Location Discovery: System Language Discovery
PID:1328
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 412641\Transparency.com + Sandwich + Debug + Yr + Lincoln + Logos + Forth + Whole + Az + Contributor 412641\Transparency.com3⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Introductory + ..\Hall + ..\Provide + ..\Row + ..\Adidas + ..\Electronic + ..\Midwest D3⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\412641\Transparency.comTransparency.com D3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4116
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
481KB
MD50c3edf35ac4b16c96c96263f5690c4ca
SHA1b4bfd35f66703ded75b909108b37151baacd5315
SHA2560d8a755776bfe01badb823cfee4170e666c929cc6b61ea01a913064e3c30256a
SHA5122e66b11b735510d4cbfe8ebe8e4129168eadf765263c17e915a1d4067ad275b400732d092619b3e1b3145c64fa2150b9724f54b38ec579803b77ff091a60dd4c
-
Filesize
1KB
MD58a2ff2169a07f088928804af5655a116
SHA1b77f2e636bdeb76e1d349a589f19bcfde854ef3d
SHA256d4a8640893eb00e6c868db4194f434f74bf3390e202aa77d788d9b2c1a27808c
SHA512a48e876bcae05c4ebc0d30715a0d2303647871bde5a1e43bc0bf38b5982aad0ca01eb6fdf2ca13a8d45f2e75a277771f1c7d50c30b2af23dcaaf660c8dc548e6
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
50KB
MD58890ad30217b5eac28a806c9f6646826
SHA1afd0283e69996ffbe1a0032012706fa2f75001e7
SHA256054fa236b21affc36c8fd8d5334816e1cb40b7979671af696c9948d90945ea9f
SHA51213e19ee19f385fb0d50d498cd034cdd9bd4c379cc001f470c5e1bb95b8061516717fb6f3503ce6b3cde45bc937f3ae1387dd0810f2b57204250601dac727d76a
-
Filesize
18KB
MD525d9238d8454b26e9a9cb229c98bb520
SHA15417100dfd897da358d0bb9c013a834a7e059107
SHA256894a2fc5415442dcb534ff571f78831188d29e44668f432f21e1660ef12ec251
SHA512937ceb26875b6554c255ada796b80c12ac577289f6c34e1dcc5743308d5028b3fa63913d16e90651594b9771a3d6d01ed077d5f673c9ce67df9825209339ebd0
-
Filesize
146KB
MD5f9186f6da3e4c3b6a8f644ef35c13475
SHA10f103554610d4b06a2298e788d1ea2e210304265
SHA256bfe6f657bb5f67d1b94ebe0c00c27f06fc22d84274f5fc3f346d6b589be1acba
SHA5128d75ad6e311faf72ebe2e2a540a2c448efb076a97500f9bdd2ce99d1ead503dc394478cfe8a82190e9c8d622a0d4ec24ac79b0afaefd256c5893fdfed033fba7
-
Filesize
1KB
MD544eb9df3267c5181eaa90b2288157501
SHA11bd9acfef72eeb5dd2839539b679de235b2fd19c
SHA256688a20527200703b8bd423c6d5d472132a0b121841f510e3b5975ef4305a482e
SHA51250872ed9f26bf10a83f2bb72821d0cfd4881a0101fb5beaf011dacf5c54b22409d7e9c89549fbec89e7accd1623eade2dfa6fc1909b7dad238553e5c30c75ae5
-
Filesize
41KB
MD56208d841411b7ff00e91ed79cb19613c
SHA159a09fdca4c21f1f47522c2e1dc292ecca6222c4
SHA256c40977c34c4307a530a61d712a57405d8e9e303c54310a4cb51b66c9fa88327a
SHA51201b6657ff7b5fd6180d167ad16dd55deb706f2c0bd04d1a55d7cf6058cb907639ad64d69535d74f8af2a122bc9c2bc1f3fffe08424d243d6c91ac084d7629d20
-
Filesize
108KB
MD54cfa622df8e07dd1ab9eba5c66b12dcc
SHA106fd48637aa167d04cee86e58ee035732b201f16
SHA2567d74344414fdeb7be797fb12144a390245130a505100607dd924e6473ade6318
SHA512f2ff34b55d684663dc4350953d2486c89eea85d78163a6adf4e91b9a6054ae7b05a6c7abbbfe42ee465595870ab99f71e419b84d4f01394a3f7660df13b7fba6
-
Filesize
89KB
MD582952dacc84d83a87ded1197f0141b79
SHA1a3c5731314ffb65e7e4235d38b3178764f9b66f6
SHA256dc396d66af1711dbb966cb79f74f4beeefa83ef9c43736b0019ea6384383ddc7
SHA51222a307e3b61eb997e5e2e91779cc972a0e4e4bfe031da6176a8dd7a4eef3373d3e2c2e5da645e8158bc0526d8d1896c77d63553916b812601b2480e075d60f87
-
Filesize
107KB
MD505b03a2332d090e42ed3b18c304383c8
SHA1c3afb8301895445ee942ff221d612b98328d837d
SHA256c394b91818796e889470a2abe97a51462bad6ae515a73d789237b465ac1fa52c
SHA51200a732e56693ea3952f94c3439570ee2250bc1ac0e47e6f550ab53a5a68cc51f419662ed6e2fd2f6723638f0a56b571d1f90fa40da68630860b93de75f345df8
-
Filesize
477KB
MD50b4236ee1e6350c30fbc43b4df21714a
SHA1a47d0148c539f8f02e3cb243e726d4074868923e
SHA256e6f9e5da28273b3febc71b10fac7856d16a29ecd43b200e54130fad034bd06bb
SHA512ed3eb9b88333cc0284cc33730103a8859078e25492d7d4a94e38bf3440b7eca2e0ad3defeb38b2e3a3ac2922df97486e102415883bb9b0d2f3c2735805c3a909
-
Filesize
59KB
MD555adfbea53950d4c53d8be4554f1fa72
SHA161a4fd8ac6637a9ff2956ed86c0db9200af42fcb
SHA2563bea64f987a506e9b1a8ef9d7a817a6a9dafec35e3872226bc6e534b54e06fb1
SHA51279dac2f5d0f2296029f67c282b51bb87b16c22947b425793e20d77c39c4907c8c16395edac9608441af9c55c6eb20935c31a430b889826c9b947b887efa67d8c
-
Filesize
58KB
MD545cad5710cf32a1b405656194cb286a1
SHA17fbb73ce6f09b1b47b08b882b57cafb06761e4e9
SHA256eaeb62c9055c367a954a454ce6e65d9f995720e8a057bb801a6698afa6aa1470
SHA512a5d3d3bc82f56cdc4afbc19a2efd4347fd07421e86f7d97e00a5424126be8f5bd1655cdaa8def2472ef1449793810d9050d60b3870f712f0f34f39347421639a
-
Filesize
118KB
MD513c3c8e5d05f6fbefe9ed8f22e8b617d
SHA17a3a0cf920747661e6dde7c783d9eacf8440ae3f
SHA256e7969ae321cb61b7cbb8fc3ce002fe884f3d6b2deeaf0cce19eb0adb13624dd1
SHA51208ddd0c83d884f2c6a337054ff0c3230f9bd0432eaeb7b553877b27276c2645f3bf9d9aab887ada989241f5c3ec8fa9633ce5b5c808b823833ddd9edc95da054
-
Filesize
125KB
MD5bc6ab270f03dfbd5329aea95f451d3b0
SHA18a13c5e7bfc51e763da990243eb8e56dd9609d00
SHA2568e605cf4ffa066438b355076af8230e84da4c9c3dff33d35b0b02b932e80ca7e
SHA512632078cd4969b52ace062c79421f1d1e5383a35477bd5c322a1319823f117e204b2ede88874400e5d11ccea0be5dea46a233700d19a05683fb492730c71e588b
-
Filesize
40KB
MD5d2a8164fb8c5f663a2272f8d75232fcb
SHA195ff11101bea0a60d067b483c3323567cc613d1b
SHA2566309998f0a4911ee4ca067eb9feb974e5de7c95db6524e66086c7c1b57265bb5
SHA512f631bd964f09db2734bd207750a3a57804e57d30a68560d02f66ad5c3e4c6ce9fa7403b297b1caf6140390dec9f14e8c50c59e4e3ed9a2a3016f67bbb0bcaa45
-
Filesize
91KB
MD53f8be08648f90fbcbcb0ffd959e5ecd4
SHA1641c894a38113ccb575a297d248d5945781900d4
SHA256cf70a05214afa5f50f9475c6686b9801f720720563c15728fcb20b95571694ae
SHA5125ef3a8f497082dc1cdfc120f9351d55a4ade9c8422e26575440ffed2266f9978ec1d9b6149727a493b2f31da82aa1d22b15ab8744026124e06bc67514b26c1a0
-
Filesize
94KB
MD58539f0ba658079fc94e2bde2d53549c9
SHA184a7d8945f4a00822ae2b38c05f79a264838b68e
SHA2560cedc573b3f5c67842872f2dc2650ce4c45111be26d17902be26a8050e7814fd
SHA512ee566d3e4c7ca3fd22fb74cf02d26d4857da87e2d242e0d9e896b1fe56fa348d5757a7d642266d46af4893fb23c8a4a4a0786cb621e5b46543c8bdadce0905f6
-
Filesize
125KB
MD5dca7d73b3e0ecc2bc23c202f575d0807
SHA1d6bf2826679455a687c0c859fe8148626a574f3c
SHA2566ef6ac9a1919cd0482fc4a6884267e50fe6ff13198afc0f8e5090d7bc9fb513b
SHA512ce40e672f08b48372fa109b64510e28107760b41ccb26a728e52e9a377d52537160b53758f6ad87db3d75c5265ebba41f029a2d47652239de784b64ee1e7a38b
-
Filesize
60KB
MD5e6b82e5ba90de9145a46f8a9d4588339
SHA10792b08d247f81854997627792e9f916b1fb1e8a
SHA2567486b6a13efeade618dc9f160784605048e06c38480059af6a70bc8f74cc0555
SHA512339449e2fcbfcb31e90c2a12166f8c1b20bd5063b6ae4ae5c6f1080f581a713c729a8b08bbf9b346049e4eebca2812998fcdf7772cb6e4725e6427a2fa14aeb5
-
Filesize
93KB
MD5ceddee6b1275349218f7a7ab2688d537
SHA16ca0e912cc7c01cd5c258f51301424afb27a30f0
SHA2568c2976a3714d7f475145bcbd10f407bfd7fa23107d9bd522bca71271e50fc10c
SHA5122d442944361548399fe386eea4355759d44ea4df73e321ed47e3a4ba0c93bdad1c33f08caf130d4645a84385dfc745b74659626ebceac6f82200bc8cd4bae511