Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 23:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Nexol.exe
-
Size
521KB
-
MD5
1eb5bb11035c35f7a4591e1e85938bb4
-
SHA1
6bceeaa5aea24f09dee83d2d7858170ff90dfb2c
-
SHA256
085c381ae6f97d43a82ba5960c38c4f37db85a51b9dd8cf2e2f671d5fd3dae56
-
SHA512
e7eaf7b852f3d88eeffcc2104cf2e1b56c20713c3f6bd4ceba930125fb4dcbaecdebc83489dea672b7d7f5358cf974a899a9022b9dc76dbbf44d4d6158e35ce7
-
SSDEEP
12288:utPYLwhHJ6mhUvkj0EGXgBmWosFArfIwFzXKWde04N/g:u2Lwr2kjRHnoZrfb1XK10IY
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
https://suggestyuoz.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 3980 2100 Nexol.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 4700 2100 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1012 2100 Nexol.exe 84 PID 2100 wrote to memory of 1012 2100 Nexol.exe 84 PID 2100 wrote to memory of 1012 2100 Nexol.exe 84 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85 PID 2100 wrote to memory of 3980 2100 Nexol.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 8282⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2100 -ip 21001⤵PID:3676