Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2025, 22:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win7-20240729-en
6 signatures
150 seconds
General
-
Target
Nexol.exe
-
Size
6.5MB
-
MD5
ffeabed249dd14435b8d7e7af599c360
-
SHA1
7049c3cd0c2f6246366cdab6754351621f7d90f5
-
SHA256
a54e6ab607cb2df90bef8f59df83dc7e849d1b41ebf115a77deab66883515283
-
SHA512
733f20724178c47620a4653392b9b91835451f56e75ae9158fa275570c13576782f4caddae0d89499c74aef7d17313df2b9c767532b10fc10544b4d4a9295653
-
SSDEEP
49152:bjWiB2zkDxAOorujyGiZFrMhooccmpL1n4quebID0lOAZZTEmgPzmwx+K7WAWwOt:bjWiBriSjIXM81nxbprl5w
Malware Config
Extracted
Family
lumma
C2
https://prideforgek.fun/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1608 set thread context of 4136 1608 Nexol.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4136 BitLockerToGo.exe 4136 BitLockerToGo.exe 4136 BitLockerToGo.exe 4136 BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4136 1608 Nexol.exe 89 PID 1608 wrote to memory of 4136 1608 Nexol.exe 89 PID 1608 wrote to memory of 4136 1608 Nexol.exe 89 PID 1608 wrote to memory of 4136 1608 Nexol.exe 89 PID 1608 wrote to memory of 4136 1608 Nexol.exe 89 PID 1608 wrote to memory of 4136 1608 Nexol.exe 89 PID 1608 wrote to memory of 4136 1608 Nexol.exe 89 PID 1608 wrote to memory of 4136 1608 Nexol.exe 89 PID 1608 wrote to memory of 4136 1608 Nexol.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4136
-