Overview
overview
6Static
static
3Nezur (1).zip
windows7-x64
1Nezur (1).zip
windows10-2004-x64
1Nezur.exe
windows7-x64
1Nezur.exe
windows10-2004-x64
1README.txt
windows7-x64
1README.txt
windows10-2004-x64
1auto_load.txt
windows7-x64
1auto_load.txt
windows10-2004-x64
1configs/autosave.cfg
windows7-x64
3configs/autosave.cfg
windows10-2004-x64
3lua51.dll
windows7-x64
3lua51.dll
windows10-2004-x64
3start.bat
windows7-x64
6start.bat
windows10-2004-x64
6Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
Nezur (1).zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Nezur (1).zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Nezur.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Nezur.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
README.txt
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
README.txt
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
auto_load.txt
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
auto_load.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
configs/autosave.cfg
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
configs/autosave.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
lua51.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
lua51.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
start.bat
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
start.bat
Resource
win10v2004-20231215-en
General
-
Target
configs/autosave.cfg
-
Size
916B
-
MD5
024ab27dfe02dbcd5357528ac4dbe028
-
SHA1
2f2b7df7b4557e274d4255cebd65d6d7c125cf95
-
SHA256
c029522bb51f2eea602e3818be4b495282cc2d8da92421f8bf3ced7dc46098bd
-
SHA512
f87d48447e5663be7e63f7f7934d33c795f2201acc753720bbf77af49cf8ab44b6f9618a2a22dd8f08a5d67424ca0c7c566b15b3f172edc34af4b29a23b5d137
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1352 taskmgr.exe Token: SeSystemProfilePrivilege 1352 taskmgr.exe Token: SeCreateGlobalPrivilege 1352 taskmgr.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe 1352 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\configs\autosave.cfg1⤵
- Modifies registry class
PID:4612
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1724
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1352