Overview
overview
6Static
static
3Nezur (1).zip
windows7-x64
1Nezur (1).zip
windows10-2004-x64
1Nezur.exe
windows7-x64
1Nezur.exe
windows10-2004-x64
1README.txt
windows7-x64
1README.txt
windows10-2004-x64
1auto_load.txt
windows7-x64
1auto_load.txt
windows10-2004-x64
1configs/autosave.cfg
windows7-x64
3configs/autosave.cfg
windows10-2004-x64
3lua51.dll
windows7-x64
3lua51.dll
windows10-2004-x64
3start.bat
windows7-x64
6start.bat
windows10-2004-x64
6Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
Nezur (1).zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Nezur (1).zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Nezur.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Nezur.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
README.txt
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
README.txt
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
auto_load.txt
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
auto_load.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
configs/autosave.cfg
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
configs/autosave.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
lua51.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
lua51.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
start.bat
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
start.bat
Resource
win10v2004-20231215-en
General
-
Target
start.bat
-
Size
548B
-
MD5
12c37bf6537bfdf93b80c31f6d1391b2
-
SHA1
43df564e4988008f3e97167837f58f1452cf3d13
-
SHA256
cab7b8973dd5f7252af6a1a080deec442acd1e6bdd6c7476bd73e39553751222
-
SHA512
c59645da2377ec2eb8c4ca75174379134dc657741ee324fc6fd38170b9704852bf136a919fe0363ea85befe61e8838ef74dad07e365392d8f8f6462bb1ba75f9
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2936 Nezur.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2556 2088 cmd.exe 29 PID 2088 wrote to memory of 2556 2088 cmd.exe 29 PID 2088 wrote to memory of 2556 2088 cmd.exe 29 PID 2088 wrote to memory of 2936 2088 cmd.exe 30 PID 2088 wrote to memory of 2936 2088 cmd.exe 30 PID 2088 wrote to memory of 2936 2088 cmd.exe 30 PID 2088 wrote to memory of 2936 2088 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\Nezur.exeNezur.exe auto_load.txt2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06