Analysis
-
max time kernel
20s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 16:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Nezur.exe
Resource
win10v2004-20231215-en
4 signatures
120 seconds
General
-
Target
Nezur.exe
-
Size
2.2MB
-
MD5
6b32ecc2dd2ea0e99317489102b0e9f5
-
SHA1
d44a77a15f4c96e725c203ece17184fc774502d4
-
SHA256
bf37abf89985895a4dfa0b0a5319b7b6c2ca6dd2fd0c16ab1b94d284414cd181
-
SHA512
7586bd2a387550d2e3d2effb8337eae3499da7fca585855db190405373dfacaf5fe19e8791c208f3849e14583c1717ef6789dcaed98bfc2512c27cff3395bd03
-
SSDEEP
24576:GMEC+OlTn0w8cWrRCjaYPv7f1gYc/M6jE/VS5mhUXczCEkXu7P0D77u4mUi:F7oRcyRlYPzf1hEMAWS5I7P0D77ur
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" Nezur.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1100 Nezur.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1100 Nezur.exe Token: SeLoadDriverPrivilege 1100 Nezur.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1100 Nezur.exe