Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 13:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Nezur.exe
Resource
win7-20240215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Nezur.exe
Resource
win10v2004-20240221-en
3 signatures
150 seconds
General
-
Target
Nezur.exe
-
Size
2.3MB
-
MD5
9b9d327641c9dff3c02e6f9740181e7e
-
SHA1
355c693c3daa18e9515798fc19ce10f1355f034c
-
SHA256
a5b04cdaa72581188970eedbc9902eded6463b483c4d4a18ad9764a73aff9458
-
SHA512
80d712184b035383017660062bced61c54fa96e9953ef5dde449536a3198ea6f8c2c5d530c72b584a309460c58ad4faed418a5fd6f045d89162c3a195aaeab97
-
SSDEEP
24576:wYTokI/YM9239cNJYCSbiyzzLkdnjX0hGIUbUF6C/HzCEkXucPS477Wuivm:fG9O9AJYBzz3qjzI2IcPS477vU
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" Nezur.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2400 Nezur.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2400 Nezur.exe Token: SeLoadDriverPrivilege 2400 Nezur.exe