Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
167s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
Nezur.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Nezur.exe
Resource
win10v2004-20240226-en
General
-
Target
Nezur.exe
-
Size
7.9MB
-
MD5
754c5ad19cb3bc21a58bccf028bc2b86
-
SHA1
66fe0f66d80023b347707248abe6e44e5f9d98ce
-
SHA256
8445e6223a5f1b7f33b0320560b34139ab758006ed4492f581e2b90d3e104f5b
-
SHA512
fdbbfbc10c58e909da664e643bffbe640b4b3242df0da2d5bd40d9691f96ce6cca4c27e166dff7e290b3a5f012b0a3e135e1650bf61a7484253c59cc54177790
-
SSDEEP
196608:3QkJ6NQIrY1M5iwmIL61wuBACHJj+uJyf5RpTQ05j:d/gAUiwVEbBACHJFqNM05j
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3260 taskmgr.exe Token: SeSystemProfilePrivilege 3260 taskmgr.exe Token: SeCreateGlobalPrivilege 3260 taskmgr.exe Token: 33 3260 taskmgr.exe Token: SeIncBasePriorityPrivilege 3260 taskmgr.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe -
Suspicious use of SendNotifyMessage 58 IoCs
pid Process 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe 3260 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nezur.exe"C:\Users\Admin\AppData\Local\Temp\Nezur.exe"1⤵PID:3508
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:1480