Analysis
-
max time kernel
24s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 02:22
General
-
Target
nezurupdateopenfirst.exe
-
Size
231KB
-
MD5
47fd9d72c46a553881e1fc76b483c93b
-
SHA1
607081e5176f954d5070978254f3fd0721dc31d3
-
SHA256
db8e7fa7eaa81e51c4d220c4b2b0902cd7825e0178f7ec81f93089ecabc33861
-
SHA512
38757d02a0d5131b66d8b1563faacf68d23bb9c5f9731234250bec26300792fe29c884b26f2d96426284d346e0755b5644bf1187b50a2f531f5d25b2477257d4
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4pmFf4+ZRSk3q459cSnb8e1mhyi:joZtL+EP8pmFf4+ZRSk3q459cMW
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/1076-0-0x000001A594D00000-0x000001A594D40000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 nezurupdateopenfirst.exe