Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 18:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://nezur.io/Nezur_External.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://nezur.io/Nezur_External.zip
Resource
win11-20240802-en
General
-
Target
https://nezur.io/Nezur_External.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 3332 msedge.exe 3332 msedge.exe 4484 identity_helper.exe 4484 identity_helper.exe 5116 msedge.exe 5116 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3332 wrote to memory of 1468 3332 msedge.exe 83 PID 3332 wrote to memory of 1468 3332 msedge.exe 83 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1084 3332 msedge.exe 84 PID 3332 wrote to memory of 1784 3332 msedge.exe 85 PID 3332 wrote to memory of 1784 3332 msedge.exe 85 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86 PID 3332 wrote to memory of 1152 3332 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://nezur.io/Nezur_External.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f2b046f8,0x7ff8f2b04708,0x7ff8f2b047182⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17993417748782044676,7447701700839644957,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Nezur_External.zip\Nezur.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Nezur_External.zip\Nezur.exe"1⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
176B
MD5b4842c64d5c418bb281b8a615af42637
SHA1c9ea9e43b556d3845cace368d399fee680072aad
SHA256249e7ded88f72692553908222ba249bb09e7210270c626c08c2998ba059f3cea
SHA512a12f30f1989f394eecb503c318805a253965610ade71ea670455fceed175a00b3cd35add6162d6f918bbea04ce545bfd7a0ee1081c4b253ee686ebc0d2b81d6f
-
Filesize
6KB
MD594ecc17d41f8f8de7d995c5364988410
SHA187034519549979af940aefe47138e98c23e12433
SHA256530db6dfd63427848bae6957e446b7b0a6010431a720220f7a3b9c7786a5eab2
SHA512c137bf4284f6de656fb6a432e38fdad80afcd4035de90d9105d6b3ef9ee81330e8b7d0c5cc10a143fcbf4fabe13c688aa8f2d4c6f035f13968665d6d7cdcba61
-
Filesize
6KB
MD54bf7c121a99a19b25db9d7bcfc7cb111
SHA11e2ecd23ec4388b2da2df14516994e6544af36d6
SHA256ffb5d003ac3bba78c7a81dc62412c747830a815ddec0f2b8b0fe71fb7cfdaace
SHA5121a5066234eaf588f4febccf30c8c7391bae61d8f24fb06a8c87640194d98d0265f58245c2ac7cf6bb152599e8aa2549f34d2aabd86cd7e3e7313a863b3bba884
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5751c7356323806c694863544572ca9c4
SHA1126f95a606379d10839a371224ed394bd1722adc
SHA256e28718ce6bf5a19883b50395c52ab431e3f1894f3ca01a1f5894eed1445c1741
SHA512809f70ac38fb575f1f319a2b99f51e653da45ee7f99344d7909f5aa3343726d735882c08a09384e54ad569187fe2563c60335fa7a78fb79b54ed1c75d4c8f230
-
Filesize
11KB
MD58553bb95efebd823c641813872f29aed
SHA1d2f14cbd30775c59fa57adad7c1ed8d22407da58
SHA256873c45442b73a958cd05f14503655bb2ce77bdffe6fd3890383af5b7cb5a5748
SHA51245ba36169281a6334452b424767443041193c98a7ee088e5b895d5bc691c500095421909524a71fbf68e8cacbe6971639c280cc5f4824d2c5ce28c2d808952ae
-
Filesize
12.2MB
MD5115a3f77f569daaa14b892f8a649d5fd
SHA1dbf0bb9f3e92abb356000a278aeeac82b1b3248d
SHA256c69651cd40aeb5333614034c5aa6deb3f0af5360a19a6890091bf3058c6600cc
SHA5120de2cae09664414b5fd083786ddfbd4babc340327a6d9d19983999e51bd8f168e4e9c3a184637a6853a22de5cbf6dce70a50d5486a526c8e36e9f1900a746d5c