Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 12:54

General

  • Target

    Nezur_Interface.exe.WebView2/EBWebView/BrowserMetrics/BrowserMetrics-66DF9A3F-707C.pma

  • Size

    1.2MB

  • MD5

    9b37de479b5376ffc3722ffdeb49631f

  • SHA1

    95547905366d95a5ca92f31ad850a0ba3bded9fd

  • SHA256

    d1ad5c7a8c0802bb45de4cba6620bab00c6e780e48e45366ad4c46cfad284de9

  • SHA512

    9a0f171a5bd0437e1b5f03c216dba6a85b581a6781382c055eee402856cfd445bab68c932d1ebe841d6831adc575201a538e406d84441e3fa3e43a1c1d0e9ebe

  • SSDEEP

    6144:PjbN56EaH7M4ivD0/JpopuhNLfSm7YSJi:l56nbUS5Hb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Nezur_Interface.exe.WebView2\EBWebView\BrowserMetrics\BrowserMetrics-66DF9A3F-707C.pma
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nezur_Interface.exe.WebView2\EBWebView\BrowserMetrics\BrowserMetrics-66DF9A3F-707C.pma
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nezur_Interface.exe.WebView2\EBWebView\BrowserMetrics\BrowserMetrics-66DF9A3F-707C.pma"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    be7fd79a8527389515cc7b0d829383aa

    SHA1

    7d4502c22fb1b8b9dc2ba46df97954e2dbea53b1

    SHA256

    7db5e4f2a71fbb5a3a81f47da98a9fe700a8837c84b19582ff46394fe115cc74

    SHA512

    7457e5db55d4e7f7737abcf95b7bfe9631c8bbfa4ee0bbaf79495e662e0e69d0b094277f425278b2cad0bdae96ffa7e88cd5cde488a5224d26ef33873eb0543b