Analysis
-
max time kernel
32s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-09-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
Nezur.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Launcher.bat
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
compiler.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
lua51.dll
Resource
win11-20240802-en
General
-
Target
lua51.dll
-
Size
389KB
-
MD5
1261fcfecad381aeba01ec6102648f3d
-
SHA1
b79bdffbfffd33ae7167234164d8f03c7d7ac511
-
SHA256
473276ea7cd546b7d10dadbfe6d071710695e7c12d3d43d4c97e91999674b896
-
SHA512
e638e2d676b9fc4a32b8f9e04bf41966f2a164358003c2778080792435a738f93133de4e89caca7d9253656463018bc7707fd4a20699f7c89b0c056cab9c170a
-
SSDEEP
12288:FiZ+ox9piQ8G27pC6Yyu5t60O0MJuAghAuNwAB5:Fe19pm7pCuCt6+w
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2224 3740 WerFault.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3740 4148 rundll32.exe 78 PID 4148 wrote to memory of 3740 4148 rundll32.exe 78 PID 4148 wrote to memory of 3740 4148 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lua51.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lua51.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 4523⤵
- Program crash
PID:2224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3740 -ip 37401⤵PID:840