Analysis

  • max time kernel
    92s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 12:34

General

  • Target

    Nezur_Executor/Nezur.dll

  • Size

    15.2MB

  • MD5

    79b4048105f34e39143b5ec9cbbb754c

  • SHA1

    270edf0a5d5e5801171435b5f8c813cbac3ebc20

  • SHA256

    9a2601c7d10b7fb896429cc13ca6961f29dfc594b6eb1d4f7bebd36d4513a6d7

  • SHA512

    e148df038131a5a4fece47c22286d0c5638e21019213d4c840abf277a23456422873a4ba5535f926ffb4bb12771393d8316306709f2cfb0354e4b2c9cbf44c4e

  • SSDEEP

    393216:2EI9J9jTykIBEJy66FfEGdDS7OVIkXPqgK1SLoj:2t1mkIWg66LDS7UIkX/wSE

Score
7/10

Malware Config

Signatures

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Nezur_Executor\Nezur.dll,#1
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4676-0-0x00007FFBC350B000-0x00007FFBC3DD2000-memory.dmp

    Filesize

    8.8MB

  • memory/4676-2-0x00007FFBE2500000-0x00007FFBE2502000-memory.dmp

    Filesize

    8KB

  • memory/4676-1-0x00007FFBE24F0000-0x00007FFBE24F2000-memory.dmp

    Filesize

    8KB

  • memory/4676-3-0x00007FFBC3360000-0x00007FFBC4D10000-memory.dmp

    Filesize

    25.7MB

  • memory/4676-7-0x00007FFBC350B000-0x00007FFBC3DD2000-memory.dmp

    Filesize

    8.8MB

  • memory/4676-8-0x00007FFBC3360000-0x00007FFBC4D10000-memory.dmp

    Filesize

    25.7MB