Analysis
-
max time kernel
18s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 22:33
Behavioral task
behavioral1
Sample
1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe
Resource
win10v2004-20220812-en
General
-
Target
1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe
-
Size
50KB
-
MD5
0abeeb749bd8cf4d75064cae4f513810
-
SHA1
684067cb59c6766175f9c26366b47b7ee9ad79c7
-
SHA256
1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6
-
SHA512
3caf3eb572439ec6a7b422b3928cb03ea7d42b2a80fb4ec0cd20ceaf886e43815668f92c9434aa778357a561a27d415700a8ca61d33e4443218133f500f50bcc
-
SSDEEP
1536:lMzjVnRUy4HzPJz9w0v1bVdtNfkT03br1glYjdvMw:YVnHox1zf2kRgajJMw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2296-132-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2296-141-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/files/0x0006000000022e37-136.dat upx behavioral2/files/0x0006000000022e37-135.dat upx -
Loads dropped DLL 1 IoCs
pid Process 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\bnsspx.dll 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe File opened for modification C:\Windows\SysWOW64\zmdll.lst 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe File created C:\Windows\SysWOW64\BNSUpdata.exe 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe File opened for modification C:\Windows\SysWOW64\BNSUpdata.exe 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2296 1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe"C:\Users\Admin\AppData\Local\Temp\1ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\uisad.bat2⤵PID:1340
-
-
C:\Windows\SysWOW64\BNSUpdata.exe"C:\Windows\system32\BNSUpdata.exe"2⤵PID:1092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD50abeeb749bd8cf4d75064cae4f513810
SHA1684067cb59c6766175f9c26366b47b7ee9ad79c7
SHA2561ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6
SHA5123caf3eb572439ec6a7b422b3928cb03ea7d42b2a80fb4ec0cd20ceaf886e43815668f92c9434aa778357a561a27d415700a8ca61d33e4443218133f500f50bcc
-
Filesize
50KB
MD50abeeb749bd8cf4d75064cae4f513810
SHA1684067cb59c6766175f9c26366b47b7ee9ad79c7
SHA2561ef5cb4c65436c36dd0f16aebb028496d60ed6047c41514bf86762d1916f10a6
SHA5123caf3eb572439ec6a7b422b3928cb03ea7d42b2a80fb4ec0cd20ceaf886e43815668f92c9434aa778357a561a27d415700a8ca61d33e4443218133f500f50bcc
-
Filesize
33KB
MD5ae929799255727c7033b8d6607332491
SHA10f9004e4e1805e43f7c57807af16e1aec88d2c5f
SHA256f2ae59342cb770d2817ef2d0685213bab174a263936fdc54500b61dedca0fb63
SHA5120c07d6c2337a4693c11d3b0a028de6c511abfe0739c4ce1567211dec5f230f51bfc39dd47150383bd562ae35d22442dd3773f7cc863358426e4a3d4a78c00954
-
Filesize
53KB
MD51b8645c7dd0eb4e47e9ec59d76faf3a1
SHA109ee0e0382f2cde296e51ddd007b6843c918cf84
SHA2562d62d76f5857c888ff9515a72b161ce2f39fb176a7c58ef4fc649912430ff3c9
SHA512d4890a8724074630daec5e5dfd5ead37297c02ce929c8195eacf68336eaa2cca4f6c33fb9475efc1d68cb07c6ad0a6d575eff8a1c3cbde9d390fdc59781a042d
-
Filesize
53KB
MD51b8645c7dd0eb4e47e9ec59d76faf3a1
SHA109ee0e0382f2cde296e51ddd007b6843c918cf84
SHA2562d62d76f5857c888ff9515a72b161ce2f39fb176a7c58ef4fc649912430ff3c9
SHA512d4890a8724074630daec5e5dfd5ead37297c02ce929c8195eacf68336eaa2cca4f6c33fb9475efc1d68cb07c6ad0a6d575eff8a1c3cbde9d390fdc59781a042d
-
Filesize
24KB
MD5673c971a42426868554d5b9e22e88286
SHA11a3934eeea4ec5d30e302bfedb0a5a70e4dd1697
SHA25693209eb14d86aa965267734698a3f23a2584f0e6b71f9f436ce09eb72f50ef8c
SHA512bc8dd427cd0c77431a9cad8b8de2e1f0af24dbfc4164a262c1ae627643a136a5f580aa3da791e982a16f5a281c4d775c605340b53002082e5f1aa334a2e01624
-
Filesize
200B
MD5481d6d7c865294ce256158782df53347
SHA14faf9eb321d898bc370e7189ae42e032ff697ca8
SHA2565e8f83ccffc3e160cd4bd73ebcd4a97207b0e202192c3638d673b4b86e139052
SHA512cfbaf23d7b3f3f649bd16ae24c4c18a83406450f54c48334b64557c72b9d7c9c0943a0f8248796904d3ba628bc5f2cab3a54933bb1fd5e474e15045477049bca
-
Filesize
249B
MD570237953921a8f77f96b5fce35cd90c7
SHA179678d56b3935069202856c101a255c4ca0c7c81
SHA256dba9219f9e6dab54048847fbae0774e3fbf0b4c4b66e49c1f0c10f1de1999211
SHA5128e9b1031d79fee714fa76b9c7f1413675448067af99b80fd9f15a5eb7930f0306fdfdd514aa5a92082f0cea40a50ec9b60b969be85f81ceb05eeffc859d32bfe