Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2023 13:17
Behavioral task
behavioral1
Sample
bNqu.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bNqu.exe
Resource
win10v2004-20230220-en
General
-
Target
bNqu.exe
-
Size
78KB
-
MD5
d4b127a7d4e2609d86747eadf6fd00ba
-
SHA1
88754fa2fa044a1bcac7ad1ede8c8cfa533bbdab
-
SHA256
a4565de8728f2196a30e7337c45d94b0b7f8dfca1bd610f5bd0d597e483d1b37
-
SHA512
f7d36d3f931d75793f1ee55bd7be5a3edc8c5ebff198a5eac0d234eb2964c78b6a071c38a1042ea3b4aad50d8be77998d3922c075d4aed838e0b6d5d960f2488
-
SSDEEP
1536:Gh9z+dBLX+DpPS5wpOk3JCK6pFo4j/6fOpd/9nEh9TGaJMR:UWqQwpOk5CK6MO/9ESaJM
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2832 schtasks.exe 1980 schtasks.exe 4780 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
bNqu.exedescription pid process Token: SeDebugPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe Token: 33 1716 bNqu.exe Token: SeIncBasePriorityPrivilege 1716 bNqu.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
bNqu.exebNqu.exebNqu.exedescription pid process target process PID 1716 wrote to memory of 1164 1716 bNqu.exe schtasks.exe PID 1716 wrote to memory of 1164 1716 bNqu.exe schtasks.exe PID 1716 wrote to memory of 1164 1716 bNqu.exe schtasks.exe PID 1716 wrote to memory of 2832 1716 bNqu.exe schtasks.exe PID 1716 wrote to memory of 2832 1716 bNqu.exe schtasks.exe PID 1716 wrote to memory of 2832 1716 bNqu.exe schtasks.exe PID 2940 wrote to memory of 3876 2940 bNqu.exe schtasks.exe PID 2940 wrote to memory of 3876 2940 bNqu.exe schtasks.exe PID 2940 wrote to memory of 3876 2940 bNqu.exe schtasks.exe PID 2940 wrote to memory of 1980 2940 bNqu.exe schtasks.exe PID 2940 wrote to memory of 1980 2940 bNqu.exe schtasks.exe PID 2940 wrote to memory of 1980 2940 bNqu.exe schtasks.exe PID 3500 wrote to memory of 3924 3500 bNqu.exe schtasks.exe PID 3500 wrote to memory of 3924 3500 bNqu.exe schtasks.exe PID 3500 wrote to memory of 3924 3500 bNqu.exe schtasks.exe PID 3500 wrote to memory of 4780 3500 bNqu.exe schtasks.exe PID 3500 wrote to memory of 4780 3500 bNqu.exe schtasks.exe PID 3500 wrote to memory of 4780 3500 bNqu.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bNqu.exe"C:\Users\Admin\AppData\Local\Temp\bNqu.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\bNqu.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\bNqu.exeC:\Users\Admin\AppData\Local\Temp\bNqu.exe1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\bNqu.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\bNqu.exeC:\Users\Admin\AppData\Local\Temp\bNqu.exe1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\bNqu.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\bNqu.exe.logFilesize
408B
MD5661cab77d3b907e8057f2e689e995af3
SHA15d1a0ee9c5ee7a7a90d56d00c10dc0e679bee01c
SHA2568f27f95ad7c09f2e05d7960e78ef8cd935c1262e9657883a75d70dcb877592d2
SHA5122523b316bd79fed0e9b3d73f46959f3dfe270cf950f34bd9d49fe4113a2ae46d0cd00224d848bc40c0d8c55449e2dccc4b4278ba4809c0ca9ede1ac75673fc67
-
memory/1716-133-0x0000000001330000-0x0000000001340000-memory.dmpFilesize
64KB
-
memory/1716-134-0x0000000001330000-0x0000000001340000-memory.dmpFilesize
64KB
-
memory/2940-135-0x0000000000FF0000-0x0000000001000000-memory.dmpFilesize
64KB
-
memory/3500-138-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB