Play interactive tourEdit tour

Windows Analysis Report http://mdnsNSP.dll

Overview

General Information

Sample URL:http://mdnsNSP.dll
Analysis ID:541452
Infos:

Most interesting Screenshot:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Sigma detected: Windows Suspicious Use Of Web Request in CommandLine
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 2908 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" > cmdline.out 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 5988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • wget.exe (PID: 1188 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

There are no malicious signatures, click here to show all signatures.

System Summary:

barindex
Sigma detected: Windows Suspicious Use Of Web Request in CommandLine
Source: Process startedAuthor: James Pemberton / @4A616D6573: Data: Command: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" , CommandLine: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wget.exe, NewProcessName: C:\Windows\SysWOW64\wget.exe, OriginalFileName: C:\Windows\SysWOW64\wget.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" > cmdline.out 2>&1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2908, ProcessCommandLine: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" , ProcessId: 1188

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownDNS traffic detected: query: mdnsnsp.dll replaycode: Name error (3)
Source: unknownDNS traffic detected: queries for: mdnsnsp.dll
Source: wget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmpString found in binary or memory: http://mdnsNSP.dll
Source: wget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmpString found in binary or memory: http://mdnsNSP.dll$
Source: wget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmpString found in binary or memory: http://mdnsNSP.dll(
Source: wget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmp, cmdline.out.1.drString found in binary or memory: http://mdnsnsp.dll/
Source: wget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmpString found in binary or memory: http://mdnsnsp.dll/h
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5988:120:WilError_01
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: classification engineClassification label: clean1.win@4/1@1/0
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingSystem Information Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryRemote System Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 541452 URL: http://mdnsNSP.dll Startdate: 17/12/2021 Architecture: WINDOWS Score: 1 5 cmd.exe 2 2->5         started        process3 7 wget.exe 1 5->7         started        10 conhost.exe 5->10         started        dnsIp4 12 mdnsnsp.dll 7->12

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://mdnsNSP.dll0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://mdnsnsp.dll/h0%Avira URL Cloudsafe
http://mdnsNSP.dll$0%Avira URL Cloudsafe
http://mdnsNSP.dll(0%Avira URL Cloudsafe
http://mdnsnsp.dll/0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
mdnsnsp.dll
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://mdnsNSP.dllwget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmpfalse
      unknown
      http://mdnsnsp.dll/hwget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://mdnsNSP.dll$wget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmpfalse
      • Avira URL Cloud: safe
      low
      http://mdnsNSP.dll(wget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmpfalse
      • Avira URL Cloud: safe
      low
      http://mdnsnsp.dll/wget.exe, 00000004.00000002.239888156.0000000001325000.00000004.00000040.sdmp, cmdline.out.1.drfalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos

      General Information

      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:541452
      Start date:17.12.2021
      Start time:10:16:03
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 2m 3s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:urldownload.jbs
      Sample URL:http://mdnsNSP.dll
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:CLEAN
      Classification:clean1.win@4/1@1/0
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Unable to download file
      Warnings:
      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      C:\Users\user\Desktop\cmdline.out
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):171
      Entropy (8bit):4.754919250470622
      Encrypted:false
      SSDEEP:3:1tUWLueJI4FHmySBFLLSa+MOrSGIPCOLK46ZmqLvdXnA+IFVln:HRpGNUcpGmsdXA9n
      MD5:6510498B6260EB1BAE73DD3AD266A750
      SHA1:BA23BF7502DCD0477A919367C6383D4DF3A28C9A
      SHA-256:93647B54D09CD5E856DFB20E9E8B11D2A9FBE6D1C9D96B78FCFF951C4C1104F7
      SHA-512:2BC42FCF0D11425BC5727821883537C0566DBD35307A642FE244E4628A0424451C7B7DFD83E81B67925C5B28C96B2DCB7AE98C5FDB5FD25558745EEE549E80FE
      Malicious:false
      Reputation:low
      Preview: --2021-12-17 10:16:59-- http://mdnsnsp.dll/..Resolving mdnsnsp.dll (mdnsnsp.dll)... failed: No such host is known. ...wget: unable to resolve host address 'mdnsnsp.dll'..

      Static File Info

      No static file info

      Network Behavior

      Download Network PCAP: filteredfull

      TimestampSource PortDest PortSource IPDest IP
      Dec 17, 2021 10:16:59.699839115 CET5244153192.168.2.58.8.8.8
      Dec 17, 2021 10:16:59.718931913 CET53524418.8.8.8192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Dec 17, 2021 10:16:59.699839115 CET192.168.2.58.8.8.80x604bStandard query (0)mdnsnsp.dllA (IP address)IN (0x0001)
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Dec 17, 2021 10:16:59.718931913 CET8.8.8.8192.168.2.50x604bName error (3)mdnsnsp.dllnonenoneA (IP address)IN (0x0001)

      Code Manipulations

      Statistics

      CPU Usage

      0510s020406080100

      Click to jump to process

      Memory Usage

      Click to jump to process

      Behavior

      Click to jump to process

      System Behavior

      Start time:10:16:58
      Start date:17/12/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll" > cmdline.out 2>&1
      Imagebase:0x150000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Start time:10:16:59
      Start date:17/12/2021
      Path:C:\Windows\SysWOW64\wget.exe
      Wow64 process (32bit):true
      Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://mdnsNSP.dll"
      Imagebase:0x400000
      File size:3895184 bytes
      MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      Disassembly

      Code Analysis