Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2023 16:05
Behavioral task
behavioral1
Sample
NoSleep.dll
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NoSleep.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NoSleep.dll
-
Size
1.1MB
-
MD5
f52363b6cf282669e5fcc5537b5c3451
-
SHA1
9d9a0b90042fce790ab23191be9cce44c86f13d9
-
SHA256
b803db527f146f0d356700e24836a2e888f74c3dd2196a99f73caa0e57007f34
-
SHA512
d129f4f67691d9042e0bd0d94fabdecf96cadc33d15a662d1910bbb6bbf807eb73cc907f9268aaf99c7680a34d4088b3e79da8cff2dda7f12bc1ba95b44b6b49
-
SSDEEP
24576:QE8EsBM3ye//mFqTRBb5g795RgYM6y0Mblfi9gqKnh6QceWh04Bcc1f9NKG7YNjv:o1QtD895Rf1vxSGhe29NXYNj/B7j3J
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 2 4348 rundll32.exe 13 4348 rundll32.exe 14 4348 rundll32.exe -
Drops file in Windows directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\Tasks\MicrosoftEdgeUpdateTaskMachineCore{1575CC8A-457A-1700-652A-6AF2B031A266}.job rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4348 rundll32.exe 4348 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 4348 rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.