Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 14:40

General

  • Target

    8ccff473270017f72b0910ea0404d670cc6c0ebee16977accc7cbcf137ba168b.exe

  • Size

    2.6MB

  • MD5

    54ef9fa70e329cdbe55dfccaef21f9c6

  • SHA1

    697da7932e7b7388c9eb838c10c1856b000cdca8

  • SHA256

    8ccff473270017f72b0910ea0404d670cc6c0ebee16977accc7cbcf137ba168b

  • SHA512

    c4e2f1afa4920abeace123c76729f14ab6d078e5625868aaa628a35e1dec501bcf382e280015df1e67558662e929c029aa4116eb616522aff6c0ab051ae737b7

  • SSDEEP

    49152:5VvvvHIr4Ui00kCOEVB1v5iwc6wMdIpFE/pp:5Vngry00K8B5i2IpFwp

Score
10/10

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ccff473270017f72b0910ea0404d670cc6c0ebee16977accc7cbcf137ba168b.exe
    "C:\Users\Admin\AppData\Local\Temp\8ccff473270017f72b0910ea0404d670cc6c0ebee16977accc7cbcf137ba168b.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Roaming\updatewindows23\client32.exe
      "C:\Users\Admin\AppData\Roaming\updatewindows23\client32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\updatewindows23\HTCTL32.DLL

    Filesize

    299KB

    MD5

    369388ac78ca4ca8a64219cf9aafad4c

    SHA1

    dfa6c01c55ac799f041c65df9a35aba8cf0d8c2d

    SHA256

    c76ee648639406c81469772311c39b46042bf1b91e47d9201908f3cf70407f30

    SHA512

    7d090f033ffc48b870d692877f3804a69dcb1ff61b96936f1ab77bf42b156839bfd787c387bc7d642c732868e3dcd8c0ff3b319f057c0157b5afc6843b302bc5

  • C:\Users\Admin\AppData\Roaming\updatewindows23\HTCTL32.DLL

    Filesize

    299KB

    MD5

    369388ac78ca4ca8a64219cf9aafad4c

    SHA1

    dfa6c01c55ac799f041c65df9a35aba8cf0d8c2d

    SHA256

    c76ee648639406c81469772311c39b46042bf1b91e47d9201908f3cf70407f30

    SHA512

    7d090f033ffc48b870d692877f3804a69dcb1ff61b96936f1ab77bf42b156839bfd787c387bc7d642c732868e3dcd8c0ff3b319f057c0157b5afc6843b302bc5

  • C:\Users\Admin\AppData\Roaming\updatewindows23\MSVCR100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\updatewindows23\NSM.LIC

    Filesize

    257B

    MD5

    9f7d99ff013dd6ff0a47fa22714004d3

    SHA1

    641dd35a0d42bb418a65825e7de2546b26d08a1d

    SHA256

    270814d5ba21237006934b7233a3de045c2310660027660b34647d59c7508141

    SHA512

    b9cd1f929990c77a1cb11d46d29824a85d02b0e5fcc8a14820487af56591e07ac891142c185fcf19b444ba375e88639781244ffe3e150add781045a392d0b503

  • C:\Users\Admin\AppData\Roaming\updatewindows23\PCICAPI.dll

    Filesize

    100KB

    MD5

    f0d7d2a77eee2b3146405d3ad0d56230

    SHA1

    37c323faf58584606ee5847cb9a25346c588f78f

    SHA256

    f043653ab1b8fbe5a33922df5b4fb46797e9694e5fcee807b97cc6aaef650131

    SHA512

    861258b5b97665f649437fd25aadc5dc66e5bc5a87d7482300f9931810f0d89d0ed9c01890cd038daa7c6d2f1850a3208fc20b3c1dc2e588c7688e228a4baade

  • C:\Users\Admin\AppData\Roaming\updatewindows23\PCICHEK.DLL

    Filesize

    8KB

    MD5

    07b474ab5c503f35873b94cd48d01592

    SHA1

    e6f699d6c021d9d434cc6a4e68516c4c2ac80ddc

    SHA256

    c8911c298f860de85037f8634e8539627f5a1c13b1fffe5568d63612e29b9cd4

    SHA512

    a995b0d1fba6e99dd89afbf5161efc18b0268c001c27155876e642abc8639f79c2c320530039cfa5ec9f6ca10e1d716060b0fb86414245f578f920f11c9bbbc8

  • C:\Users\Admin\AppData\Roaming\updatewindows23\PCICL32.DLL

    Filesize

    3.3MB

    MD5

    1274cca13cc5e37ca94d35e5b0673e89

    SHA1

    a8754c94f88273c304bc45a5afd61a383bb52117

    SHA256

    cd5510c8bc7ea60be77ad4aab502ee02d871bf4e917aeeb6921c20eebd9693dd

    SHA512

    52eafa31ee942dc92d0b8f52c12206f6abc1d5fae799b37b371e97c38ce66bd0693263de86b4880748ba1405054701288caf2cd00cd327edc164e1390cf9191c

  • C:\Users\Admin\AppData\Roaming\updatewindows23\PCICL32.dll

    Filesize

    3.3MB

    MD5

    1274cca13cc5e37ca94d35e5b0673e89

    SHA1

    a8754c94f88273c304bc45a5afd61a383bb52117

    SHA256

    cd5510c8bc7ea60be77ad4aab502ee02d871bf4e917aeeb6921c20eebd9693dd

    SHA512

    52eafa31ee942dc92d0b8f52c12206f6abc1d5fae799b37b371e97c38ce66bd0693263de86b4880748ba1405054701288caf2cd00cd327edc164e1390cf9191c

  • C:\Users\Admin\AppData\Roaming\updatewindows23\client32.exe

    Filesize

    101KB

    MD5

    c4f1b50e3111d29774f7525039ff7086

    SHA1

    57539c95cba0986ec8df0fcdea433e7c71b724c6

    SHA256

    18df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d

    SHA512

    005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5

  • C:\Users\Admin\AppData\Roaming\updatewindows23\client32.exe

    Filesize

    101KB

    MD5

    c4f1b50e3111d29774f7525039ff7086

    SHA1

    57539c95cba0986ec8df0fcdea433e7c71b724c6

    SHA256

    18df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d

    SHA512

    005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5

  • C:\Users\Admin\AppData\Roaming\updatewindows23\client32.exe

    Filesize

    101KB

    MD5

    c4f1b50e3111d29774f7525039ff7086

    SHA1

    57539c95cba0986ec8df0fcdea433e7c71b724c6

    SHA256

    18df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d

    SHA512

    005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5

  • C:\Users\Admin\AppData\Roaming\updatewindows23\client32.ini

    Filesize

    962B

    MD5

    279b5834fbd890fb90819b6710e0cc00

    SHA1

    9fb75dff6476aab7f2aaa15496b79eb9f1a44073

    SHA256

    08a0519dcc85dd524279c7faab604130e6fd508f504719bb1a29f3f0e4d8b34b

    SHA512

    ede915541925e2b89aa03612a0ba23db2ba9742f7109228b0929883f6c8a0d0eb3a6af4987268729fa72459b3163e09b466c37668aab748bc5ba1eac38059c19

  • C:\Users\Admin\AppData\Roaming\updatewindows23\msvcr100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\updatewindows23\pcicapi.dll

    Filesize

    100KB

    MD5

    f0d7d2a77eee2b3146405d3ad0d56230

    SHA1

    37c323faf58584606ee5847cb9a25346c588f78f

    SHA256

    f043653ab1b8fbe5a33922df5b4fb46797e9694e5fcee807b97cc6aaef650131

    SHA512

    861258b5b97665f649437fd25aadc5dc66e5bc5a87d7482300f9931810f0d89d0ed9c01890cd038daa7c6d2f1850a3208fc20b3c1dc2e588c7688e228a4baade

  • C:\Users\Admin\AppData\Roaming\updatewindows23\pcichek.dll

    Filesize

    8KB

    MD5

    07b474ab5c503f35873b94cd48d01592

    SHA1

    e6f699d6c021d9d434cc6a4e68516c4c2ac80ddc

    SHA256

    c8911c298f860de85037f8634e8539627f5a1c13b1fffe5568d63612e29b9cd4

    SHA512

    a995b0d1fba6e99dd89afbf5161efc18b0268c001c27155876e642abc8639f79c2c320530039cfa5ec9f6ca10e1d716060b0fb86414245f578f920f11c9bbbc8