Analysis

  • max time kernel
    612s
  • max time network
    946s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-04-2023 20:20

General

  • Target

    926b426a5d246c666e3c05bb98566b2e.ps1

  • Size

    2.8MB

  • MD5

    926b426a5d246c666e3c05bb98566b2e

  • SHA1

    2e7aa53e4e2365812904c540ab544c75d2a68560

  • SHA256

    eb7a7f9d8fde85d1ffeaaf7bc27a06129e431e1615f731acd71aeddc32c8359b

  • SHA512

    9b7c2d63c3e60b78c65cd53fa4a18bb551fa6f7cd899fc581971b990ebbd09b1cc35d4caa27c96ff76ffb18c248e3c2b933e8e6d58660f4a4478b219873cfb7f

  • SSDEEP

    49152:1PLcFJh88TWNVWy/Lo7I2o6iGKDhErHEgLxzSh0Z8Gt4jbtGD:W

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\926b426a5d246c666e3c05bb98566b2e.ps1
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" -Name ExpirienceHost -Value ""C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\whost.exe""
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4312
  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\whost.exe
    C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\whost.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    5d574dc518025fad52b7886c1bff0e13

    SHA1

    68217a5f9e9a64ca8fed9eefa4171786a8f9f8f7

    SHA256

    755c4768f6e384030805284ab88689a325431667e9ab11d9aeaa55e9739742f2

    SHA512

    21de152e07d269b265dae58d46e8c68a3268b2f78d771d4fc44377a14e0c6e73aadae923dcfd34ce2ef53c2eaa53d4df8f281d9b8a627edee213946c9ef37d13

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    f1aa5b66d57c2bd5b2f6d1f610a2058f

    SHA1

    6a4572f178e64d1bce72b1948a4c6581acc396b1

    SHA256

    ee199ea524df36cf6b4c89a211ea8a27388975f46a94986c593e9b7cf3af94fa

    SHA512

    3dbf7367d5329e86941f09b7998b7d5ca3edbdbc051ae269d836420f4a600e8dce48a6c04b6e37f72550f85067f139d698978d122c90374cac6efb993e8d38c2

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_x1vyciak.qhu.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\HTCTL32.DLL

    Filesize

    320KB

    MD5

    2d3b207c8a48148296156e5725426c7f

    SHA1

    ad464eb7cf5c19c8a443ab5b590440b32dbc618f

    SHA256

    edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796

    SHA512

    55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\MSVCR100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\NSM.LIC

    Filesize

    257B

    MD5

    390c964070626a64888d385c514f568e

    SHA1

    a556209655dcb5e939fd404f57d199f2bb6da9b3

    SHA256

    ad0d05305fdeb3736c1e8d49c3a6746073d27b4703eb6de6589bdc4aa72d7b54

    SHA512

    f089c59a24f33410cf98fba7ea0dd2ca0fd997efc9a03e5355cde3c1a1f4a78b13cebd387099b9de824bffea01c489d8f0e90df56f89973007dabb6afdde607f

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\PCICL32.dll

    Filesize

    3.6MB

    MD5

    00587238d16012152c2e951a087f2cc9

    SHA1

    c4e27a43075ce993ff6bb033360af386b2fc58ff

    SHA256

    63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8

    SHA512

    637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\client32.ini

    Filesize

    947B

    MD5

    f16b37cf3b9655996307a8e446c55416

    SHA1

    d2a23ccec53c035e6caf0e76f1506aab507c1f4f

    SHA256

    fd3cb300b72f993091bf980700324fe934562f173c2f0d67273636e638d776cc

    SHA512

    abf509fadf5fd4e47db57228a9501d5dd4b165173439e91f04c22d2c468cb553d0cefc101bb44e535853f354962fb48d9bfbcbe82142e3ece76794427de99cf4

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\pcicapi.dll

    Filesize

    32KB

    MD5

    dcde2248d19c778a41aa165866dd52d0

    SHA1

    7ec84be84fe23f0b0093b647538737e1f19ebb03

    SHA256

    9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

    SHA512

    c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\pcichek.dll

    Filesize

    18KB

    MD5

    a0b9388c5f18e27266a31f8c5765b263

    SHA1

    906f7e94f841d464d4da144f7c858fa2160e36db

    SHA256

    313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

    SHA512

    6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\whost.exe

    Filesize

    117KB

    MD5

    c0eb3eac96511077dafc0afa64c6388c

    SHA1

    33e81f25493eda3bbf0b7cdcddd523547fa6c31e

    SHA256

    eec4f18f3655f7eab0c08783ad42d2b3ce3ef21ecad7394e165f11acdb41c42a

    SHA512

    2632bef55323d9a272e1519e2b2792527d28cbd9fe6a9f9d253e5729978be0de6f36b8e3b2acee70449ba22a33efb41c82c82afe19dad14698b3ada0006ca7fc

  • C:\Users\Admin\AppData\Roaming\GDkxICvdtOJY\whost.exe

    Filesize

    117KB

    MD5

    c0eb3eac96511077dafc0afa64c6388c

    SHA1

    33e81f25493eda3bbf0b7cdcddd523547fa6c31e

    SHA256

    eec4f18f3655f7eab0c08783ad42d2b3ce3ef21ecad7394e165f11acdb41c42a

    SHA512

    2632bef55323d9a272e1519e2b2792527d28cbd9fe6a9f9d253e5729978be0de6f36b8e3b2acee70449ba22a33efb41c82c82afe19dad14698b3ada0006ca7fc

  • \Users\Admin\AppData\Roaming\GDkxICvdtOJY\HTCTL32.DLL

    Filesize

    320KB

    MD5

    2d3b207c8a48148296156e5725426c7f

    SHA1

    ad464eb7cf5c19c8a443ab5b590440b32dbc618f

    SHA256

    edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796

    SHA512

    55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c

  • \Users\Admin\AppData\Roaming\GDkxICvdtOJY\PCICHEK.DLL

    Filesize

    18KB

    MD5

    a0b9388c5f18e27266a31f8c5765b263

    SHA1

    906f7e94f841d464d4da144f7c858fa2160e36db

    SHA256

    313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

    SHA512

    6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

  • \Users\Admin\AppData\Roaming\GDkxICvdtOJY\PCICL32.DLL

    Filesize

    3.6MB

    MD5

    00587238d16012152c2e951a087f2cc9

    SHA1

    c4e27a43075ce993ff6bb033360af386b2fc58ff

    SHA256

    63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8

    SHA512

    637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226

  • \Users\Admin\AppData\Roaming\GDkxICvdtOJY\msvcr100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • \Users\Admin\AppData\Roaming\GDkxICvdtOJY\msvcr100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • \Users\Admin\AppData\Roaming\GDkxICvdtOJY\pcicapi.dll

    Filesize

    32KB

    MD5

    dcde2248d19c778a41aa165866dd52d0

    SHA1

    7ec84be84fe23f0b0093b647538737e1f19ebb03

    SHA256

    9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

    SHA512

    c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

  • memory/4276-182-0x000002A4F8720000-0x000002A4F8732000-memory.dmp

    Filesize

    72KB

  • memory/4276-123-0x000002A4E0110000-0x000002A4E0132000-memory.dmp

    Filesize

    136KB

  • memory/4276-181-0x000002A4F86F0000-0x000002A4F86FA000-memory.dmp

    Filesize

    40KB

  • memory/4276-160-0x000002A4F85E0000-0x000002A4F85F0000-memory.dmp

    Filesize

    64KB

  • memory/4276-159-0x000002A4F85E0000-0x000002A4F85F0000-memory.dmp

    Filesize

    64KB

  • memory/4276-136-0x000002A4F85E0000-0x000002A4F85F0000-memory.dmp

    Filesize

    64KB

  • memory/4276-135-0x000002A4F85E0000-0x000002A4F85F0000-memory.dmp

    Filesize

    64KB

  • memory/4276-126-0x000002A4F8770000-0x000002A4F87E6000-memory.dmp

    Filesize

    472KB

  • memory/4312-230-0x00000208ADD50000-0x00000208ADD60000-memory.dmp

    Filesize

    64KB

  • memory/4312-228-0x00000208ADD50000-0x00000208ADD60000-memory.dmp

    Filesize

    64KB