Overview
overview
10Static
static
1negatebal.zip
windows7-x64
1negatebal.zip
windows10-2004-x64
1AudioCapture.dll
windows7-x64
1AudioCapture.dll
windows10-2004-x64
1HTCTL32.dll
windows7-x64
3HTCTL32.dll
windows10-2004-x64
3NSM.lic
windows7-x64
3NSM.lic
windows10-2004-x64
3PCICHEK.dll
windows7-x64
1PCICHEK.dll
windows10-2004-x64
1PCICL32.dll
windows7-x64
1PCICL32.dll
windows10-2004-x64
1TCCTL32.dll
windows7-x64
1TCCTL32.dll
windows10-2004-x64
1client32.exe
windows7-x64
10client32.exe
windows10-2004-x64
10client32.ini
windows7-x64
1client32.ini
windows10-2004-x64
1msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
3nskbfltr.inf
windows7-x64
1nskbfltr.inf
windows10-2004-x64
1nsm_vpro.ini
windows7-x64
1nsm_vpro.ini
windows10-2004-x64
1pcicapi.dll
windows7-x64
1pcicapi.dll
windows10-2004-x64
1remcmdstub.exe
windows7-x64
1remcmdstub.exe
windows10-2004-x64
1Analysis
-
max time kernel
70s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2023 11:19
Static task
static1
Behavioral task
behavioral1
Sample
negatebal.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
negatebal.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
AudioCapture.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
AudioCapture.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
HTCTL32.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
HTCTL32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
NSM.lic
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
NSM.lic
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
PCICHEK.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
PCICHEK.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
PCICL32.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
PCICL32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
TCCTL32.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
TCCTL32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
client32.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
client32.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
client32.ini
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
client32.ini
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
msvcr100.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
msvcr100.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
nskbfltr.inf
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
nskbfltr.inf
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
nsm_vpro.ini
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
nsm_vpro.ini
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
pcicapi.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
pcicapi.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
remcmdstub.exe
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
remcmdstub.exe
Resource
win10v2004-20230221-en
General
-
Target
client32.exe
-
Size
104KB
-
MD5
2286e6e9c894051c0e4a856b42ad7dcd
-
SHA1
a506dda9ed2beba776fb9e6e61eb7e1f757ecdef
-
SHA256
a16dacbab60ca49de99d2e5617a189dcb4b699577f6d66f1cccd96689de6947d
-
SHA512
1afeac4f81879945bfc055d2303169e96a2a2c7e927f59be274997b059a1bc110175a24337ce05e9bc6e3e7fa80a1f799c4e71a4a43994af003b6db4c9e73bad
-
SSDEEP
384:qWhNuV5+6j6Qa86Fkv2Wr120hZhvntVXZWytVm4Fihj:q2oVZl6FhWr80/hvntVXcytVTit
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
taskmgr.exepid process 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 4760 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
client32.exetaskmgr.exedescription pid process Token: SeSecurityPrivilege 1788 client32.exe Token: SeDebugPrivilege 4760 taskmgr.exe Token: SeSystemProfilePrivilege 4760 taskmgr.exe Token: SeCreateGlobalPrivilege 4760 taskmgr.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
Processes:
client32.exetaskmgr.exepid process 1788 client32.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe -
Suspicious use of SendNotifyMessage 46 IoCs
Processes:
taskmgr.exepid process 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe 4760 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\client32.exe"C:\Users\Admin\AppData\Local\Temp\client32.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4760-134-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-135-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-136-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-140-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-141-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-142-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-143-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-144-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-146-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB
-
memory/4760-145-0x000001432D580000-0x000001432D581000-memory.dmpFilesize
4KB