Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2023 11:04

General

  • Target

    client32.exe

  • Size

    104KB

  • MD5

    f76954b68cc390f8009f1a052283a740

  • SHA1

    3112a39aad950045d6422fb2abe98bed05931e6c

  • SHA256

    63315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb

  • SHA512

    d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880

  • SSDEEP

    384:qkhNAEVV5+6j6Qa86Fkv2Wr120hZl4gtV5ttV2ikB:qwRVVZl6FhWr80/WgtV7tV2ikB

Score
10/10

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\client32.exe
    "C:\Users\Admin\AppData\Local\Temp\client32.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads