Malware Analysis Report

2024-10-23 16:16

Sample ID 240124-y9qnbagggp
Target Jan.24.2024.zip
SHA256 4179b3d47bc78322eea5377fb69d0768a3b216feb32f2e11a17bdf196546414a
Tags
netsupport rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4179b3d47bc78322eea5377fb69d0768a3b216feb32f2e11a17bdf196546414a

Threat Level: Known bad

The file Jan.24.2024.zip was found to be: Known bad.

Malicious Activity Summary

netsupport rat

NetSupport

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-01-24 20:29

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-24 20:29

Reported

2024-01-24 20:32

Platform

win7-20231215-en

Max time kernel

121s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\client32.exe"

Signatures

NetSupport

rat netsupport

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\client32.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\client32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\client32.exe

"C:\Users\Admin\AppData\Local\Temp\client32.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 greekpool.com udp
FR 38.180.62.49:443 greekpool.com tcp
US 8.8.8.8:53 geo.netsupportsoftware.com udp
US 104.26.0.231:80 geo.netsupportsoftware.com tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-24 20:29

Reported

2024-01-24 20:32

Platform

win10v2004-20231215-en

Max time kernel

147s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\client32.exe"

Signatures

NetSupport

rat netsupport

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\client32.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\client32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\client32.exe

"C:\Users\Admin\AppData\Local\Temp\client32.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 greekpool.com udp
FR 38.180.62.49:443 greekpool.com tcp
US 8.8.8.8:53 geo.netsupportsoftware.com udp
US 172.67.68.212:80 geo.netsupportsoftware.com tcp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 49.62.180.38.in-addr.arpa udp
US 8.8.8.8:53 212.68.67.172.in-addr.arpa udp
US 8.8.8.8:53 3.181.190.20.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 16.234.44.23.in-addr.arpa udp
US 8.8.8.8:53 5.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 178.223.142.52.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

N/A