Malware Analysis Report

2024-10-23 16:16

Sample ID 240127-htphbahabn
Target 2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia
SHA256 b133715f769d5a8aa6092285c0e4845a643467595725874c1d613c355c9c300a
Tags
netsupport rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b133715f769d5a8aa6092285c0e4845a643467595725874c1d613c355c9c300a

Threat Level: Known bad

The file 2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia was found to be: Known bad.

Malicious Activity Summary

netsupport rat

NetSupport

Drops file in System32 directory

Drops file in Windows directory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-01-27 07:01

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-27 07:01

Reported

2024-01-27 07:04

Platform

win7-20231215-en

Max time kernel

119s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe

"C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-27 07:01

Reported

2024-01-27 07:04

Platform

win10v2004-20231215-en

Max time kernel

142s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe"

Signatures

NetSupport

rat netsupport

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\wuser32.pdb C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe N/A
File opened for modification C:\Windows\SysWOW64\wntdll.pdb C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe N/A
File opened for modification C:\Windows\SysWOW64\wkernelbase.pdb C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe N/A
File opened for modification C:\Windows\SysWOW64\wkernel32.pdb C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.1288_none_d9539a9fe102720c\gdiplus.pdb C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe

"C:\Users\Admin\AppData\Local\Temp\2024-01-27_d5bf2d1f33c460e63de263a74d9c7ab2_mafia.exe"

Network

Country Destination Domain Proto
US 138.91.171.81:80 tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 194.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 85.65.42.20.in-addr.arpa udp

Files

N/A