Analysis
-
max time kernel
147s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe
Resource
win11-20240221-en
General
-
Target
44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe
-
Size
2.1MB
-
MD5
958488cca59da09a2c81910b195b0169
-
SHA1
023631fb4a4a370e7b9bf1294dc536306c65271b
-
SHA256
44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a
-
SHA512
b31a26ed7767cc46916904af52fc3ae1beae93f7f3f76a243c318c5704a88f58b28a5e29da655b84a20a07e6e78a0cf043b3d51f06466151b6309bcde24c56b5
-
SSDEEP
49152:UOKtE89tfzUSz7qqcn88R6fcHcTNe4z07scrLA:UOKDfzUS3qqq96fMEe4+ZrLA
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autoruning.ini.lnk 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe -
Executes dropped EXE 1 IoCs
pid Process 1260 client32.exe -
Loads dropped DLL 7 IoCs
pid Process 1260 client32.exe 1260 client32.exe 1260 client32.exe 1260 client32.exe 1260 client32.exe 1260 client32.exe 1260 client32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1260 client32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1260 client32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1260 4048 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe 91 PID 4048 wrote to memory of 1260 4048 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe 91 PID 4048 wrote to memory of 1260 4048 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe"C:\Users\Admin\AppData\Local\Temp\44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Roaming\WinSupport\client32.exe"C:\Users\Admin\AppData\Roaming\WinSupport\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5bf9a95b3b672df03b503bf47aab6bd5b
SHA149e27bbc6332e91d3ca969e84e7aa9778e5f177c
SHA2564522ad8a5fa445fc9c9cbc929f5f4b072d6321c9c098b934f985ce853009b3d6
SHA5125d0266bff164d69e03769ec8b1e0a1a7092bce6666883a8cb5a0dc83d4cf411e31ba44dc643e580002ecac4edeef9c69870aba5f1da1a8cc35054e56196eafbc
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
254B
MD58614c2008044a081e9d26d8db1571f4a
SHA11b007f05c289d0b71d542520b25fe65c6b6fcbe3
SHA256df622fc8bc605023730d3ad952d69fcbd8383ce5440d63da0df20fb139355ec9
SHA512449244a508daaacde53078b826f7b482650acc3f61e8235fa892a737bebbecb178061d0aa1e99cd74da7885c86cebb2727d6e85384ecd68187d7e6e94f018ae9
-
Filesize
2.7MB
MD5758c24b8ad2fba5240f52e83fec888d1
SHA175a4314765eac32405f1c5e5f338a3efdb7e9dbf
SHA2569241cac5750454f6b6d2a9cf002d9223a3eff813731a053cffa6d653dfec0e08
SHA51263697267554519c504477980bb03f35b057147f0685273098742b714e3393635cabbf9d65962a47832cb3267f32a6daa7f1e6f433be07512c71d78aeeec2bc1c
-
Filesize
256KB
MD5977f838bac6f9aa98b11db7b30d77f84
SHA110b1fe2bbda311bc9723fd818f3bfbb6a5aab712
SHA256671bc81ef196f4718e37ec78f22dfbb55d5629fd7889facf81aaf64b23056d31
SHA512ce4892e9bab9c09a1b02d0949c01423f65a7706832b095bf27492ab307c91ba3c0447f5ec90deb78e01b9911c18baaee90931d912f02e2bd4747b5b7acea576b
-
Filesize
387KB
MD5eab603d12705752e3d268d86dff74ed4
SHA101873977c871d3346d795cf7e3888685de9f0b16
SHA2566795d760ce7a955df6c2f5a062e296128efdb8c908908eda4d666926980447ea
SHA51277de0d9c93ccba967db70b280a85a770b3d8bea3b707b1abb037b2826b48898fec87924e1a6cce218c43478e5209e9eb9781051b4c3b450bea3cd27dbd32c7f3
-
Filesize
104KB
MD5f76954b68cc390f8009f1a052283a740
SHA13112a39aad950045d6422fb2abe98bed05931e6c
SHA25663315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb
SHA512d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880
-
Filesize
799B
MD53602eb43d579dd1cdfab486144407909
SHA1674998e54b6a26ef3032a0226c785084b128e701
SHA2569818994c4a61d1211d212c2b1be11aae559e57c9e53013e98e8ed7d5df423ebe
SHA5128bfcba220b0645de4528be3841a0fbc123327bf78a808ae3512db26a585e1cc62d916f6bc6c3b949fe9d069517d9e55e1c41d318d22c1125534b41362ade1e6d
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd