Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-03-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe
Resource
win11-20240221-en
General
-
Target
44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe
-
Size
2.1MB
-
MD5
958488cca59da09a2c81910b195b0169
-
SHA1
023631fb4a4a370e7b9bf1294dc536306c65271b
-
SHA256
44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a
-
SHA512
b31a26ed7767cc46916904af52fc3ae1beae93f7f3f76a243c318c5704a88f58b28a5e29da655b84a20a07e6e78a0cf043b3d51f06466151b6309bcde24c56b5
-
SSDEEP
49152:UOKtE89tfzUSz7qqcn88R6fcHcTNe4z07scrLA:UOKDfzUS3qqq96fMEe4+ZrLA
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autoruning.ini.lnk 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 client32.exe -
Loads dropped DLL 7 IoCs
pid Process 1984 client32.exe 1984 client32.exe 1984 client32.exe 1984 client32.exe 1984 client32.exe 1984 client32.exe 1984 client32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1984 client32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 client32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1984 1708 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe 77 PID 1708 wrote to memory of 1984 1708 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe 77 PID 1708 wrote to memory of 1984 1708 44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe"C:\Users\Admin\AppData\Local\Temp\44e3e3cdc7c3176877f86b8c17ab8b998dbcb618a1d57610e1c5960a0210257a.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\WinSupport\client32.exe"C:\Users\Admin\AppData\Roaming\WinSupport\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
254B
MD58614c2008044a081e9d26d8db1571f4a
SHA11b007f05c289d0b71d542520b25fe65c6b6fcbe3
SHA256df622fc8bc605023730d3ad952d69fcbd8383ce5440d63da0df20fb139355ec9
SHA512449244a508daaacde53078b826f7b482650acc3f61e8235fa892a737bebbecb178061d0aa1e99cd74da7885c86cebb2727d6e85384ecd68187d7e6e94f018ae9
-
Filesize
3.6MB
MD500587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
Filesize
387KB
MD5eab603d12705752e3d268d86dff74ed4
SHA101873977c871d3346d795cf7e3888685de9f0b16
SHA2566795d760ce7a955df6c2f5a062e296128efdb8c908908eda4d666926980447ea
SHA51277de0d9c93ccba967db70b280a85a770b3d8bea3b707b1abb037b2826b48898fec87924e1a6cce218c43478e5209e9eb9781051b4c3b450bea3cd27dbd32c7f3
-
Filesize
104KB
MD5f76954b68cc390f8009f1a052283a740
SHA13112a39aad950045d6422fb2abe98bed05931e6c
SHA25663315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb
SHA512d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880
-
Filesize
799B
MD53602eb43d579dd1cdfab486144407909
SHA1674998e54b6a26ef3032a0226c785084b128e701
SHA2569818994c4a61d1211d212c2b1be11aae559e57c9e53013e98e8ed7d5df423ebe
SHA5128bfcba220b0645de4528be3841a0fbc123327bf78a808ae3512db26a585e1cc62d916f6bc6c3b949fe9d069517d9e55e1c41d318d22c1125534b41362ade1e6d
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd