Overview
overview
10Static
static
1HTCTL32.dll
windows7-x64
3HTCTL32.dll
windows10-2004-x64
3PCICHEK.dll
windows7-x64
3PCICHEK.dll
windows10-2004-x64
3PCICL32.dll
windows7-x64
3PCICL32.dll
windows10-2004-x64
3TCCTL32.dll
windows7-x64
3TCCTL32.dll
windows10-2004-x64
3client32.exe
windows7-x64
10client32.exe
windows10-2004-x64
10msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
3pcicapi.dll
windows7-x64
3pcicapi.dll
windows10-2004-x64
3remcmdstub.exe
windows7-x64
3remcmdstub.exe
windows10-2004-x64
3temp/ie_to...ho.dll
windows10-2004-x64
3temp/ie_to...64.dll
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
HTCTL32.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HTCTL32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PCICHEK.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
PCICHEK.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PCICL32.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
PCICL32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
TCCTL32.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
TCCTL32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
client32.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
client32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
msvcr100.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
msvcr100.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
pcicapi.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
pcicapi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
remcmdstub.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
remcmdstub.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
temp/ie_to_edge_bho.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
temp/ie_to_edge_bho_64.dll
Resource
win10v2004-20241007-en
General
-
Target
client32.exe
-
Size
101KB
-
MD5
c4f1b50e3111d29774f7525039ff7086
-
SHA1
57539c95cba0986ec8df0fcdea433e7c71b724c6
-
SHA256
18df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
-
SHA512
005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
SSDEEP
768:q78j0+RH6e6XhBBxUcnRWIDDDDDDDDDDDDDDDDADDDDDDDDDDDDDDDDDDDDDDXDU:qwpHLiLniepfxP91/bQxnu
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: client32.exe File opened (read-only) \??\H: client32.exe File opened (read-only) \??\K: client32.exe File opened (read-only) \??\Q: client32.exe File opened (read-only) \??\S: client32.exe File opened (read-only) \??\T: client32.exe File opened (read-only) \??\W: client32.exe File opened (read-only) \??\X: client32.exe File opened (read-only) \??\Z: client32.exe File opened (read-only) \??\O: client32.exe File opened (read-only) \??\R: client32.exe File opened (read-only) \??\Y: client32.exe File opened (read-only) \??\B: client32.exe File opened (read-only) \??\J: client32.exe File opened (read-only) \??\L: client32.exe File opened (read-only) \??\M: client32.exe File opened (read-only) \??\N: client32.exe File opened (read-only) \??\P: client32.exe File opened (read-only) \??\V: client32.exe File opened (read-only) \??\A: client32.exe File opened (read-only) \??\G: client32.exe File opened (read-only) \??\I: client32.exe File opened (read-only) \??\U: client32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2932 client32.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2932 client32.exe 2932 client32.exe 2932 client32.exe 2932 client32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2932 client32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\client32.exe"C:\Users\Admin\AppData\Local\Temp\client32.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2932