Analysis

  • max time kernel
    107s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 18:56

General

  • Target

    JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe

  • Size

    701.5MB

  • MD5

    49a4a1de5be4bd6e07cde60123841b4c

  • SHA1

    97af4fbcb4153c704641214b47aaf6214bebb15c

  • SHA256

    dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd

  • SHA512

    a44989777718f8e49f6df8b3c0f07f403d14b9aa278b5408e62c9b62d392d055895bfa37a69a013898dba59d71a7de661c546e344c4f315887f06184e0ce1632

  • SSDEEP

    98304:kfMKt+zSwDjgFrEiAmeDbM+SOUxRpASfPKH4T:k0fPkgLE+0DA/H4T

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\client32.exe
      "C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\client32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\HTCTL32.DLL

    Filesize

    320KB

    MD5

    3221ee3663e993e1ed63eaea1e2aa8e7

    SHA1

    a010f49766248e54e2aecaca75a96f522e7da42a

    SHA256

    3b715dc221ffe5eaf4f3bac692a3c9c557005acec8e2ca634535043b2e319065

    SHA512

    644c6dad5db5a0e9da6cf3c195fd03bcdb5be4b1611546909ff6ab860a251330353f7ece0bed7c81b3d832301fa3a00efc8a132000bdbb61b4bf6efbde788ce1

  • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\MSVCR100.dll

    Filesize

    755KB

    MD5

    8ef2222d8ce5d2c6db41e0baa9dfba5d

    SHA1

    a38332fce037720a0d4f4b2add6fa887f075b0f4

    SHA256

    8f0eebe3056a4fc69206e4923dc6e4500174b64e852313a16dbf6dd39d232f5f

    SHA512

    43e662a085daeabf40da73a1bea3aeb0a0775b490a5bd1adb752b81998e699dc32e5e9343e516d3e9ecd480688f5b6e774962ad2d79ea315f5df252b6838e8f1

  • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\NSM.LIC

    Filesize

    258B

    MD5

    1b41e64c60ca9dfadeb063cd822ab089

    SHA1

    abfcd51bb120a7eae5bbd9a99624e4abe0c9139d

    SHA256

    f4e2f28169e0c88b2551b6f1d63f8ba513feb15beacc43a82f626b93d673f56d

    SHA512

    c97e0eabea62302a4cfef974ac309f3498505dd055ba74133ee2462e215b3ebc5c647e11bcbac1246b9f750b5d09240ca08a6b617a7007f2fa955f6b6dd7fee4

  • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\PCICHEK.DLL

    Filesize

    18KB

    MD5

    4144431d471b39404bc97d55a23ff038

    SHA1

    c1aea75636930dec35ce4207a78c6677a765877f

    SHA256

    744e33fe5b1993452edc8e3ff5f95c119b640e05b4a2e4f8951b30bf8503a9ec

    SHA512

    05cf53bc65d78299e474feb28a34efb96ffead23dcd39f8f13310d376722b6a73e6c8311ae5372ea615d64ba1e749cd6cbf9061efe52bf6895ca91d2f2d406c0

  • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\PCICL32.dll

    Filesize

    3.6MB

    MD5

    7420623b672b6f41a9b9233131c0f57c

    SHA1

    f8f939ff198d871c096bddcb396acaeb07474a68

    SHA256

    e628f5f3c112f627daf60d4d787677c3b46cf378ac3e874642e80e9d458144ff

    SHA512

    4f5b6d6163cb246009a6a12554520aebe7085ceab96e5065862cc6be39fa83f03792bf6763de2315c2944ce27deb7f4b366e5b07fb93d6d819700d15685a2d6d

  • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\client32.exe

    Filesize

    103KB

    MD5

    a571b16d5b88e4b185fc7f62717d528d

    SHA1

    e39fe79083a7d30a873497852867f0a5fda9a198

    SHA256

    abb915e58b09b4b7e233c8337692bc9401c59a6fba94999ef6a143dea56d6588

    SHA512

    121d771a3b51badadfb75cae9d6e6f3064563b79a601a0fdba61d1280a8c2646529e5cf705ba8076f703b88b355c0dd07b98091ad7fdf8ed33cca4e075e41c17

  • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\client32.ini

    Filesize

    914B

    MD5

    fd8286ae0a78720863b527ef40afa2d2

    SHA1

    cde55878b3f1f296548d2548a2f3cc0170afa67e

    SHA256

    b3c4963e4a5dbe7af6ad552526f58eff57c3f3868fde42416501643c95e938c0

    SHA512

    a75c53132a825635491fa9f5e5bbdc1201f505d4caf78ab56eedacb1cd9d2358af27c0f48ae548fe261dc26f4b68960abf8d950d26c747290c6cbd44297670c6

  • C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\pcicapi.dll

    Filesize

    32KB

    MD5

    38af07ea16434b34cb031d14c4ff2bf9

    SHA1

    abd3d16d409c476d06ee278ec811f634b637eee6

    SHA256

    ee6e92c7e6fcc13311e3995cfa67dc014313eaf84fdf7f77e433842b0e7fb181

    SHA512

    08660595b472b7ae07c7028d62abf35ff8c7f4773d51857137c709ebe17f0a60fb194bec48cc6f929131d2e04a949ed25fe30b81a4efa5d489f9edd7f0f45b9e

  • memory/1156-5-0x00000000044F0000-0x00000000049D4000-memory.dmp

    Filesize

    4.9MB

  • memory/1156-8-0x000000000FB40000-0x000000000FDAA000-memory.dmp

    Filesize

    2.4MB

  • memory/1156-7-0x000000000FDA0000-0x00000000120BD000-memory.dmp

    Filesize

    35.1MB

  • memory/1156-6-0x000000000FDA0000-0x00000000120BD000-memory.dmp

    Filesize

    35.1MB

  • memory/1156-1-0x00000000027AE000-0x00000000044E0000-memory.dmp

    Filesize

    29.2MB

  • memory/1156-4-0x00000000027AE000-0x00000000044E0000-memory.dmp

    Filesize

    29.2MB

  • memory/1156-3-0x00000000044F0000-0x00000000049D4000-memory.dmp

    Filesize

    4.9MB