General
-
Target
classroom.cloud.1.1e32ad54-8afb-4c05-a1c5-6e3e40e93fe4.uksouth(2).msi
-
Size
54.1MB
-
Sample
250108-z5m73awncn
-
MD5
7ac4d934b4d49e2fe9376a5d6071e95a
-
SHA1
26f48f7235651115d4ae806b67867255fbff3498
-
SHA256
d933149df4213449714cf63a0d63d04cb632caa97845579eae269bf16b5badcf
-
SHA512
795429c6952e71ccd09259ce3bc4ccd6aa1a31ac193aff057ae160af8fa3000fcc7704ba3e5047c571797703fa4fbcfe7b3b40d89c2299c7bdb7c37138b64d11
-
SSDEEP
1572864:FTBHdo6SPs7HpTeowced2oC6ho5fstdq:FNNSPIpTeoVed22
Static task
static1
Behavioral task
behavioral1
Sample
classroom.cloud.1.1e32ad54-8afb-4c05-a1c5-6e3e40e93fe4.uksouth(2).msi
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
classroom.cloud.1.1e32ad54-8afb-4c05-a1c5-6e3e40e93fe4.uksouth(2).msi
-
Size
54.1MB
-
MD5
7ac4d934b4d49e2fe9376a5d6071e95a
-
SHA1
26f48f7235651115d4ae806b67867255fbff3498
-
SHA256
d933149df4213449714cf63a0d63d04cb632caa97845579eae269bf16b5badcf
-
SHA512
795429c6952e71ccd09259ce3bc4ccd6aa1a31ac193aff057ae160af8fa3000fcc7704ba3e5047c571797703fa4fbcfe7b3b40d89c2299c7bdb7c37138b64d11
-
SSDEEP
1572864:FTBHdo6SPs7HpTeowced2oC6ho5fstdq:FNNSPIpTeoVed22
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Installer Packages
1