Analysis
-
max time kernel
43s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 05:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mffaccessories.com/files.zip
Resource
win10v2004-20241007-en
General
-
Target
https://mffaccessories.com/files.zip
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 2300 msedge.exe 2300 msedge.exe 1920 identity_helper.exe 1920 identity_helper.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1932 client32.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 1932 client32.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 752 2300 msedge.exe 83 PID 2300 wrote to memory of 752 2300 msedge.exe 83 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 1716 2300 msedge.exe 84 PID 2300 wrote to memory of 4472 2300 msedge.exe 85 PID 2300 wrote to memory of 4472 2300 msedge.exe 85 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86 PID 2300 wrote to memory of 2856 2300 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mffaccessories.com/files.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8983846f8,0x7ff898384708,0x7ff8983847182⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,13539226251609622411,5376806178158871557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1584
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1432
-
C:\Users\Admin\Downloads\files\client32.exe"C:\Users\Admin\Downloads\files\client32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD56f46b70372e0ba1accb83d26d39150ce
SHA1b6395982d274386b228bac23323ef5fd35fd5712
SHA256061afa689b7dccb26c5abe49e965f1182636c831af6b78fe5ca1389f86c4571b
SHA5121088cd26275ef3f75897ff3ec07784c46668c7592ccd5bccda3e7dc60c0c0d585c0cc672aae7911591d5d1fde098cd1950243dd265b79385d77553539a95969c
-
Filesize
5KB
MD5a3f9a376bce87fc3662f70ecd3d19656
SHA1f45517153e833fd2130cc2b808b89a8c5a95be2d
SHA2565c47b7c92b61384dabcf8288f8a79addf67d907277ec05c7738f986abdb2e4c3
SHA51219894dea95480affddc55ab84923aff884c43d96b0c8968f308980f2805b6051f905abe8b1b8328ca4ad1556c614a0aba82b5dd30e5b6645fec314645b6053bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD546973c9cfa0bf75bc34da0e4cc0af34a
SHA150967ce5105a5a54fa72151f6af889502596f113
SHA256ddcec526ff60910db57d4c9a61d7772f215ba280dd241a99729a5fb72b73b61b
SHA51251843584e3c855d8ce8ed8e37f71feb1087ee5701db147ebd25b4e650419a7b808aa57cd670a6b2c0577dedfd3aa7904d43ae6e02e42d1e0fde65b3dea76a5bd
-
Filesize
10KB
MD5608b2adb763556fe125a49a205899ee2
SHA14a5ecd8b8a69140930ed1c4bf67daacf687d80d2
SHA256f27c013de698381acf1d2c221bb9a64ecd2ad4751d9a35b84c071993720cac08
SHA512a64c1c66536f9ff0319bf6237b66432982fd66289b99f725b47388e433cc8afbe0d4cb9804f8d5e28c361e5cf5af7c6918cbbd6b14a95e679967c02293020d04
-
Filesize
6.6MB
MD5b72621a86d35daf99d963ffd13206315
SHA1ef199736953f7d70c90c5401c5158bdc7b5a9073
SHA25678dba97ea743f3b5a3c3a7a8b410d34a62fd23c3ca95c4ca2d4048e4610b682b
SHA5126870b6f3bc21a6550c9ee228a26f8b73b36badd8f3a7d04bc742ff4336347e593700866ae143ba8143f325c579ed5cda88996c8bc93ac53aa5bb63e0a18ecbb0