Analysis

  • max time kernel
    125s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 13:54

General

  • Target

    fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe

  • Size

    5.9MB

  • MD5

    90266d58cb8c03bf6f3171e60b383ee5

  • SHA1

    2bd1981838b9f80196a1576e398f89bf964ea24f

  • SHA256

    fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24

  • SHA512

    8899898628a6eac463d34f9f19bd7c577e16d4d4cf79697ca7033a820392b353a1e6e38c96b645e8afaa4b953dc55b5909493646205b4ebf4192b5db8ac65673

  • SSDEEP

    98304:AjHUJxDQbcImqaNCO8MX71guf/x2NSaGn6AGpq5TL+B3KogDaVTB0SiP0wzH:AI+mqvO8kDxuSZ6AGp++1sIy04

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 20 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe
    "C:\Users\Admin\AppData\Local\Temp\fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\FutureApp\Sibuia.exe
      C:\Users\Admin\AppData\Local\Temp\FutureApp\Sibuia.exe TRUE 111 0
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Users\Admin\AppData\Local\Temp\FutureApp\sibjs.exe
        "C:\Users\Admin\AppData\Local\Temp\FutureApp\sibjs.exe" TRUE 000 False cond_pkg
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2580
      • C:\Users\Admin\AppData\Local\Temp\FutureApp\0\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\FutureApp\0\Setup.exe" -s
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2596
      • C:\Users\Admin\AppData\Local\Temp\FutureApp\1\333.exe
        "C:\Users\Admin\AppData\Local\Temp\FutureApp\1\333.exe" -s
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\ProgramData\FutureApp\2.bat" "
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\ProgramData\FutureApp\FutureApp.exe
            C:\ProgramData\FutureApp\FutureApp.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:2632
      • C:\Users\Admin\AppData\Local\Temp\FutureApp\sibjs.exe
        "C:\Users\Admin\AppData\Local\Temp\FutureApp\sibjs.exe" TRUE 2 False
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C babka.cmd
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:660
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "FutureApp" /t REG_SZ /F /D "C:\ProgramData\FutureApp\FutureApp.exe"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:2148
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "FutureApp" /t REG_SZ /F /D "C:\ProgramData\FutureApp\FutureApp.exe"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\FutureApp\2.bat

    Filesize

    54B

    MD5

    96067949bdf249671fc66c8f2449d637

    SHA1

    f0d988b6e0d8b06ddefa34a8a8cf72dd701ffbfd

    SHA256

    4af87dbcf275ac56834c2c693e70da7e505f750ef450da7c2ae1cf889dd8a33d

    SHA512

    a33fbf868f71a70ffd692c361e7c821155d4be63adafa95c918772674697a6e94c5340487fcf0e82036c11fb8cfe22f102704daac53039bb441896918ef2b070

  • C:\ProgramData\FutureApp\FutureApp.exe

    Filesize

    103KB

    MD5

    8d9709ff7d9c83bd376e01912c734f0a

    SHA1

    e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294

    SHA256

    49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3

    SHA512

    042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee

  • C:\ProgramData\FutureApp\NSM.LIC

    Filesize

    257B

    MD5

    7067af414215ee4c50bfcd3ea43c84f0

    SHA1

    c331d410672477844a4ca87f43a14e643c863af9

    SHA256

    2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12

    SHA512

    17b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f

  • C:\ProgramData\FutureApp\PCICL32.dll

    Filesize

    3.6MB

    MD5

    00587238d16012152c2e951a087f2cc9

    SHA1

    c4e27a43075ce993ff6bb033360af386b2fc58ff

    SHA256

    63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8

    SHA512

    637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226

  • C:\ProgramData\FutureApp\client32.ini

    Filesize

    702B

    MD5

    a4aa9219becdeec09159270bb041bb35

    SHA1

    2d08305017efb0a1ff7defdf66db80191ed9ccf8

    SHA256

    277b9bcb5778cd5dc167ed75528818b06ed12f3fd427339f3085f4db8a39ed2e

    SHA512

    4f7ce001da009fcba0c5beab572a16306d56fd91253c45d5196892142da78ec805982a4e1c136ad61471b5a951697eed76f9ee63d8b94eb64024a11e0fd0de42

  • C:\Users\Admin\AppData\Local\Temp\FutureApp\2\babka.cmd

    Filesize

    277B

    MD5

    7b3f261fb057fce0cb6233bd5258f829

    SHA1

    d8b9075eaea96e7c5444cd3a209c78bd8bcd4e38

    SHA256

    70fc159c1040f7da1beaba2ca98004babbd2ae7e2957d7c0c2aa67ebc43a1457

    SHA512

    06401741072a5f0e41ea37523925b04af9fb2710f559b21eaba3a449a929d86028dfa6750d67744940bdcfb838e20fcb7210239a67d9f8c6ad09f4d0ed73d2be

  • C:\Users\Admin\AppData\Local\Temp\FutureApp\SibClr.dll

    Filesize

    66KB

    MD5

    640f3d42e52e3d361569c3fb6bb4441d

    SHA1

    2c7acdc20d3788b58bf139f304ed38ceaa98af31

    SHA256

    ffc17acf3f3c8e73b944e279fee7ecaf6fac46ec4c305aedc1c51122db256e37

    SHA512

    5429b2ede62400166950e6385b44612960338ccb7162b82fe7e62cb6e48b9e07be22eea6a8c798defb5320a34a8e26d85e71886754e8e8a71d0a0ffc30ba1158

  • C:\Users\Admin\AppData\Local\Temp\FutureApp\Sibjs.exe

    Filesize

    2.1MB

    MD5

    cb98aab3f8a161d55d04086ffcafbbbd

    SHA1

    14c4c97c22d6c3456da33c59ed1dc9d8f86fdc73

    SHA256

    94a297719f304bb12f650d693984db73c7a72685f28cdeeca2fa34a407808231

    SHA512

    fd79696e98c8e3f9a422fa879c28b3305f007b8ea5efd80b5524704b8bea8183c0ba11d4336d5a4aed1c97b17a668b488808fb0a0f7614f001a32c48e3d8083b

  • C:\Users\Admin\AppData\Local\Temp\FutureApp\sib.dat

    Filesize

    6KB

    MD5

    e18bb555ad612faca72cd518afc42931

    SHA1

    5d33476e909fced814500c95e67e729bed003fb8

    SHA256

    36f86d18c21b93868bf43b3b7d20439d8cf9914c1b557e42f22addd84b4a6f72

    SHA512

    fe976afe2357d1670d6728c695c88c24c3a575bd5d5de25ebed6a552294b52ff05301a909997a1b987ca74debcea539adc405c9c2f3b0c54254ba7b46a03fc9b

  • C:\Users\Admin\AppData\Local\Temp\nseE9A5.tmp\siblog.dll

    Filesize

    146KB

    MD5

    2fab606d750aad11fbf8e0a9060172db

    SHA1

    b2e40332e179f921a73c64ea09a54c0f2bf75959

    SHA256

    d3289b09fc9c37a80f0215b5c8c7990b9d3353e0c27cc4689e806d6026b6dda7

    SHA512

    1670ddfb2233c346a8cd5ee88700697c17123923da964e115c6ade238f77b421f51bf6459bf46bb3966f1de8fdeeeda774d7100b5c5dac46e53e738e8691ab1f

  • \ProgramData\FutureApp\HTCTL32.DLL

    Filesize

    320KB

    MD5

    2d3b207c8a48148296156e5725426c7f

    SHA1

    ad464eb7cf5c19c8a443ab5b590440b32dbc618f

    SHA256

    edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796

    SHA512

    55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c

  • \ProgramData\FutureApp\PCICHEK.DLL

    Filesize

    18KB

    MD5

    a0b9388c5f18e27266a31f8c5765b263

    SHA1

    906f7e94f841d464d4da144f7c858fa2160e36db

    SHA256

    313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

    SHA512

    6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

  • \ProgramData\FutureApp\msvcr100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • \ProgramData\FutureApp\pcicapi.dll

    Filesize

    32KB

    MD5

    dcde2248d19c778a41aa165866dd52d0

    SHA1

    7ec84be84fe23f0b0093b647538737e1f19ebb03

    SHA256

    9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

    SHA512

    c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

  • \Users\Admin\AppData\Local\Temp\FutureApp\0\Setup.exe

    Filesize

    5.1MB

    MD5

    596636d5258ffeae01bd19f87d96808b

    SHA1

    4f2883153d197f18ec21a78f4df0544cb326a99c

    SHA256

    873d448590ed30d1ba80ca54c84714cddec27ad6a1e4f84fcd7b091d3acf9a56

    SHA512

    0cb8ceb79b0a1f43c02458517b6e6b46a1121a714feef2e72934e9065447f0eefb4661d474d56776a0c92e52c851a682ba17a3e80901f6d4633deb32e16a3ea7

  • \Users\Admin\AppData\Local\Temp\FutureApp\1\333.exe

    Filesize

    323KB

    MD5

    f76410e6255ed89c286c35b7b7c5269a

    SHA1

    8a22735312d9a4692350464b107ed5872bf2527e

    SHA256

    0b8c0c908da39e77e0ef2f4b3b0eb96f3709d052252e0eae619790c61fc42b81

    SHA512

    51792ac3843450672ede7a44e1dab0509b26e1ab4d2fa93d08c0d25644920bc5afbeb35372cf55a99fa624f61c5e1188ee9d3bff58808c9b3d7c8f61c95435d7

  • \Users\Admin\AppData\Local\Temp\FutureApp\SibCa.dll

    Filesize

    4KB

    MD5

    de92f3c2273b3803e23216387c87b769

    SHA1

    23395fbc13ad680e1b4a5a01aaa8e4b07329fc04

    SHA256

    39858473da9bedf8b5c0ffe9cd4763de4879e877e783fd038af3d93338fa9951

    SHA512

    8ecac578fd704a8be968cfe5c8733b32e3c4b8a4443499c5071a262e8e5026582729cea772f21cc0c3aa7a49ed4cb7e456d39f09a750c6d65a86b31e1dfd1fbb

  • \Users\Admin\AppData\Local\Temp\FutureApp\Sibuia.exe

    Filesize

    2.2MB

    MD5

    a27781beec02a26de306aae4f1a07eca

    SHA1

    56cfe4516031a3cbb6e9ea93d910447914f22e01

    SHA256

    845bb388322c35078cfc9d47d4d1752b62f796f4defa79215004547a040d0704

    SHA512

    dfc25773b867805c5ffaabde22be435512cf9597237aacb4627f6b66c69f68180f78877983b5099dba7b3792a0a0836ad0991004af1a9271b3827d53aca03236

  • memory/1636-120-0x000000000E990000-0x000000000EA4A000-memory.dmp

    Filesize

    744KB

  • memory/1636-123-0x00000000005E0000-0x00000000005E8000-memory.dmp

    Filesize

    32KB

  • memory/1636-119-0x0000000000580000-0x0000000000592000-memory.dmp

    Filesize

    72KB

  • memory/2580-39-0x00000000745C0000-0x0000000074CAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2580-38-0x000000000E480000-0x000000000E488000-memory.dmp

    Filesize

    32KB

  • memory/2580-34-0x00000000745C0000-0x0000000074CAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2580-33-0x00000000745C0000-0x0000000074CAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2580-32-0x00000000745C0000-0x0000000074CAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2580-31-0x0000000010B60000-0x0000000010C1A000-memory.dmp

    Filesize

    744KB

  • memory/2580-30-0x000000000E3F0000-0x000000000E402000-memory.dmp

    Filesize

    72KB

  • memory/2580-26-0x00000000745CE000-0x00000000745CF000-memory.dmp

    Filesize

    4KB

  • memory/2596-91-0x0000000000DD0000-0x00000000010E1000-memory.dmp

    Filesize

    3.1MB