Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1NetSupport...03.zip
windows7-x64
1NetSupport...03.zip
windows10-2004-x64
1Client32.ini
windows7-x64
1Client32.ini
windows10-2004-x64
1NSM.lic
windows7-x64
3NSM.lic
windows10-2004-x64
3NSS.ini
windows7-x64
1NSS.ini
windows10-2004-x64
1NetSupport...03.exe
windows7-x64
10NetSupport...03.exe
windows10-2004-x64
10NetSupportInstall.bat
windows7-x64
10NetSupportInstall.bat
windows10-2004-x64
10client32u.ini
windows7-x64
1client32u.ini
windows10-2004-x64
1General
-
Target
NetSupport School Student 15.10.0003.zip
-
Size
146.3MB
-
Sample
250131-q8rvzszjgm
-
MD5
3bf1612dfb04b1c0d671c07da43a3f44
-
SHA1
e5480a23c5a335f165b2fb90c2c54cb048dbae5c
-
SHA256
6bdf18220b60167f19d0294e351432cbe3ec83e905b620dcad8aea8260d3fbf3
-
SHA512
64c4f5bda6bd8e46094d43b75d451e80c946fed52d38b651899f8e896116ab8610a0b20149f8428b1252e82b4e032f206aac9b2ff52b32ead5b0caa770fc8474
-
SSDEEP
3145728:HKB1f/SCtkhbkn+3fXSRyNg+VfMdbUiAEopNWdH1RBWXUsThIudv:HKTnSCtkhbAi1BVE2Egcd8dlI0
Static task
static1
Behavioral task
behavioral1
Sample
NetSupport School Student 15.10.0003.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
NetSupport School Student 15.10.0003.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
Client32.ini
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Client32.ini
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
NSM.lic
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
NSM.lic
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
NSS.ini
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
NSS.ini
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
NetSupport School 15.10.0003.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
NetSupport School 15.10.0003.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
NetSupportInstall.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
NetSupportInstall.bat
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
client32u.ini
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
client32u.ini
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
NetSupport School Student 15.10.0003.zip
-
Size
146.3MB
-
MD5
3bf1612dfb04b1c0d671c07da43a3f44
-
SHA1
e5480a23c5a335f165b2fb90c2c54cb048dbae5c
-
SHA256
6bdf18220b60167f19d0294e351432cbe3ec83e905b620dcad8aea8260d3fbf3
-
SHA512
64c4f5bda6bd8e46094d43b75d451e80c946fed52d38b651899f8e896116ab8610a0b20149f8428b1252e82b4e032f206aac9b2ff52b32ead5b0caa770fc8474
-
SSDEEP
3145728:HKB1f/SCtkhbkn+3fXSRyNg+VfMdbUiAEopNWdH1RBWXUsThIudv:HKTnSCtkhbAi1BVE2Egcd8dlI0
Score1/10 -
-
-
Target
Client32.ini
-
Size
92B
-
MD5
2891d54b321f58e1569376ebca72e826
-
SHA1
b30a8b47cf07b0ff56735b43123dd128b5a02e99
-
SHA256
81a7d68b8c25efb544d0bcfca92e9c2d3f98393132fecfe3a8c41337d93966dd
-
SHA512
982134098d06593f527a3c20a31dbb7f471cd158c9ac80f7d972d7c28a90ffe1feaea025a58f3de103ba81c7f5d97f9004c3f90b99b59c753db0267303ad746c
Score1/10 -
-
-
Target
NSM.LIC
-
Size
282B
-
MD5
39030ae352cc16a7fd0bf49261d97403
-
SHA1
485f2944ead7b484a052c2f436ed950327bfc961
-
SHA256
52703269ec26d1988de1efda21597a3faf563e980e1afc5434441ecd34d80ded
-
SHA512
7c89c1263b693e0802379bfbbd785d354b0686f354abb2aa9f982b3c53dda316d7c584a3af0d4b3fc1a072c49986fa4b93a99b63d9dc2645f798ff8913a29a3d
Score3/10 -
-
-
Target
NSS.ini
-
Size
257B
-
MD5
aa8bbd2a7a2b76356fc703feacfe3262
-
SHA1
15b395c996d45c82271bf08e3327bd980be457d5
-
SHA256
55a49b936d0a58cde0d0be2c76a16daa81ff07ba58d279e0dc1c170feb731d63
-
SHA512
2185c461ddfebc41092df657aaed25a2317101a1f758ad697b90441ac651dfa1db82f9bf6a3eaba0e1ab570f820abfe9218ce442ffcbd085b18847ee94c644d6
Score1/10 -
-
-
Target
NetSupport School 15.10.0003.exe
-
Size
146.9MB
-
MD5
50c6a195ea8b2cac825a3bd2b2e5d5f7
-
SHA1
7704b7bc735066139657919cc589fef8fdfd76a1
-
SHA256
f1f0d729245cd9272510e8fd258708ead8ed7ab0db39343c6f69cf9d35a35c2b
-
SHA512
838332cb950b70aef47ffbff2dbb1503b26ee0fcb702376fbf6633e00bd33aa2b8add3432b28ce79ce0b44d51a7812dbb9c749782d4efc21c5df7c7a78a53088
-
SSDEEP
3145728:7ghv5tQmlmVPMfix3deHWzomfJ4dbOO+2iX3gvB159GRiYDNAC77:7gF7QmlmVPguPRfy62KwvO/BAe
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
NetSupportInstall.bat
-
Size
66B
-
MD5
c64fd547b11cc65bfbb93bdbfa750eef
-
SHA1
216ce7fa10a536b32b868746da7b970382c61453
-
SHA256
7994b920cb245256765becf9fe5bd8e09b3525814846eed4296204b454303a15
-
SHA512
60afdc2621be2491eaa4ddda0c1f7aa689c18a022646292afed94d92a8344622bc05c36738724dbedcc1c5310ad57890e1ab9142b06c5f9127e5bedb987a2179
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
client32u.ini
-
Size
93B
-
MD5
9395ce94041387301999bcac536b0bde
-
SHA1
8150eafe6eb013ff9d887cbdfa6109804bf82830
-
SHA256
3b3e0453d8a183b4145e1c7fb56f87a89c89900eee5c49a4a0f2bd0a028b9f55
-
SHA512
6580a9f1000190b27a4d3bb85b371f28d7be7f2077b85f81be60c160fc16a54320a3ff05ab3247cd807a0d782a56e786c8ed1322dedd093ed923ac8ae2784781
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3