Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/01/2025, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
NetSupport School 15.10.0003.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
NetSupportInstall.bat
Resource
win11-20241007-en
General
-
Target
NetSupportInstall.bat
-
Size
66B
-
MD5
c64fd547b11cc65bfbb93bdbfa750eef
-
SHA1
216ce7fa10a536b32b868746da7b970382c61453
-
SHA256
7994b920cb245256765becf9fe5bd8e09b3525814846eed4296204b454303a15
-
SHA512
60afdc2621be2491eaa4ddda0c1f7aa689c18a022646292afed94d92a8344622bc05c36738724dbedcc1c5310ad57890e1ab9142b06c5f9127e5bedb987a2179
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\nskbfltr.sys winst64.exe File created C:\Windows\system32\drivers\nskbfltr2.sys winst64.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nskbfltr\ImagePath = "\\SystemRoot\\system32\\drivers\\nskbfltr.sys" MSIBD24.tmp -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 18 IoCs
pid Process 1580 MSIAC7D.tmp 640 MSIACDC.tmp 4992 MSIB214.tmp 968 checkdvd.exe 3232 MSIBB2F.tmp 2084 MSIBD24.tmp 2168 winst64.exe 3944 pcicfgui_setup.exe 1696 pcicfgui_setup.exe 4272 MSIC8C0.tmp 3088 client32.exe 476 client32.exe 1372 winst64.exe 460 Process not Found 2484 runplugin.exe 5068 runplugin64.exe 108 runplugin.exe 2108 runplugin64.exe -
Loads dropped DLL 64 IoCs
pid Process 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 3896 MsiExec.exe 3896 MsiExec.exe 3896 MsiExec.exe 3896 MsiExec.exe 3896 MsiExec.exe 2168 winst64.exe 2084 MSIBD24.tmp 3896 MsiExec.exe 2440 MsiExec.exe 3944 pcicfgui_setup.exe 3944 pcicfgui_setup.exe 3944 pcicfgui_setup.exe 3944 pcicfgui_setup.exe 3944 pcicfgui_setup.exe 3088 client32.exe 3088 client32.exe 3088 client32.exe 3088 client32.exe 3088 client32.exe 3088 client32.exe 3088 client32.exe 3088 client32.exe 2440 MsiExec.exe 2440 MsiExec.exe 2440 MsiExec.exe 476 client32.exe 476 client32.exe 476 client32.exe 476 client32.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2320 msiexec.exe 3 2320 msiexec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: runplugin64.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: runplugin.exe File opened (read-only) \??\J: runplugin64.exe File opened (read-only) \??\M: runplugin.exe File opened (read-only) \??\U: runplugin64.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: runplugin.exe File opened (read-only) \??\J: runplugin.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: runplugin.exe File opened (read-only) \??\Y: runplugin.exe File opened (read-only) \??\V: runplugin64.exe File opened (read-only) \??\Y: runplugin64.exe File opened (read-only) \??\S: runplugin.exe File opened (read-only) \??\B: runplugin64.exe File opened (read-only) \??\K: runplugin64.exe File opened (read-only) \??\R: runplugin64.exe File opened (read-only) \??\E: runplugin.exe File opened (read-only) \??\K: runplugin.exe File opened (read-only) \??\Z: runplugin64.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: runplugin64.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: runplugin.exe File opened (read-only) \??\U: runplugin.exe File opened (read-only) \??\S: runplugin64.exe File opened (read-only) \??\N: runplugin64.exe File opened (read-only) \??\Q: runplugin64.exe File opened (read-only) \??\T: runplugin64.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: runplugin.exe File opened (read-only) \??\W: runplugin.exe File opened (read-only) \??\F: runplugin.exe File opened (read-only) \??\M: runplugin64.exe File opened (read-only) \??\P: runplugin64.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\L: runplugin.exe File opened (read-only) \??\O: runplugin.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: runplugin.exe File opened (read-only) \??\I: runplugin.exe File opened (read-only) \??\O: runplugin64.exe File opened (read-only) \??\I: runplugin64.exe File opened (read-only) \??\W: runplugin64.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: runplugin.exe File opened (read-only) \??\F: runplugin64.exe File opened (read-only) \??\A: runplugin.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: runplugin.exe File opened (read-only) \??\L: runplugin64.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: runplugin64.exe File opened (read-only) \??\H: runplugin64.exe File opened (read-only) \??\V: msiexec.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "0" MSIBD24.tmp -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\pcimsg.dll MSIBD24.tmp File opened for modification C:\Windows\SysWOW64\pcimsg.dll MSIBD24.tmp File created C:\Windows\system32\client32provider.dll winst64.exe File opened for modification C:\Windows\system32\client32provider.dll winst64.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3944 pcicfgui_setup.exe 3944 pcicfgui_setup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-crt-multibyte-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\keyshowhook.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\Client32Provider.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\ActApp.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\Client32.upd msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\NetSupport School\_Shared Data.lnk MSIBD24.tmp File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-file-l2-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-heap-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\pluginiemodule.DLL msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\WdfCoInstaller01005.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\icuuc51.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\_Data.lnk MSIBB2F.tmp File created C:\Program Files (x86)\NetSupport\NetSupport School\mfc100u.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-synch-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\ucrtbase.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\shfolder.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\nss_lock_image_ws.jpg msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\nspowershell.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\icule51.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\NSS32.chm msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\mfc140u.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-debug-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-errorhandling-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-crt-stdio-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\PlaySound.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\NSToast.exe msiexec.exe File opened for modification C:\Program Files (x86)\NetSupport\NetSupport School\client32u.ini checkdvd.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-localization-l1-2-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\pluginprintmanmodule64.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\libssl-1_1.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\x64\gdihook5.sys msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\nskbfltr2.sys msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-string-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\gdiplus.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\blockapp.jpg msiexec.exe File created C:\Program Files (x86)\Common Files\NSL\winstHooks64.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\wxbase322u_vc_custom.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\concrt140.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\nsmexec.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\gdihook5.INF msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\Sounds\StudentCorrect.wav msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\wxmsw322u_core_vc_custom.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\supporttool.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-profile-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-sysinfo-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\vcruntime140.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\libhpdf.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-file-l1-2-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\PCICTL.DLL msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\nskbfltr.inf msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\keyShow64.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\Client32.ini msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\url_list.gif msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\setroom.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\Dummy.Lic msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-core-synch-l1-2-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-crt-environment-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-crt-filesystem-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-crt-heap-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\api-ms-win-crt-runtime-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\remcmdstub.exe msiexec.exe File created C:\Program Files (x86)\NetSupport\NetSupport School\Sounds\ShowAnswer.wav msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIACDC.tmp msiexec.exe File opened for modification C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\VideoShortcutWin7Abo_484D413D0D3342A2A692F037061C1AA9.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIAF1F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB108.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA785.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA855.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA875.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAB6F.tmp msiexec.exe File created C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\pcinssui.exe_5E9E1DA4475445BE9255D1E30AFF412C.exe msiexec.exe File created C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\NewShortcut3_80D45F4DD8E3472CB2C7080AAA34AB2A.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIBAFF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC4B6.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA405.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA7D5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICD26.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA887.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA8C8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAAB3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAC0D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAC7D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA2D7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA3C3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA886.tmp msiexec.exe File opened for modification C:\Windows\setuperr.log MSIBD24.tmp File opened for modification C:\Windows\Installer\MSIB214.tmp msiexec.exe File opened for modification C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\pcinssui.exe1_28874BA5F8594ADCBE8AB571ECB4C1AB.exe msiexec.exe File opened for modification C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\NewShortcut8_134A4E1756504D7CA2A1E16C4AA879D9.exe msiexec.exe File created C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\pcinssui.exe1_28874BA5F8594ADCBE8AB571ECB4C1AB.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIC8C0.tmp msiexec.exe File opened for modification C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\NewShortcut1_1045CC3CC07549BB86C478A6B724F98D.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIBB2F.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{F021B863-9473-4467-93B2-6FC48C30E42F} msiexec.exe File created C:\Windows\SystemTemp\~DF050B60E03D9F3D40.TMP msiexec.exe File created C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\NewShortcut1_1045CC3CC07549BB86C478A6B724F98D.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIA7F5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA8C9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIABED.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBD24.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA835.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA8DC.tmp msiexec.exe File created C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\schdesigner.exe_5E9E1DA4475445BE9255D1E30AFF412C.exe msiexec.exe File created C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\NewShortcut4_28874BA5F8594ADCBE8AB571ECB4C1AB.exe msiexec.exe File created C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\pcideply.exe_5E9E1DA4475445BE9255D1E30AFF412C.exe msiexec.exe File opened for modification C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\NewShortcut3_80D45F4DD8E3472CB2C7080AAA34AB2A.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIAAA2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB109.tmp msiexec.exe File opened for modification C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\setupact.log MSIBD24.tmp File opened for modification C:\Windows\Installer\MSICD37.tmp msiexec.exe File opened for modification C:\Windows\Installer\e579d49.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIAC6C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB0C9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA897.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFD2FB07075197A09C.TMP msiexec.exe File opened for modification C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\NewShortcut4_28874BA5F8594ADCBE8AB571ECB4C1AB.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIA3F5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA446.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA795.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB457.tmp msiexec.exe File created C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\{F021B863-9473-4467-93B2-6FC48C30E42F}\pcideply.exe_5E9E1DA4475445BE9255D1E30AFF412C.exe msiexec.exe File opened for modification C:\Windows\Installer\MSICD27.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA3E3.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language checkdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIBB2F.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runplugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIB214.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runplugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NetSupport School 15.10.0003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIBD24.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcicfgui_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIEXEC.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIACDC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIC8C0.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Internet Explorer\Main\Isolation_old_student = "PMEM" client32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Internet Explorer\Main\Isolation = "PMIL" client32.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%systemroot%\system32\FirewallControlPanel.dll,-12122 = "Windows Defender Firewall" client32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings\JITDebug = "0" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\powrprof.dll,-13 = "High performance" client32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\powrprof.dll,-11 = "Power saver" client32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\powrprof.dll,-15 = "Balanced" client32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E client32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ASFFile\shell\show MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\{7F8E22A1-B40D-4672-9572-82E039B78705}\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ASFFile MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ASFFile\shell\show\ = "&Show with NetSupport School" MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{71C5A887-11E0-4c5a-9B9B-D4A074555692}\ = "Client32Provider" winst64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\Shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{71C5A887-11E0-4c5a-9B9B-D4A074555692} winst64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\DeploymentFlags = "3" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\943C1EEA70369E845B409AAF32BEB8CD\368B120F37497644392BF64CC8034EF2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\{7F8E22A1-B40D-4672-9572-82E039B78705}\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\.rpf msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell\show MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell\show\ = "&Show with NetSupport School" MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mpegfile\shell\show MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile\shell\show\ = "&Show with NetSupport School" MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\368B120F37497644392BF64CC8034EF2\NSS msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\EditFlags = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\shell\show MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\shell\show\command MSIBD24.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\SourceList\Media\1 = "DISK1;1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\N265c766d\a = "S" MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rpf\ = "NSReplayFile" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\Shell\Play\Command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mpegfile\shell\show\ = "&Show with NetSupport School" MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\ = "NetSupport School Replay File" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\movfile MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\368B120F37497644392BF64CC8034EF2\Temp = "NSS" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ASFFile\shell\show\command MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\368B120F37497644392BF64CC8034EF2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\368B120F37497644392BF64CC8034EF2\InstalledBySetup = "Common" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\Shell\Play msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ASFFile\shell MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{71C5A887-11E0-4c5a-9B9B-D4A074555692}\InProcServer32\ThreadingModel = "Apartment" winst64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\AuthorizedLUAApp = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell\show\command MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\N265c766d MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\368B120F37497644392BF64CC8034EF2\Common = "NSS" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\368B120F37497644392BF64CC8034EF2\UseOnlineHelpYes = "Common" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\ProductIcon = "C:\\Windows\\Installer\\{F021B863-9473-4467-93B2-6FC48C30E42F}\\ARPPRODUCTICON.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\BrowserFlags = "8" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\shell MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell\show\command\ = "\"C:\\Program Files (x86)\\NetSupport\\NetSupport School\\pcinssui.exe\" /ShowVideo \"%L\"" MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mpegfile\shell MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\368B120F37497644392BF64CC8034EF2\Student = "NSS" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NSReplayFile\Shell\ = "Play" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\shell\show\command\ = "\"C:\\Program Files (x86)\\NetSupport\\NetSupport School\\pcinssui.exe\" /ShowVideo \"%L\"" MSIBD24.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\368B120F37497644392BF64CC8034EF2\Configurator = "NSS" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\PackageCode = "FB5CF6184E1C03947993AD8D0BD0DFCB" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\Version = "252313603" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\368B120F37497644392BF64CC8034EF2\SourceList\PackageName = "NetSupport School.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ASFFile\shell\show\command\ = "\"C:\\Program Files (x86)\\NetSupport\\NetSupport School\\pcinssui.exe\" /ShowVideo \"%L\"" MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\movfile\shell MSIBD24.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMVFile\shell\show\command MSIBD24.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 476 client32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2440 MsiExec.exe 2440 MsiExec.exe 2320 msiexec.exe 2320 msiexec.exe 2084 MSIBD24.tmp 2084 MSIBD24.tmp 2084 MSIBD24.tmp 2084 MSIBD24.tmp 3088 client32.exe 3088 client32.exe 476 client32.exe 476 client32.exe 5068 runplugin64.exe 5068 runplugin64.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2484 runplugin.exe 5068 runplugin64.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4092 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 4092 MSIEXEC.EXE Token: SeSecurityPrivilege 2320 msiexec.exe Token: SeCreateTokenPrivilege 4092 MSIEXEC.EXE Token: SeAssignPrimaryTokenPrivilege 4092 MSIEXEC.EXE Token: SeLockMemoryPrivilege 4092 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 4092 MSIEXEC.EXE Token: SeMachineAccountPrivilege 4092 MSIEXEC.EXE Token: SeTcbPrivilege 4092 MSIEXEC.EXE Token: SeSecurityPrivilege 4092 MSIEXEC.EXE Token: SeTakeOwnershipPrivilege 4092 MSIEXEC.EXE Token: SeLoadDriverPrivilege 4092 MSIEXEC.EXE Token: SeSystemProfilePrivilege 4092 MSIEXEC.EXE Token: SeSystemtimePrivilege 4092 MSIEXEC.EXE Token: SeProfSingleProcessPrivilege 4092 MSIEXEC.EXE Token: SeIncBasePriorityPrivilege 4092 MSIEXEC.EXE Token: SeCreatePagefilePrivilege 4092 MSIEXEC.EXE Token: SeCreatePermanentPrivilege 4092 MSIEXEC.EXE Token: SeBackupPrivilege 4092 MSIEXEC.EXE Token: SeRestorePrivilege 4092 MSIEXEC.EXE Token: SeShutdownPrivilege 4092 MSIEXEC.EXE Token: SeDebugPrivilege 4092 MSIEXEC.EXE Token: SeAuditPrivilege 4092 MSIEXEC.EXE Token: SeSystemEnvironmentPrivilege 4092 MSIEXEC.EXE Token: SeChangeNotifyPrivilege 4092 MSIEXEC.EXE Token: SeRemoteShutdownPrivilege 4092 MSIEXEC.EXE Token: SeUndockPrivilege 4092 MSIEXEC.EXE Token: SeSyncAgentPrivilege 4092 MSIEXEC.EXE Token: SeEnableDelegationPrivilege 4092 MSIEXEC.EXE Token: SeManageVolumePrivilege 4092 MSIEXEC.EXE Token: SeImpersonatePrivilege 4092 MSIEXEC.EXE Token: SeCreateGlobalPrivilege 4092 MSIEXEC.EXE Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 476 client32.exe 476 client32.exe 476 client32.exe 476 client32.exe 476 client32.exe 476 client32.exe 476 client32.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 476 client32.exe 476 client32.exe 476 client32.exe 476 client32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1372 winst64.exe 2484 runplugin.exe 5068 runplugin64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2572 4884 cmd.exe 78 PID 4884 wrote to memory of 2572 4884 cmd.exe 78 PID 4884 wrote to memory of 2572 4884 cmd.exe 78 PID 2572 wrote to memory of 4092 2572 NetSupport School 15.10.0003.exe 79 PID 2572 wrote to memory of 4092 2572 NetSupport School 15.10.0003.exe 79 PID 2572 wrote to memory of 4092 2572 NetSupport School 15.10.0003.exe 79 PID 2320 wrote to memory of 2440 2320 msiexec.exe 82 PID 2320 wrote to memory of 2440 2320 msiexec.exe 82 PID 2320 wrote to memory of 2440 2320 msiexec.exe 82 PID 2320 wrote to memory of 4580 2320 msiexec.exe 84 PID 2320 wrote to memory of 4580 2320 msiexec.exe 84 PID 4580 wrote to memory of 4616 4580 cmd.exe 86 PID 4580 wrote to memory of 4616 4580 cmd.exe 86 PID 4580 wrote to memory of 4616 4580 cmd.exe 86 PID 2320 wrote to memory of 652 2320 msiexec.exe 87 PID 2320 wrote to memory of 652 2320 msiexec.exe 87 PID 652 wrote to memory of 4352 652 cmd.exe 89 PID 652 wrote to memory of 4352 652 cmd.exe 89 PID 652 wrote to memory of 4352 652 cmd.exe 89 PID 2320 wrote to memory of 1580 2320 msiexec.exe 90 PID 2320 wrote to memory of 1580 2320 msiexec.exe 90 PID 2320 wrote to memory of 640 2320 msiexec.exe 92 PID 2320 wrote to memory of 640 2320 msiexec.exe 92 PID 2320 wrote to memory of 640 2320 msiexec.exe 92 PID 2320 wrote to memory of 3896 2320 msiexec.exe 93 PID 2320 wrote to memory of 3896 2320 msiexec.exe 93 PID 2320 wrote to memory of 3896 2320 msiexec.exe 93 PID 2320 wrote to memory of 4992 2320 msiexec.exe 94 PID 2320 wrote to memory of 4992 2320 msiexec.exe 94 PID 2320 wrote to memory of 4992 2320 msiexec.exe 94 PID 2320 wrote to memory of 968 2320 msiexec.exe 95 PID 2320 wrote to memory of 968 2320 msiexec.exe 95 PID 2320 wrote to memory of 968 2320 msiexec.exe 95 PID 2320 wrote to memory of 3232 2320 msiexec.exe 96 PID 2320 wrote to memory of 3232 2320 msiexec.exe 96 PID 2320 wrote to memory of 3232 2320 msiexec.exe 96 PID 2320 wrote to memory of 2084 2320 msiexec.exe 97 PID 2320 wrote to memory of 2084 2320 msiexec.exe 97 PID 2320 wrote to memory of 2084 2320 msiexec.exe 97 PID 2084 wrote to memory of 2168 2084 MSIBD24.tmp 98 PID 2084 wrote to memory of 2168 2084 MSIBD24.tmp 98 PID 2320 wrote to memory of 3204 2320 msiexec.exe 99 PID 2320 wrote to memory of 3204 2320 msiexec.exe 99 PID 3204 wrote to memory of 2604 3204 cmd.exe 101 PID 3204 wrote to memory of 2604 3204 cmd.exe 101 PID 3204 wrote to memory of 2604 3204 cmd.exe 101 PID 2320 wrote to memory of 3944 2320 msiexec.exe 102 PID 2320 wrote to memory of 3944 2320 msiexec.exe 102 PID 2320 wrote to memory of 3944 2320 msiexec.exe 102 PID 3944 wrote to memory of 1696 3944 pcicfgui_setup.exe 103 PID 3944 wrote to memory of 1696 3944 pcicfgui_setup.exe 103 PID 3944 wrote to memory of 1696 3944 pcicfgui_setup.exe 103 PID 2320 wrote to memory of 4272 2320 msiexec.exe 105 PID 2320 wrote to memory of 4272 2320 msiexec.exe 105 PID 2320 wrote to memory of 4272 2320 msiexec.exe 105 PID 3088 wrote to memory of 476 3088 client32.exe 107 PID 3088 wrote to memory of 476 3088 client32.exe 107 PID 3088 wrote to memory of 476 3088 client32.exe 107 PID 476 wrote to memory of 1372 476 client32.exe 108 PID 476 wrote to memory of 1372 476 client32.exe 108 PID 476 wrote to memory of 2484 476 client32.exe 109 PID 476 wrote to memory of 2484 476 client32.exe 109 PID 476 wrote to memory of 2484 476 client32.exe 109 PID 476 wrote to memory of 5068 476 client32.exe 110 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4352 attrib.exe 4616 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NetSupportInstall.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\NetSupport School 15.10.0003.exe"NetSupport School 15.10.0003" /S /v/qn2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\MSIEXEC.EXE"C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Temp\{7F8E22A1-B40D-4672-9572-82E039B78705}\NetSupport School.msi" /qn SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="NetSupport School 15.10.0003.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F5DBAAF99353CE0CA02EBC44D97F83D62⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Windows\system32\cmd.execmd.exe /c ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic2⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\attrib.exeATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4616
-
-
-
C:\Windows\system32\cmd.execmd.exe /c ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic2⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\attrib.exeATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4352
-
-
-
C:\Windows\Installer\MSIAC7D.tmp"C:\Windows\Installer\MSIAC7D.tmp" /p "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\Detect64LSP.txt"2⤵
- Executes dropped EXE
PID:1580
-
-
C:\Windows\Installer\MSIACDC.tmp"C:\Windows\Installer\MSIACDC.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EU2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 06BAF650E2FD561D4D095D03667891F9 E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3896
-
-
C:\Windows\Installer\MSIB214.tmp"C:\Windows\Installer\MSIB214.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EU2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Program Files (x86)\NetSupport\NetSupport School\checkdvd.exe"C:\Program Files (x86)\NetSupport\NetSupport School\checkdvd.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:968
-
-
C:\Windows\Installer\MSIBB2F.tmp"C:\Windows\Installer\MSIBB2F.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EC /Q /Q /C2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Windows\Installer\MSIBD24.tmp"C:\Windows\Installer\MSIBD24.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EV"NetSupport School" /EC /Q /Q /I *2⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\NetSupport\NetSupport School\winst64.exewinst64.exe /q /q /i3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2168
-
-
-
C:\Windows\system32\cmd.execmd.exe /c secedit /configure /areas SECURITYPOLICY /db hisecws.sdb /cfg "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NS.inf" /log "C:\Program Files (x86)\NetSupport\NetSupport School\sec.log" /overwrite /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\SecEdit.exesecedit /configure /areas SECURITYPOLICY /db hisecws.sdb /cfg "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NS.inf" /log "C:\Program Files (x86)\NetSupport\NetSupport School\sec.log" /overwrite /quiet3⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe"C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe" /Q "C:\Program Files (x86)\NetSupport\NetSupport School\Client32.ini"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe"C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe"3⤵
- Executes dropped EXE
PID:1696
-
-
-
C:\Windows\Installer\MSIC8C0.tmp"C:\Windows\Installer\MSIC8C0.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EI2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe"C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe" /* *1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe"C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe" * /VistaUI2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Program Files (x86)\NetSupport\NetSupport School\winst64.exe"C:\Program Files (x86)\NetSupport\NetSupport School\winst64.exe" /Q /Q /EBd01ac,03⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe"C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe" /USER=SYSTEM3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe"C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe" /USER=SYSTEM3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe"C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:108
-
-
C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe"C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe"3⤵
- Executes dropped EXE
PID:2108
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD57ae42d9502d3d64a5332ea67e223b86f
SHA1c922e032e4819bc3c44ab869aecec03710ee9671
SHA256505adfed006420526aca191aec8e225eafdefaa5614e529b9e2fa410d9013516
SHA512c019f3e925ed70351988d3081455630b844bd850185f1eed103f007160e34afb816b5b816539cca96d099805fa92d90b0ddc40a832a4db0881d5a2d5404e47cd
-
Filesize
745KB
MD50228cb02aa58ef2876713130990c8ccf
SHA1f6766273a186b6911a6127fbb5af90125e267bbe
SHA2563651a2131f423c5c553476236be7ad4f26a63c67d872c3b9ecc135d1d184b1ed
SHA512a07664e639252a2bd34f42fb6907b95889d31657aa81fcdeea4b171bf3410bd3d56f5e404ee8fc16938d826f7cfffc46efcfe74126afec6e87cb048618d26e89
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NetSupport School\NetSupport School Student Configurator.lnk
Filesize2KB
MD5c33b53c84be54eb4f18f7b874183547b
SHA1f01387ee5bc1f32585dede46585cd32eec4d6855
SHA256d4ac904bd35f016ec0b48a3533c375ed6b3a7a105a1bbdde41828b15e90daab5
SHA512f88005d5c65dab4a5f18b4d6a73224567f03e3f6a5c750e73bf0fe22f2fafab0465207c9786e8b86d1f5f371ceb5196c08d40042aeb5ca946ec4235ad76c9e59
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NetSupport School\NetSupport School Student Configurator.lnk~RFe57bab5.TMP
Filesize2KB
MD5f2000d3d4b4dcd99f1bc9470015fcdd1
SHA1b2ca34dfcbbc8965ac98ef12a84e480bfe2b9109
SHA25632111161cf89f75aa5b8cf5cdf3d31d8d5829997720334417fb2c6f24122b09e
SHA512910cb00fc6f1f7f0793187376bddba88fea923b5db7794533b5879c1b181e34643cde81df0dd324560e74e2ae16ece2fd85a90fd9c52d55c0368b5299f35118b
-
Filesize
4KB
MD576a3c5f600cb28734f861e690bbfdd2d
SHA1f5161f9935ca4473fc3bf91c7497b14bf9545732
SHA2568cf3ffca4173bbd4fbb760e38d2470752a49b0bcd8a62435bbcdd7b38b3f3fd9
SHA512198b769be0a0ea3491a7ba3fe94ec6180569350100ec0d4938ed613e2ec7f2b4da5c7b9c220b0a809f1358c5cf4ae5bf6abf8745cd0b443b69936de4a72e92f1
-
Filesize
21KB
MD5a108f0030a2cda00405281014f897241
SHA1d112325fa45664272b08ef5e8ff8c85382ebb991
SHA2568b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948
SHA512d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298
-
Filesize
5KB
MD56fbf86629f47eca07aaed1a95fc56777
SHA155fe7be7e600b74d5b67a66ce0d7c379c41bf550
SHA25632687c846ddb54be27dd5a4f2674ef4ce08b1d3cf8621301e36b319df28ecb26
SHA51289832543df122de7b0cb2cca77624e1f993b499f6d8bd514a2e86fae72867ae3e26f2c130cc216c9929d65ab7f55f93feafc549053f29157fcfd8061baf8cb84
-
Filesize
20B
MD5db9af7503f195df96593ac42d5519075
SHA11b487531bad10f77750b8a50aca48593379e5f56
SHA2560a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13
SHA5126839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b
-
Filesize
25B
MD5c05c19b006d57dd4c90785cbe5c7877b
SHA134beebb832e53e4a3b9b3349919689fdf1401151
SHA25600e0c629d5645c15df66adcf99e8a0a3e517d7a7876141ae7a752f0585eec047
SHA512bede1e24476a12e9b1f29962254b19b357bfdfbe5c6eec9a2fca6c1b2105f4cec1d5872f6be269ef39d6e5cc542dc587ea9555ef87687bac64b3ff0de16c0f8c
-
Filesize
282B
MD539030ae352cc16a7fd0bf49261d97403
SHA1485f2944ead7b484a052c2f436ed950327bfc961
SHA25652703269ec26d1988de1efda21597a3faf563e980e1afc5434441ecd34d80ded
SHA5127c89c1263b693e0802379bfbbd785d354b0686f354abb2aa9f982b3c53dda316d7c584a3af0d4b3fc1a072c49986fa4b93a99b63d9dc2645f798ff8913a29a3d
-
Filesize
506B
MD5ff7c0d2dbb9195083bbabaff482d5ed6
SHA15c2efbf855c376ce1b93e681c54a367a407495dc
SHA256065d817596d710d5a06060241acc207b82b844530cc56ff842ff53d8ff92a075
SHA512ea226b3a55fc59175136f104df497ebf5055624fb1c1c8073b249dfc5e1ed5818a6feee995aa82cf9ed050f1adc7a62994c90b1af03569dfe0d4551ee2bc70c9
-
Filesize
169KB
MD50e6fda2b8425c9513c774cf29a1bc72d
SHA1a79ffa24cb5956398ded44da24793a2067b85dd0
SHA256e946b2fae0b36c43064463a8c16a2774adac30c4188c5af90e9338b903c501c9
SHA512285bb7759a1214abed36162ac8be2d48df17a05278c4de97562448e20fd43b635563a6819f37e23d92a5f5ed0205a68bffe43dac0d3a67513bd0303b4e7f89aa
-
Filesize
511KB
MD5d524b639a3a088155981b9b4efa55631
SHA139d8eea673c02c1522b110829b93d61310555b98
SHA25603d91c8cd20b846625a092a3dae6a12369930c65d6216a455a00449ebb0dc289
SHA51284f8ab54122f93a40da08fd83bca767ab49eb0f73c4ab274d9bda11dd09224134df011fa02e5a3abbafcc6fbef6a60673dd48feabdf829a1e22c85a2a759b7ac
-
Filesize
487KB
MD5d21afcbb8d2e5a043841b4d145af1df6
SHA1849db8ddad9e942bfe20a50666d17484b56a26e3
SHA256c9d4fd904650e4e53de4018951906c1434420d65cdb33e48c23b6c22bc9fdd4c
SHA512ecb8fbb2826f7f47eed46897701d42873b17b7599cd785ca54e900b793e3de1179c4d6441f317aa5298ae52c1c11157ae43b11822aa0076b9ec93ad5e46f0225
-
Filesize
153KB
MD5a1b7850763af9593b66ee459a081bddf
SHA16e45955fae2b2494902a1b55a3873e542f0f5ce4
SHA25641b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af
SHA512a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1
-
Filesize
244KB
MD5c4ca339bc85aae8999e4b101556239dd
SHA1d090fc385e0002e35db276960a360c67c4fc85cd
SHA2564ab23609cdc64d10b97c9ccb285ed7100f55d54d983cd50762da25ecac4357f9
SHA5129185ec32545fc838d7fef6c9e4dd222dd02114c661b0b344f16287d55e6571bfe7a4233a852acc579d07bcdbab18c5c034c465b1f4bb78535ed51c3499087fe0