Analysis
-
max time kernel
71s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 17:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://foxauthority.com/33.zip?&file=5417
Resource
win10v2004-20250217-en
General
-
Target
https://foxauthority.com/33.zip?&file=5417
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 436 msedge.exe 436 msedge.exe 1604 identity_helper.exe 1604 identity_helper.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1212 client32.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 1212 client32.exe 1212 client32.exe 1212 client32.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 1212 client32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 3988 436 msedge.exe 84 PID 436 wrote to memory of 3988 436 msedge.exe 84 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1292 436 msedge.exe 85 PID 436 wrote to memory of 1428 436 msedge.exe 86 PID 436 wrote to memory of 1428 436 msedge.exe 86 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87 PID 436 wrote to memory of 2920 436 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://foxauthority.com/33.zip?&file=54171⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc2bb46f8,0x7ffdc2bb4708,0x7ffdc2bb47182⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4148 /prefetch:82⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1630805354082776581,3410900558475520861,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3848
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4232
-
C:\Users\Admin\Downloads\33\client32.exe"C:\Users\Admin\Downloads\33\client32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1212
-
C:\Users\Admin\Downloads\33\client32.exe"C:\Users\Admin\Downloads\33\client32.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5395082c6d7ec10a326236e60b79602f2
SHA1203db9756fc9f65a0181ac49bca7f0e7e4edfb5b
SHA256b9ea226a0a67039df83a9652b42bb7b0cc2e6fa827d55d043bc36dd9d8e4cd25
SHA5127095c260b87a0e31ddfc5ddf5730848433dcede2672ca71091efb8c6b1b0fc3333d0540c3ce41087702c99bca22a4548f12692234188e6f457c2f75ab12316bd
-
Filesize
152B
MD5e27df0383d108b2d6cd975d1b42b1afe
SHA1c216daa71094da3ffa15c787c41b0bc7b32ed40b
SHA256812f547f1e22a4bd045b73ff548025fabd59c6cba0da6991fdd8cfcb32653855
SHA512471935e26a55d26449e48d4c38933ab8c369a92d8f24fd6077131247e8d116d95aa110dd424fa6095176a6c763a6271e978766e74d8022e9cdcc11e6355408ab
-
Filesize
184B
MD5743dfa007469f7b1a8464d701a38f5ea
SHA1606baf6d89c9c53b6900e395e11345b3082f08a8
SHA256af105df2725d51b4fdc82838408f3f17649a4503686ce5b1c99172cde121190c
SHA512bbf0b1e1195574bd55d5f4ca3393d33c77af2ff4d5a0c62be806c06aedb6c315e4c93b4c00bc4015e6e330ac30ae46609e710827c298c1d6d74ee5e145f514ee
-
Filesize
6KB
MD528540a6a7099b77fcefac17faff30567
SHA1e555e0faa572b4c4cb707e6b78a5d6e1736a120e
SHA256b3a63ba5ee4269cedcc56c7952434ecc7e1cd96ccc8b2c63e0611262e05d50de
SHA51215093829f2fd2bb9d0a721ce2cf5b11338d48b94732db3ef2ceb4285accc4a36b87835a55687402d9284312a2d0b74aad974b98d890503522e264084e55f8579
-
Filesize
6KB
MD535935f36cdefd7aa43f3d80c2b43279a
SHA10166593558a424c813661618f63b17c4655db012
SHA25655a6cb2b7798b11af8c1836a62dd120f460e8b321956bf2922d1e6c04c241434
SHA51295b9359f3bbbb0249130e08da3f1fdfef4d309baab097f0156d30555f890b49c658e5b1ac788e6b38e8869f8b8b003208be8a0cbff87a50eb15db36074614ad8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5318f32f0819dc98c568385c5184f7585
SHA14284464c0531e6611028fdf1e532977f52177ed3
SHA25683f65e4ed28645b807225232abee156560020a203f30bdc6b440ee33bf42b577
SHA512f673d9d8c21a673247f9a4f5247d78d1164e873012e76a7b7f57e39da14c6e9b28fcc1214c97a6d6ba8c9ec94d3f25367a4f16f4a610eb165a274c08711c5131
-
Filesize
4.2MB
MD54f0024aa64e20c87ff32067c8b72dcda
SHA1b0713d31c5897fd6029086ca3b206df68f168d44
SHA2564cb757c48de4ffc738751023b5f595b0a57c78d27aa901c4dead24e6358d75c8
SHA5121bd0d9b924f36a4ffa3de0f5a8ec4814d2258f9741c1abe96134913cf7b20a0936e9cb621eacf36e50353225c97d7ab9912a98078a6343573b411fb049b74869