Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe
Resource
win10v2004-20250314-en
General
-
Target
079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe
-
Size
1.9MB
-
MD5
faa6de8d4af45c2dc8280bd6add77210
-
SHA1
62b0f52d1d14f5cb744fe3dbe2a08e222a07e1cd
-
SHA256
079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4
-
SHA512
cfab0bc6cca48520a8c6353853719e420aac0ac395b1612ccd1834f62fd90b5cfebaaa02a00eb342505446c775fba30d843d863208b97c87e97bade7a04fcf69
-
SSDEEP
49152:9deRglK/V+UA15JEKnBPEDY08BTGvSNESvgs:90RH/VxgEKneY/BTXNESos
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autorunings.ini.lnk 079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe -
Executes dropped EXE 1 IoCs
pid Process 5536 client32.exe -
Loads dropped DLL 7 IoCs
pid Process 5536 client32.exe 5536 client32.exe 5536 client32.exe 5536 client32.exe 5536 client32.exe 5536 client32.exe 5536 client32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 5536 client32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5536 client32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5704 wrote to memory of 5536 5704 079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe 90 PID 5704 wrote to memory of 5536 5704 079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe 90 PID 5704 wrote to memory of 5536 5704 079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe"C:\Users\Admin\AppData\Local\Temp\079a241c6823b3b60bc10eb136434853d48b552a2d274fa43df6c493e01b64f4.exe"1⤵
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5704 -
C:\Users\Admin\AppData\Roaming\WinSup\client32.exe"C:\Users\Admin\AppData\Roaming\WinSup\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
254B
MD58614c2008044a081e9d26d8db1571f4a
SHA11b007f05c289d0b71d542520b25fe65c6b6fcbe3
SHA256df622fc8bc605023730d3ad952d69fcbd8383ce5440d63da0df20fb139355ec9
SHA512449244a508daaacde53078b826f7b482650acc3f61e8235fa892a737bebbecb178061d0aa1e99cd74da7885c86cebb2727d6e85384ecd68187d7e6e94f018ae9
-
Filesize
3.6MB
MD500587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
Filesize
387KB
MD5eab603d12705752e3d268d86dff74ed4
SHA101873977c871d3346d795cf7e3888685de9f0b16
SHA2566795d760ce7a955df6c2f5a062e296128efdb8c908908eda4d666926980447ea
SHA51277de0d9c93ccba967db70b280a85a770b3d8bea3b707b1abb037b2826b48898fec87924e1a6cce218c43478e5209e9eb9781051b4c3b450bea3cd27dbd32c7f3
-
Filesize
104KB
MD5f76954b68cc390f8009f1a052283a740
SHA13112a39aad950045d6422fb2abe98bed05931e6c
SHA25663315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb
SHA512d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880
-
Filesize
780B
MD54040911cc377753963e4a3d43ec45b6a
SHA12ac9ffb512f0bd0c4f04d6cd66181d0c57a83ab8
SHA256ed437b26b0e2ae70cd9b8161d2f111e5e0f81658646b6c548eecfca1997fe64e
SHA51293ce25c025c9c2a6e0ce5758c690a30298619159ebb180379edc71272e41ff28f5be00539dac4f9d7f825b48dee9ceb7c1fef2e04c9094951fdfa585859eacaa
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd