Analysis
-
max time kernel
198s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
getuname.zip
Resource
win10v2004-20250313-en
General
-
Target
getuname.zip
-
Size
3.1MB
-
MD5
16b13445843c75d166f34120691de87c
-
SHA1
060926e71b593d955e796e5b61396bc260318371
-
SHA256
05e971644f982bad382bab47fb7831417bf1e526661a9128e1793b396d18db7b
-
SHA512
72d0222fdc3193e2a1d6d50fbc04466fd1c0fb9dc2112d6ade05389b8d258dce551339a93a71188149d431b73526c2cae1be16b269c1dffc9f51b428f239ec3b
-
SSDEEP
98304:7NaVx9kGrbRboocCY4aJPpc3AM/85dqNkqVF:7N+oGJbJa43AMcnqj
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Executes dropped EXE 3 IoCs
pid Process 4436 remcmdstub.exe 4984 client32.exe 4308 cksini (2).exe -
Loads dropped DLL 5 IoCs
pid Process 4984 client32.exe 4984 client32.exe 4984 client32.exe 4984 client32.exe 4984 client32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cksini (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcmdstub.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 2356 NOTEPAD.EXE 5352 NOTEPAD.EXE 5888 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 2044 7zG.exe Token: 35 2044 7zG.exe Token: SeSecurityPrivilege 2044 7zG.exe Token: SeSecurityPrivilege 2044 7zG.exe Token: SeSecurityPrivilege 4984 client32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2044 7zG.exe 4984 client32.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 4560 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe 5940 OpenWith.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4560 wrote to memory of 2356 4560 OpenWith.exe 114 PID 4560 wrote to memory of 2356 4560 OpenWith.exe 114 PID 5940 wrote to memory of 5352 5940 OpenWith.exe 119 PID 5940 wrote to memory of 5352 5940 OpenWith.exe 119
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\getuname.zip1⤵PID:1680
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4608
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\getuname\" -spe -an -ai#7zMap5601:96:7zEvent61941⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2044
-
C:\Users\Admin\AppData\Local\Temp\getuname\remcmdstub.exe"C:\Users\Admin\AppData\Local\Temp\getuname\remcmdstub.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4436
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\getuname\NSM.ini1⤵
- Opens file in notepad (likely ransom note)
PID:5888
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\getuname\NSM.LIC2⤵
- Opens file in notepad (likely ransom note)
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\getuname\client32.exe"C:\Users\Admin\AppData\Local\Temp\getuname\client32.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4984
-
C:\Users\Admin\AppData\Local\Temp\getuname\cksini (2).exe"C:\Users\Admin\AppData\Local\Temp\getuname\cksini (2).exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4308
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5940 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\getuname\PrivacySandboxAttestationsPreloaded\manifest.json2⤵
- Opens file in notepad (likely ransom note)
PID:5352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD53eed18b47412d3f91a394ae880b56ed2
SHA11b521a3ed4a577a33cce78eee627ae02445694ab
SHA25613a17f2ad9288aac8941d895251604beb9524fa3c65c781197841ee15480a13f
SHA512835f35af4fd241caa8b6a639626b8762db8525ccceb43afe8fffc24dffad76ca10852a5a8e9fc114bfbf7d1dc1950130a67037fc09b63a74374517a1f5448990
-
Filesize
262B
MD5b9956282a0fed076ed083892e498ac69
SHA1d14a665438385203283030a189ff6c5e7c4bf518
SHA256fcc6afd664a8045bd61c398be3c37a97536a199a48d277e11977f93868ae1acc
SHA5127daa09113c0e8a36c91cc6d657c65851a20dff6b60ac3d2f40c5737c12c1613c553955f84d131ba2139959973fef9fc616ca5e968cb16c25acf2d4739eed87eb
-
Filesize
5KB
MD599f493dce7fab330dc47f0cab8fe6172
SHA116906fb5988303bb462b65ff4ece23539a12f4b5
SHA256e0ed36c897eaa5352fab181c20020b60df4c58986193d6aaf5bf3e3ecdc4c05d
SHA5122c58171c30aec8ae131a7c32162856fce551b55f861d0d9fb0e27a91bd7084388df5860392f80cdbc6df6e64e97d8bf2cae587c3d6b7c142ce711ae8e240bb01
-
Filesize
44KB
MD59daa86d91a18131d5caf49d14fb8b6f2
SHA16b2f7ceb6157909e114a2b05a48a1a2606b5caf1
SHA2561716640cce74322f7ee3e3e02b75cd53b91686f66e389d606dab01bd9f88c557
SHA5129a98e0d9e2dda8aefa54bddb3c7b71501d638dff68863939de6caa117b0e7bf15e581a75419ef8a0da3f1c56a19f1b0f4c86d65f8581773ab88ff5764b9bb3aa
-
Filesize
27KB
MD5e311935a26ee920d5b7176cfa469253c
SHA1eda6c815a02c4c91c9aacd819dc06e32ececf8f0
SHA2560038ab626624fa2df9f65dd5e310b1206a9cd4d8ab7e65fb091cc25f13ebd34e
SHA51248164e8841cfc91f4cbf4d3291d4f359518d081d9079a7995378f970e4085b534f4bafc15b83f4824cc79b5a1e54457b879963589b1acbcfe727a03eb3dffd1c
-
Filesize
3.3MB
MD577b3988cbae5a2550caec42cc5e8ec35
SHA15fa1eeb60e881bfd82eb7c3d9e911587982aaa38
SHA256650382fe6596c8dc0c1739713c2076d4ddff32d5c177210b1241550bb8148cfd
SHA512480f3abef7b799bd604ba9825e2b8cf681e7850373761c579ef181607980d5159c225fb486996e3088f39662f873743d25b52368045d3ae5bd8d45e44d1e8bec
-
Filesize
123B
MD52b6f737dc8b2ae315e5d244aa680da8a
SHA1fd75055e0b00a306afdd59cf8510ead189779eeb
SHA2560afa9f67afc9e1a240847c74123a597cb5cb5c1a37166ef0940a5f9e422f73ac
SHA51273595642930e27f616dc9914a7cb88a3a2cf0927926db604a48d435801384e8d9eb960666faf5bd5b7f90869ecf9cae8d592fbde1ba1214b64653bcb2476bd17
-
Filesize
85KB
MD5953896600dfb86750506706f1599d415
SHA180204dd5ff71618de5e09d8090738672eaa966b0
SHA256f37f6c1c401ebaf3f2879f62a524e1d5bb302e0ef5ae867ccfe7fafc7464f47d
SHA51206f702a2b09afa24356d2d1fa9331f6351e8ac58394d02edaa6a0673fb25dd02ab790bc8b2b157bdd10e631df59fbbfd5691543e522f92be9922fb95e3140085
-
Filesize
117KB
MD51c19c2e97c5e6b30de69ee684e6e5589
SHA15734ef7f9e4dba0639c98881e00f03eea35a62ee
SHA256312a0e4db34a40cb95ba1fac8bf87deb45d0c5f048d38ac65eb060273b07df67
SHA512ab7240b81be04f1bced47701a5791bbeedcba6037ee936327478c304aa1ce5ae75856ca7f568f909f847e27db2a6b9c08db7cc1057a18fab14a39a5854f15cba
-
Filesize
723B
MD5037effdb39d55d10733be7cd5df322c2
SHA16dddf2c8ddf018545d96550e24eb3c06c3efee66
SHA2565b6f65c9bf7d7b0fbb768eb00df8aff71bd67d2ce64a7c7994d859212d9edd68
SHA512ac530e397f4b2ecf99b555e1af752cb935e1099193526bf9b032adc6d95305ea446de4a78d520cdfd46ff5d6065cd4668da75aa56e4e869cd40aecf047cf38ba
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
67KB
MD562cb7909b5247f472b0e3f748faedf35
SHA1f424005eb21deb09f1617f33814d6e6c3851b7dc
SHA256f6aac87863a73299b260315748cb0bc0b964d860cf5710993ca54bd79aaae5db
SHA5122f4e36f6a0718e7fc9e08e5cca13b76089cb6c42ab772475a2fd68128268e3c0b6c6371ea665b793a8f6bcc3da76c6a57cb0b916d1d8b71c47d603933a7d72c4