File name:

0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527

Full analysis: https://app.any.run/tasks/6742543c-3a70-4f2f-ba7b-7931bcb11686
Verdict: Malicious activity
Threats:

NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software.

Analysis date: May 19, 2025, 21:36:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
rmm-tool
netsupport
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

31AD769E886E84BE8BA35CB076EF523D

SHA1:

CA20F2848CE8824C769FE5E9B823A87EE7C6D11D

SHA256:

0860DAFAA3DB5F440B61CEA445C066DCBAD2285512EB2962236AD1A8366BF527

SSDEEP:

98304:zsQ4+1nF59SGL4hKVgz8fP/UGnBp/DBPfXJGDxWFKDfpv0HXp9vhcBF2zTphwxFG:qkBr9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • smssc.exe (PID: 2100)
    • Create files in the Startup directory

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
    • NETSUPPORT mutex has been found

      • smssc.exe (PID: 2100)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
    • The process drops C-runtime libraries

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
    • Reads security settings of Internet Explorer

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
      • smssc.exe (PID: 2100)
    • Drop NetSupport executable file

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
    • Potential Corporate Privacy Violation

      • smssc.exe (PID: 2100)
    • Executable content was dropped or overwritten

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
  • INFO

    • Reads the computer name

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
      • smssc.exe (PID: 2100)
    • Creates files or folders in the user directory

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
      • smssc.exe (PID: 2100)
    • The sample compiled with english language support

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
    • Checks supported languages

      • smssc.exe (PID: 2100)
      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
    • Process checks computer location settings

      • 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe (PID: 5072)
    • Checks proxy server information

      • smssc.exe (PID: 2100)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:16 12:31:25+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.33
CodeSize: 208384
InitializedDataSize: 130560
UninitializedDataSize: -
EntryPoint: 0x205e0
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe #NETSUPPORT smssc.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2088C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2100"C:\Users\admin\AppData\Roaming\smssc\smssc.exe" C:\Users\admin\AppData\Roaming\smssc\smssc.exe
0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Version:
V12.10
Modules
Images
c:\users\admin\appdata\roaming\smssc\smssc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\roaming\smssc\pcicl32.dll
5072"C:\Users\admin\AppData\Local\Temp\0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe" C:\Users\admin\AppData\Local\Temp\0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5608"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 090
Read events
1 087
Write events
3
Delete events
0

Modification events

(PID) Process:(2100) smssc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2100) smssc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2100) smssc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
8
Suspicious files
2
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\HTCTL32.DLLexecutable
MD5:2D3B207C8A48148296156E5725426C7F
SHA256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\msvcr100.dllexecutable
MD5:0E37FBFA79D349D672456923EC5FBBE3
SHA256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\Client32.initext
MD5:D03D9E00E1AEC20E5A88DFF73C5CE802
SHA256:74EE2C5AA4F958821F00FDC9D2B7AE045EB431E9B18F2A518C8B57E68E46FC68
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\PCICHEK.DLLexecutable
MD5:A0B9388C5F18E27266A31F8C5765B263
SHA256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\NSM.LICtext
MD5:7067AF414215EE4C50BFCD3EA43C84F0
SHA256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\pcicapi.dllexecutable
MD5:DCDE2248D19C778A41AA165866DD52D0
SHA256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\PCICL32.DLLexecutable
MD5:00587238D16012152C2E951A087F2CC9
SHA256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\nskbfltr.infbinary
MD5:26E28C01461F7E65C402BDF09923D435
SHA256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\remcmdstub.exeexecutable
MD5:FE8978AEAC17836D0B99C3EDB88DE357
SHA256:577927563589C3C9D05C510BCE5F3CD9A55EA1DE155E50E87C066BBFF290A6FE
50720860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exeC:\Users\admin\AppData\Roaming\smssc\smssc.exeexecutable
MD5:8D9709FF7D9C83BD376E01912C734F0A
SHA256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
22
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.150:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2100
smssc.exe
GET
200
104.26.0.231:80
http://geo.netsupportsoftware.com/location/loca.asp
unknown
malicious
5868
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5868
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.150:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2100
smssc.exe
91.92.242.5:443
BG
unknown
2100
smssc.exe
104.26.0.231:80
geo.netsupportsoftware.com
CLOUDFLARENET
US
suspicious
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.150
  • 23.48.23.147
  • 23.48.23.164
  • 23.48.23.146
  • 23.48.23.149
  • 23.48.23.158
  • 23.48.23.161
  • 23.48.23.148
  • 23.48.23.157
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.142
whitelisted
geo.netsupportsoftware.com
  • 104.26.0.231
  • 172.67.68.212
  • 104.26.1.231
unknown
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.73
  • 20.190.159.131
  • 20.190.159.129
  • 40.126.31.69
  • 40.126.31.1
  • 20.190.159.75
  • 40.126.31.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
2100
smssc.exe
Potential Corporate Privacy Violation
ET REMOTE_ACCESS NetSupport GeoLocation Lookup Request
No debug info