| File name: | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527 |
| Full analysis: | https://app.any.run/tasks/6742543c-3a70-4f2f-ba7b-7931bcb11686 |
| Verdict: | Malicious activity |
| Threats: | NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software. |
| Analysis date: | May 19, 2025, 21:36:45 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 31AD769E886E84BE8BA35CB076EF523D |
| SHA1: | CA20F2848CE8824C769FE5E9B823A87EE7C6D11D |
| SHA256: | 0860DAFAA3DB5F440B61CEA445C066DCBAD2285512EB2962236AD1A8366BF527 |
| SSDEEP: | 98304:zsQ4+1nF59SGL4hKVgz8fP/UGnBp/DBPfXJGDxWFKDfpv0HXp9vhcBF2zTphwxFG:qkBr9 |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:02:16 12:31:25+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.33 |
| CodeSize: | 208384 |
| InitializedDataSize: | 130560 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x205e0 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2088 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2100 | "C:\Users\admin\AppData\Roaming\smssc\smssc.exe" | C:\Users\admin\AppData\Roaming\smssc\smssc.exe | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | ||||||||||||
User: admin Company: NetSupport Ltd Integrity Level: MEDIUM Description: NetSupport Client Application Version: V12.10 Modules
| |||||||||||||||
| 5072 | "C:\Users\admin\AppData\Local\Temp\0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe" | C:\Users\admin\AppData\Local\Temp\0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 5608 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2100) smssc.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2100) smssc.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2100) smssc.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\HTCTL32.DLL | executable | |
MD5:2D3B207C8A48148296156E5725426C7F | SHA256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796 | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\msvcr100.dll | executable | |
MD5:0E37FBFA79D349D672456923EC5FBBE3 | SHA256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18 | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\Client32.ini | text | |
MD5:D03D9E00E1AEC20E5A88DFF73C5CE802 | SHA256:74EE2C5AA4F958821F00FDC9D2B7AE045EB431E9B18F2A518C8B57E68E46FC68 | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\PCICHEK.DLL | executable | |
MD5:A0B9388C5F18E27266A31F8C5765B263 | SHA256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\NSM.LIC | text | |
MD5:7067AF414215EE4C50BFCD3EA43C84F0 | SHA256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12 | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\pcicapi.dll | executable | |
MD5:DCDE2248D19C778A41AA165866DD52D0 | SHA256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917 | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\PCICL32.DLL | executable | |
MD5:00587238D16012152C2E951A087F2CC9 | SHA256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8 | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\nskbfltr.inf | binary | |
MD5:26E28C01461F7E65C402BDF09923D435 | SHA256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368 | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\remcmdstub.exe | executable | |
MD5:FE8978AEAC17836D0B99C3EDB88DE357 | SHA256:577927563589C3C9D05C510BCE5F3CD9A55EA1DE155E50E87C066BBFF290A6FE | |||
| 5072 | 0860dafaa3db5f440b61cea445c066dcbad2285512eb2962236ad1a8366bf527.exe | C:\Users\admin\AppData\Roaming\smssc\smssc.exe | executable | |
MD5:8D9709FF7D9C83BD376E01912C734F0A | SHA256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.150:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2100 | smssc.exe | GET | 200 | 104.26.0.231:80 | http://geo.netsupportsoftware.com/location/loca.asp | unknown | — | — | malicious |
5868 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5868 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 23.48.23.150:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2100 | smssc.exe | 91.92.242.5:443 | — | — | BG | unknown |
2100 | smssc.exe | 104.26.0.231:80 | geo.netsupportsoftware.com | CLOUDFLARENET | US | suspicious |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.71:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
geo.netsupportsoftware.com |
| unknown |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2100 | smssc.exe | Potential Corporate Privacy Violation | ET REMOTE_ACCESS NetSupport GeoLocation Lookup Request |