| File name: | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe |
| Full analysis: | https://app.any.run/tasks/ec17ebc1-ac40-4ac7-b1b9-11b40da5bd4a |
| Verdict: | Malicious activity |
| Threats: | NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software. |
| Analysis date: | May 24, 2025, 14:16:38 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (console) Intel 80386, for MS Windows, 8 sections |
| MD5: | 0E3BF3F2526D5C3947A1FCCA03AD1254 |
| SHA1: | A2CBADA70F8322B1F065ADCD0A5425D80323D192 |
| SHA256: | 63D71439CE3193D8DC6B3EBAAEE3DDD9E2B6C81B033C96C662C0D6AA0E70F67C |
| SSDEEP: | 98304:aIt7RcNJw6tYkANam6IxHDNXQdKp8IwASRi7gLxTpO/wn8f9t12OTGvayyplA4HJ:kaqYDKkQE |
| .exe | | | InstallShield setup (36.8) |
|---|---|---|
| .exe | | | Win32 Executable MS Visual C++ (generic) (26.6) |
| .exe | | | Win64 Executable (generic) (23.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:10:15 03:23:15+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.29 |
| CodeSize: | 5514240 |
| InitializedDataSize: | 3013632 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x4e5c00 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | WinTerminal |
| FileDescription: | WinTerminal |
| FileVersion: | 1.0.0.0 |
| InternalName: | WinTerminal.dll |
| LegalCopyright: | |
| OriginalFileName: | WinTerminal.dll |
| ProductName: | WinTerminal |
| ProductVersion: | 1.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 728 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1188 | "explorer.exe" "C:\Users\admin\AppData\Roaming\WinApp\client32.exe" | C:\Windows\SysWOW64\explorer.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2140 | "C:\Users\admin\AppData\Local\Temp\0E3BF3F2526D5C3947A1FCCA03AD1254.exe" | C:\Users\admin\AppData\Local\Temp\0E3BF3F2526D5C3947A1FCCA03AD1254.exe | explorer.exe | ||||||||||||
User: admin Company: WinTerminal Integrity Level: MEDIUM Description: WinTerminal Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2236 | C:\WINDOWS\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | C:\Windows\explorer.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2384 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4448 | "C:\Users\admin\AppData\Roaming\WinApp\client32.exe" | C:\Users\admin\AppData\Roaming\WinApp\client32.exe | explorer.exe | ||||||||||||
User: admin Company: NetSupport Ltd Integrity Level: MEDIUM Description: NetSupport Client Application Exit code: 255 Version: V14.10 Modules
| |||||||||||||||
| 4488 | "C:\WINDOWS\explorer.exe" "C:\Users\admin\AppData\Roaming\WinApp\client32.exe" | C:\Windows\explorer.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5404 | "C:\Users\admin\AppData\Roaming\WinApp\client32.exe" | C:\Users\admin\AppData\Roaming\WinApp\client32.exe | explorer.exe | ||||||||||||
User: admin Company: NetSupport Ltd Integrity Level: MEDIUM Description: NetSupport Client Application Version: V14.10 Modules
| |||||||||||||||
| 5552 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5728 | "cmd.exe" /c start "" "explorer.exe" "C:\Users\admin\AppData\Roaming\WinApp\client32.exe" | C:\Windows\SysWOW64\cmd.exe | — | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2140) 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | WinApp |
Value: "C:\WINDOWS\explorer.exe" "C:\Users\admin\AppData\Roaming\WinApp\client32.exe" | |||
| (PID) Process: | (2236) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (5404) client32.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (5404) client32.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (5404) client32.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\HTCTL32.DLL | executable | |
MD5:369388AC78CA4CA8A64219CF9AAFAD4C | SHA256:C76EE648639406C81469772311C39B46042BF1B91E47D9201908F3CF70407F30 | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\AudioCapture.dll | executable | |
MD5:7A14A64D1E8F37A6041C11D3AF35FB3D | SHA256:31D920CB14E5D201B2A01DE7C9FAE6767FE627F585EDCAB6D8592271C1CF1755 | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\client32.ini | text | |
MD5:D6E455E1FA806B7BDD5F68D36C7B9C50 | SHA256:1A42054248642317C419DE25168CE035397FFE745225858CF28D9855AFDFB925 | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\NSM.LIC | text | |
MD5:773C523B8D1111CD58F53BBFA019883A | SHA256:3D82D9DE74F56A0838DE85DA5190EF6B351B9DB02A33695A90AA5B069FCD6433 | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\client32.exe | executable | |
MD5:64F1310F6300870F1C81792733E92E5E | SHA256:4E9AF807F4C3EC68E64FC165628344BB36FD5CAF7C65B1766DBC2B697B5C18FB | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\PCICHEK.DLL | executable | |
MD5:07B474AB5C503F35873B94CD48D01592 | SHA256:C8911C298F860DE85037F8634E8539627F5A1C13B1FFFE5568D63612E29B9CD4 | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\msvcr100.dll | executable | |
MD5:0E37FBFA79D349D672456923EC5FBBE3 | SHA256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18 | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\nskbfltr.inf | binary | |
MD5:26E28C01461F7E65C402BDF09923D435 | SHA256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368 | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\PCICL32.DLL | executable | |
MD5:1274CCA13CC5E37CA94D35E5B0673E89 | SHA256:CD5510C8BC7EA60BE77AD4AAB502EE02D871BF4E917AEEB6921C20EEBD9693DD | |||
| 2140 | 0E3BF3F2526D5C3947A1FCCA03AD1254.exe | C:\Users\admin\AppData\Roaming\WinApp\pcicapi.dll | executable | |
MD5:F0D7D2A77EEE2B3146405D3AD0D56230 | SHA256:F043653AB1B8FBE5A33922DF5B4FB46797E9694E5FCEE807B97CC6AAEF650131 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5404 | client32.exe | POST | 200 | 101.99.91.21:1488 | http://101.99.91.21/fakeurl.htm | unknown | — | — | malicious |
5404 | client32.exe | GET | 200 | 104.26.1.231:80 | http://geo.netsupportsoftware.com/location/loca.asp | unknown | — | — | malicious |
5404 | client32.exe | POST | 200 | 101.99.91.21:1488 | http://101.99.91.21/fakeurl.htm | unknown | — | — | malicious |
5404 | client32.exe | POST | — | 101.99.91.21:1488 | http://101.99.91.21/fakeurl.htm | unknown | — | — | malicious |
5404 | client32.exe | POST | — | 101.99.91.21:1488 | http://101.99.91.21/fakeurl.htm | unknown | — | — | malicious |
6972 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6972 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5404 | client32.exe | POST | — | 101.99.91.21:1488 | http://101.99.91.21/fakeurl.htm | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5404 | client32.exe | 101.99.91.21:1488 | — | Shinjiru Technology Sdn Bhd | MY | malicious |
5404 | client32.exe | 104.26.1.231:80 | geo.netsupportsoftware.com | CLOUDFLARENET | US | suspicious |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.64:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
geo.netsupportsoftware.com |
| unknown |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5404 | client32.exe | Potential Corporate Privacy Violation | ET REMOTE_ACCESS NetSupport GeoLocation Lookup Request |
5404 | client32.exe | A Network Trojan was detected | REMOTE [ANY.RUN] NetSupport RAT |
5404 | client32.exe | Misc activity | ET REMOTE_ACCESS NetSupport Remote Admin Checkin |
5404 | client32.exe | A Network Trojan was detected | REMOTE [ANY.RUN] NetSupport RAT |
5404 | client32.exe | Misc activity | ET REMOTE_ACCESS NetSupport Remote Admin Checkin |
5404 | client32.exe | Misc activity | ET REMOTE_ACCESS NetSupport Remote Admin Response |
5404 | client32.exe | Misc activity | ET REMOTE_ACCESS NetSupport Remote Admin Response |
5404 | client32.exe | A Network Trojan was detected | REMOTE [ANY.RUN] NetSupport RAT |
5404 | client32.exe | Misc activity | ET REMOTE_ACCESS NetSupport Remote Admin Checkin |
5404 | client32.exe | A Network Trojan was detected | REMOTE [ANY.RUN] NetSupport RAT |