File name:

Teleram.zip

Full analysis: https://app.any.run/tasks/4061a855-6523-46a0-b2bc-84f8aef38a51
Verdict: Malicious activity
Threats:

NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software.

Analysis date: April 26, 2025, 11:00:12
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
netsupport
rmm-tool
arch-exec
tool
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

47C7EA0D3F6DC97C9AD16A91821D5D95

SHA1:

F281A91FD22194F5C9E9C19A4DA2CAB2B7B5540D

SHA256:

672242B4E95C0BC76D0B2447F01D662A3B677E7F69629CA699D2EEF15E35A162

SSDEEP:

98304:URjSAdyvGDkRHoeXuxXcTZKXh0qk0XIiBbz1SMR9+AHiZIDsVqht6uZViWXe7+7d:uYW6wT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • client32.exe (PID: 8136)
    • NETSUPPORT has been detected (YARA)

      • client32.exe (PID: 8136)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7752)
    • Drop NetSupport executable file

      • WinRAR.exe (PID: 7752)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7752)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 7752)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 7752)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 7752)
    • Manual execution by a user

      • client32.exe (PID: 8136)
      • OpenWith.exe (PID: 8184)
      • OpenWith.exe (PID: 4932)
      • OpenWith.exe (PID: 6032)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 8184)
      • OpenWith.exe (PID: 4932)
      • OpenWith.exe (PID: 6032)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7752)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 4724)
    • Checks supported languages

      • MpCmdRun.exe (PID: 4724)
    • Checks proxy server information

      • slui.exe (PID: 2656)
    • Reads the computer name

      • MpCmdRun.exe (PID: 4724)
    • Reads the software policy settings

      • slui.exe (PID: 2656)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:06:21 08:51:24
ZipCRC: 0x4ef3825a
ZipCompressedSize: 37676
ZipUncompressedSize: 78840
ZipFileName: AudioCapture.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #NETSUPPORT client32.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs slui.exe cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2656C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4560\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4724"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
4932"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\800_arrowup.tgaC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5056C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Rar$Scan68003.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
6032"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\DUState.datC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7752"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Teleram.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
8136"C:\Users\admin\Desktop\client32.exe" C:\Users\admin\Desktop\client32.exe
explorer.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
3221225781
Version:
V11.30
Modules
Images
c:\users\admin\desktop\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
8184"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\lc.datC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
6 672
Read events
6 662
Write events
10
Delete events
0

Modification events

(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Teleram.zip
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList
Operation:writeName:ArcSort
Value:
32
(PID) Process:(7752) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan
Operation:writeName:DefScanner
Value:
Windows Defender
Executable files
30
Suspicious files
11
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\PCICHEK.DLLexecutable
MD5:E311935A26EE920D5B7176CFA469253C
SHA256:0038AB626624FA2DF9F65DD5E310B1206A9CD4D8AB7E65FB091CC25F13EBD34E
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\KBDTAM99.DLLexecutable
MD5:CCC736781CF4A49F42CD07C703B3A18B
SHA256:000C4B5B50966634DF58078511794F83690D693FCCF2ACA5C970C20981B29556
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\PCICL32.DLLexecutable
MD5:1274CCA13CC5E37CA94D35E5B0673E89
SHA256:CD5510C8BC7EA60BE77AD4AAB502EE02D871BF4E917AEEB6921C20EEBD9693DD
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\NSM.initext
MD5:99F493DCE7FAB330DC47F0CAB8FE6172
SHA256:E0ED36C897EAA5352FAB181C20020B60DF4C58986193D6AAF5BF3E3ECDC4C05D
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\client32.exeexecutable
MD5:FCE17B987F321DCE852C8A52116E7EB6
SHA256:AFC45CC0DF7F7E481BFF45C6F62A6418B6AE4C8B474EC36113E05AB7CA7E2743
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\Mss32.dllexecutable
MD5:18A082AD2C18DF2556FEAC3E1055423F
SHA256:B59148EEB9CD967F6D69857A60FE384F881A2BF8E4F26183D0D4ED4679D42518
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\comcat.dllexecutable
MD5:835FF05A3F5E16E0FE41E515EA398BD4
SHA256:8DCFB1E6AA965DF4BD4C0551D03BDFD6472C80219ADA4671910958688FBB4AB6
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\WiaExtensionHost64.dllexecutable
MD5:5D084613C0E5C8C3022D9E0F316B0E23
SHA256:07BC4DC48D5D9BCC2CE52CA8A0F925CA021092DC34CB811E183CBC0D32E576BA
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\client32.initext
MD5:376FFF12BB6AD4FEDDD30A2E29900D05
SHA256:B1E88D2642A3CD7F0C56D2D010641DCC9729FA5120D1C44AF1F25C41833D3FF1
7752WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7752.10064\Teleram.zip\mprext.dllexecutable
MD5:0EABD6AB464758F058FC039A47F61750
SHA256:F96E8D99B736E4CE7997BB1DE65D88C32E16F1F725D8BD98F52C39A02969FD87
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
42
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
304
20.109.210.53:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
7956
SIHClient.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7956
SIHClient.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
7956
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
7956
SIHClient.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
7956
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
7956
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7956
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
GET
200
20.3.187.198:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
GET
200
20.109.210.53:443
https://slscr.update.microsoft.com/sls/ping
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7956
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7956
SIHClient.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
7956
SIHClient.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
7956
SIHClient.exe
20.3.187.198:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7396
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.36
  • 23.216.77.6
  • 23.216.77.20
  • 23.216.77.25
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.21
whitelisted
login.live.com
  • 40.126.32.140
  • 20.190.160.17
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.68
  • 20.190.160.65
  • 20.190.160.4
  • 20.190.160.128
whitelisted

Threats

No threats detected
No debug info