File name:

bad.zip

Full analysis: https://app.any.run/tasks/45a77dc2-3efa-4518-8149-997fd2b51512
Verdict: Malicious activity
Threats:

NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software.

Analysis date: June 03, 2025, 20:50:14
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
netsupport
rmm-tool
auto
remote
tool
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

F0AB90E210074FF19D0C36D0814E73C3

SHA1:

FEBC3E1F3DA5E4C0AE8948D17A5785F2F9CCBDDB

SHA256:

73300A2C33D9DB92048B641E13158E77AAF7A48DE9CC51B66EF3200690CF5E21

SSDEEP:

98304:TqzXi5cxvTp89RydEd824WbdhpkxspEuAF8YZMitEGOSyRei7Rc1bNXqbUTT10+J:lFiT0o6olotoqodo+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • NETSUPPORT has been found (auto)

      • WinRAR.exe (PID: 5956)
    • NETSUPPORT mutex has been found

      • client32.exe (PID: 6620)
      • client32.exe (PID: 7908)
    • NETSUPPORT has been detected (YARA)

      • client32.exe (PID: 6620)
    • NETSUPPORT has been detected (SURICATA)

      • client32.exe (PID: 6620)
    • Connects to the CnC server

      • client32.exe (PID: 6620)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 5956)
    • Drop NetSupport executable file

      • WinRAR.exe (PID: 5956)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5956)
    • Connects to the server without a host name

      • client32.exe (PID: 6620)
    • There is functionality for communication over UDP network (YARA)

      • client32.exe (PID: 6620)
    • There is functionality for taking screenshot (YARA)

      • client32.exe (PID: 6620)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 5956)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5956)
    • Reads the computer name

      • client32.exe (PID: 6620)
      • client32.exe (PID: 7908)
    • Checks supported languages

      • client32.exe (PID: 6620)
      • client32.exe (PID: 7908)
    • Manual execution by a user

      • client32.exe (PID: 7908)
    • Checks proxy server information

      • slui.exe (PID: 5024)
    • Reads the software policy settings

      • slui.exe (PID: 5024)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:05:02 19:56:18
ZipCRC: 0x49f7b0fe
ZipCompressedSize: 168780
ZipUncompressedSize: 328056
ZipFileName: HTCTL32.DLL
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #NETSUPPORT winrar.exe #NETSUPPORT client32.exe slui.exe rundll32.exe no specs #NETSUPPORT client32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5024C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5956"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\bad.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6620"C:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\client32.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\client32.exe
WinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa5956.18426\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\rar$exa5956.18426\pcicl32.dll
7864C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7908"C:\Users\admin\AppData\Local\Temp\bad\client32.exe" C:\Users\admin\AppData\Local\Temp\bad\client32.exe
explorer.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
255
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\bad\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\bad\pcicl32.dll
Total events
7 509
Read events
7 482
Write events
14
Delete events
13

Modification events

(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\bad.zip
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5956) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
66
Suspicious files
4
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\client32.exeexecutable
MD5:EE75B57B9300AAB96530503BFAE8A2F2
SHA256:06A0A243811E9C4738A9D413597659CA8D07B00F640B74ADC9CB351C179B3268
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\msvcr100.dllexecutable
MD5:0E37FBFA79D349D672456923EC5FBBE3
SHA256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\client32.initext
MD5:6E953E79FFFB4E46D0F055004A59FC5B
SHA256:30A8EA7F722365267BB2504C18908420C1A0907ABBE9DDC2A7B8AC36F6FF47C2
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\hw.dllexecutable
MD5:A74C64DE593E2533C04200C5417BD9E9
SHA256:BE45F76049A133392423679D334C69C8E1E7E82DC873EEBDD229EA0341BA1B10
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\NSM.inibinary
MD5:88B1DAB8F4FD1AE879685995C90BD902
SHA256:60FE386112AD51F40A1EE9E1B15ECA802CED174D7055341C491DEE06780B3F92
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\TCCTL32.DLLexecutable
MD5:EAB603D12705752E3D268D86DFF74ED4
SHA256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\djatai\binkawin.asiexecutable
MD5:F415F94065BE11ED9A3B55A5D9BAEAE7
SHA256:1ABA951F3D3DE59AEC6C3A77133241DAC6949DD4B1D158A77B646AD1EC7C5371
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\djatai\libtoxcore.dllexecutable
MD5:1622F6B4D637DC6A18A38D9A00F16080
SHA256:C691212E075D934F04947870A5DAD101A9CB48A4771AF3117EF0F4C65DC6E4A6
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\djatai\avutil-59.dllexecutable
MD5:E8563E16E5BB8A3BDE41ED3ED063A3A2
SHA256:CF62994DAA44315CC72C31E4F70C6E9E7D821BE1AA5AD37D73D425462F079477
5956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5956.18426\PCICHEK.DLLexecutable
MD5:A0B9388C5F18E27266A31F8C5765B263
SHA256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
33
DNS requests
16
Threats
33

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.34:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6368
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6368
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6620
client32.exe
POST
200
94.158.245.140:443
http://94.158.245.140/fakeurl.htm
unknown
malicious
6620
client32.exe
POST
200
94.158.245.140:443
http://94.158.245.140/fakeurl.htm
unknown
malicious
6620
client32.exe
POST
94.158.245.140:443
http://94.158.245.140/fakeurl.htm
unknown
malicious
6620
client32.exe
POST
94.158.245.140:443
http://94.158.245.140/fakeurl.htm
unknown
malicious
6620
client32.exe
POST
200
94.158.245.140:443
http://94.158.245.140/fakeurl.htm
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.34:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
20.190.160.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.160.131:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6544
svchost.exe
23.63.118.230:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7600
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.46
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.34
  • 23.216.77.37
  • 23.216.77.41
  • 23.216.77.4
  • 23.216.77.36
  • 23.216.77.32
  • 23.216.77.38
  • 23.216.77.33
  • 23.216.77.39
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
ocsp.digicert.com
  • 23.63.118.230
whitelisted
login.live.com
  • 40.126.32.138
  • 40.126.32.68
  • 40.126.32.133
  • 20.190.160.2
  • 20.190.160.3
  • 40.126.32.134
  • 20.190.160.4
  • 20.190.160.128
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
6620
client32.exe
Potentially Bad Traffic
ET INFO HTTP traffic on port 443 (POST)
6620
client32.exe
Potentially Bad Traffic
ET INFO HTTP traffic on port 443 (POST)
6620
client32.exe
A Network Trojan was detected
REMOTE [ANY.RUN] NetSupport RAT
6620
client32.exe
Misc activity
ET REMOTE_ACCESS NetSupport Remote Admin Checkin
6620
client32.exe
Misc activity
ET REMOTE_ACCESS NetSupport Remote Admin Response
6620
client32.exe
A Network Trojan was detected
REMOTE [ANY.RUN] NetSupport RAT
6620
client32.exe
Misc activity
ET REMOTE_ACCESS NetSupport Remote Admin Checkin
6620
client32.exe
Misc activity
ET REMOTE_ACCESS NetSupport Remote Admin Response
6620
client32.exe
Potentially Bad Traffic
ET INFO HTTP traffic on port 443 (POST)
6620
client32.exe
A Network Trojan was detected
REMOTE [ANY.RUN] NetSupport RAT
No debug info