Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 12:40

General

  • Target

    $PLUGINSDIR/npcap-1.71.exe

  • Size

    1.1MB

  • MD5

    40cfea6d5a3ff15caf6dd4ae88a012b2

  • SHA1

    287b229cecf54ea110a8b8422dcda20922bdf65e

  • SHA256

    5ccb61296c48e3f8cd20db738784bd7bf0daf8fce630f89892678b6dda4e533c

  • SHA512

    6ac4955286a4927ce43f7e85783631c9a801605c89a18ba95dde34d90eecbf4825b09e116890c8aca8defff767ad14843303dd557a67636bed1f1709b5399024

  • SSDEEP

    24576:AsYWFL4QHgF62xcgglC74wf9M3pK/Sn0Oaz+yruSOnN:1L4QAF6CFhl1Msqn0Oaa7

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\npcap-1.71.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\npcap-1.71.exe"
    1⤵
    • Drops file in Program Files directory
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\cmd.exe
      cmd /Q /C "%SYSTEMROOT%\System32\wbem\wmic.exe qfe get hotfixid | %SYSTEMROOT%\System32\findstr.exe "^KB4474419""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\wbem\WMIC.exe
        C:\Windows\System32\wbem\wmic.exe qfe get hotfixid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2792
      • C:\Windows\SysWOW64\findstr.exe
        C:\Windows\System32\findstr.exe "^KB4474419"
        3⤵
          PID:2684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nst15A5.tmp\InstallOptions.dll

      Filesize

      22KB

      MD5

      170c17ac80215d0a377b42557252ae10

      SHA1

      4cbab6cc189d02170dd3ba7c25aa492031679411

      SHA256

      61ea114d9d0cd1e884535095aa3527a6c28df55a4ecee733c8c398f50b84cc3d

      SHA512

      0fd65cad0fcaa98083c2021de3d6429e79978658809c62ae9e4ed630c016915ced36aa52f2f692986c3b600c92325e79fd6d757634e8e02d5e582ff03679163f

    • \Users\Admin\AppData\Local\Temp\nst15A5.tmp\System.dll

      Filesize

      19KB

      MD5

      f020a8d9ede1fb2af3651ad6e0ac9cb1

      SHA1

      341f9345d669432b2a51d107cbd101e8b82e37b1

      SHA256

      7efe73a8d32ed1b01727ad4579e9eec49c9309f2cb7bf03c8afa80d70242d1c0

      SHA512

      408fa5a797d3ff4b917bb4107771687004ba507a33cb5944b1cc3155e0372cb3e04a147f73852b9134f138ff709af3b0fb493cd8fa816c59e9f3d9b5649c68c4

    • \Users\Admin\AppData\Local\Temp\nst15A5.tmp\nsExec.dll

      Filesize

      14KB

      MD5

      f9e61a25016dcb49867477c1e71a704e

      SHA1

      c01dc1fa7475e4812d158d6c00533410c597b5d9

      SHA256

      274e53dc8c5ddc273a6f5683b71b882ef8917029e2eaf6c8dbee0c62d999225d

      SHA512

      b4a6289ef9e761e29dd5362fecb1707c97d7cb3e160f4180036a96f2f904b2c64a075b5bf0fea4a3bb94dea97f3cfa0d057d3d6865c68da65fdcb9c3070c33d8