Overview
overview
7Static
static
7Danger/Danger.exe
windows7-x64
3Danger/Danger.exe
windows10-2004-x64
3Danger/Danger.exe.lnk
windows7-x64
3Danger/Danger.exe.lnk
windows10-2004-x64
7Danger/cmdbkg.exe
windows7-x64
1Danger/cmdbkg.exe
windows10-2004-x64
1cmdbkg.exe
windows7-x64
1cmdbkg.exe
windows10-2004-x64
1makeall.bat
windows7-x64
1makeall.bat
windows10-2004-x64
1Danger/makeall.bat
windows7-x64
1Danger/makeall.bat
windows10-2004-x64
1Danger/nmap.exe
windows7-x64
4Danger/nmap.exe
windows10-2004-x64
4$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...71.exe
windows7-x64
4$PLUGINSDI...71.exe
windows10-2004-x64
4$PLUGINSDI...86.exe
windows7-x64
7$PLUGINSDI...86.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
4Uninstall.exe
windows10-2004-x64
4ncat.exe
windows7-x64
1ncat.exe
windows10-2004-x64
1ndiff.exe
windows7-x64
1ndiff.exe
windows10-2004-x64
1nmap.exe
windows7-x64
1nmap.exe
windows10-2004-x64
1nping.exe
windows7-x64
1nping.exe
windows10-2004-x64
1nse_main.js
windows7-x64
1nse_main.js
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-03-2024 12:40
Behavioral task
behavioral1
Sample
Danger/Danger.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Danger/Danger.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Danger/Danger.exe.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Danger/Danger.exe.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Danger/cmdbkg.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Danger/cmdbkg.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
cmdbkg.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
cmdbkg.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
makeall.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
makeall.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Danger/makeall.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Danger/makeall.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Danger/nmap.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Danger/nmap.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/npcap-1.71.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/npcap-1.71.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/vc_redist.x86.exe
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/vc_redist.x86.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
ncat.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ncat.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
ndiff.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
ndiff.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
nmap.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
nmap.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
nping.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
nping.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
nse_main.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
nse_main.js
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/npcap-1.71.exe
-
Size
1.1MB
-
MD5
40cfea6d5a3ff15caf6dd4ae88a012b2
-
SHA1
287b229cecf54ea110a8b8422dcda20922bdf65e
-
SHA256
5ccb61296c48e3f8cd20db738784bd7bf0daf8fce630f89892678b6dda4e533c
-
SHA512
6ac4955286a4927ce43f7e85783631c9a801605c89a18ba95dde34d90eecbf4825b09e116890c8aca8defff767ad14843303dd557a67636bed1f1709b5399024
-
SSDEEP
24576:AsYWFL4QHgF62xcgglC74wf9M3pK/Sn0Oaz+yruSOnN:1L4QAF6CFhl1Msqn0Oaa7
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Npcap\install.log npcap-1.71.exe -
Loads dropped DLL 4 IoCs
pid Process 2036 npcap-1.71.exe 2036 npcap-1.71.exe 2036 npcap-1.71.exe 2036 npcap-1.71.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 npcap-1.71.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2792 WMIC.exe Token: SeSecurityPrivilege 2792 WMIC.exe Token: SeTakeOwnershipPrivilege 2792 WMIC.exe Token: SeLoadDriverPrivilege 2792 WMIC.exe Token: SeSystemProfilePrivilege 2792 WMIC.exe Token: SeSystemtimePrivilege 2792 WMIC.exe Token: SeProfSingleProcessPrivilege 2792 WMIC.exe Token: SeIncBasePriorityPrivilege 2792 WMIC.exe Token: SeCreatePagefilePrivilege 2792 WMIC.exe Token: SeBackupPrivilege 2792 WMIC.exe Token: SeRestorePrivilege 2792 WMIC.exe Token: SeShutdownPrivilege 2792 WMIC.exe Token: SeDebugPrivilege 2792 WMIC.exe Token: SeSystemEnvironmentPrivilege 2792 WMIC.exe Token: SeRemoteShutdownPrivilege 2792 WMIC.exe Token: SeUndockPrivilege 2792 WMIC.exe Token: SeManageVolumePrivilege 2792 WMIC.exe Token: 33 2792 WMIC.exe Token: 34 2792 WMIC.exe Token: 35 2792 WMIC.exe Token: SeIncreaseQuotaPrivilege 2792 WMIC.exe Token: SeSecurityPrivilege 2792 WMIC.exe Token: SeTakeOwnershipPrivilege 2792 WMIC.exe Token: SeLoadDriverPrivilege 2792 WMIC.exe Token: SeSystemProfilePrivilege 2792 WMIC.exe Token: SeSystemtimePrivilege 2792 WMIC.exe Token: SeProfSingleProcessPrivilege 2792 WMIC.exe Token: SeIncBasePriorityPrivilege 2792 WMIC.exe Token: SeCreatePagefilePrivilege 2792 WMIC.exe Token: SeBackupPrivilege 2792 WMIC.exe Token: SeRestorePrivilege 2792 WMIC.exe Token: SeShutdownPrivilege 2792 WMIC.exe Token: SeDebugPrivilege 2792 WMIC.exe Token: SeSystemEnvironmentPrivilege 2792 WMIC.exe Token: SeRemoteShutdownPrivilege 2792 WMIC.exe Token: SeUndockPrivilege 2792 WMIC.exe Token: SeManageVolumePrivilege 2792 WMIC.exe Token: 33 2792 WMIC.exe Token: 34 2792 WMIC.exe Token: 35 2792 WMIC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2796 2036 npcap-1.71.exe 28 PID 2036 wrote to memory of 2796 2036 npcap-1.71.exe 28 PID 2036 wrote to memory of 2796 2036 npcap-1.71.exe 28 PID 2036 wrote to memory of 2796 2036 npcap-1.71.exe 28 PID 2796 wrote to memory of 2792 2796 cmd.exe 30 PID 2796 wrote to memory of 2792 2796 cmd.exe 30 PID 2796 wrote to memory of 2792 2796 cmd.exe 30 PID 2796 wrote to memory of 2792 2796 cmd.exe 30 PID 2796 wrote to memory of 2684 2796 cmd.exe 31 PID 2796 wrote to memory of 2684 2796 cmd.exe 31 PID 2796 wrote to memory of 2684 2796 cmd.exe 31 PID 2796 wrote to memory of 2684 2796 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\npcap-1.71.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\npcap-1.71.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd /Q /C "%SYSTEMROOT%\System32\wbem\wmic.exe qfe get hotfixid | %SYSTEMROOT%\System32\findstr.exe "^KB4474419""2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe qfe get hotfixid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\findstr.exeC:\Windows\System32\findstr.exe "^KB4474419"3⤵PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5170c17ac80215d0a377b42557252ae10
SHA14cbab6cc189d02170dd3ba7c25aa492031679411
SHA25661ea114d9d0cd1e884535095aa3527a6c28df55a4ecee733c8c398f50b84cc3d
SHA5120fd65cad0fcaa98083c2021de3d6429e79978658809c62ae9e4ed630c016915ced36aa52f2f692986c3b600c92325e79fd6d757634e8e02d5e582ff03679163f
-
Filesize
19KB
MD5f020a8d9ede1fb2af3651ad6e0ac9cb1
SHA1341f9345d669432b2a51d107cbd101e8b82e37b1
SHA2567efe73a8d32ed1b01727ad4579e9eec49c9309f2cb7bf03c8afa80d70242d1c0
SHA512408fa5a797d3ff4b917bb4107771687004ba507a33cb5944b1cc3155e0372cb3e04a147f73852b9134f138ff709af3b0fb493cd8fa816c59e9f3d9b5649c68c4
-
Filesize
14KB
MD5f9e61a25016dcb49867477c1e71a704e
SHA1c01dc1fa7475e4812d158d6c00533410c597b5d9
SHA256274e53dc8c5ddc273a6f5683b71b882ef8917029e2eaf6c8dbee0c62d999225d
SHA512b4a6289ef9e761e29dd5362fecb1707c97d7cb3e160f4180036a96f2f904b2c64a075b5bf0fea4a3bb94dea97f3cfa0d057d3d6865c68da65fdcb9c3070c33d8