Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Masscan Ad...ss.url
windows10-1703-x64
1Masscan Ad...UI.exe
windows10-1703-x64
1Masscan Ad...et.dll
windows10-1703-x64
1Masscan Ad..._3.exe
windows10-1703-x64
7$PLUGINSDI...ns.dll
windows10-1703-x64
3$PLUGINSDI...al.ini
windows10-1703-x64
1$PLUGINSDI...er.bmp
windows10-1703-x64
4$PLUGINSDI...rd.bmp
windows10-1703-x64
4$SYSDIR/Packet.dll
windows10-1703-x64
1$SYSDIR/pthreadVC.dll
windows10-1703-x64
1$SYSDIR/wpcap.dll
windows10-1703-x64
1WinPcapInstall.dll
windows10-1703-x64
3rpcapd.exe
windows10-1703-x64
1Masscan Ad...ig.ini
windows10-1703-x64
1Masscan Ad...an.exe
windows10-1703-x64
1Masscan Ad...00.dll
windows10-1703-x64
3Masscan Ad...ap.dll
windows10-1703-x64
3Analysis
-
max time kernel
316s -
max time network
1576s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15/06/2024, 08:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Masscan Advanced Mode/@rdpcrackerss.url
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Masscan Advanced Mode/Massscan_GUI.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Masscan Advanced Mode/Packet.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Masscan Advanced Mode/WinPcap_4_1_3.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
$SYSDIR/Packet.dll
Resource
win10-20240611-en
Behavioral task
behavioral10
Sample
$SYSDIR/pthreadVC.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
$SYSDIR/wpcap.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
WinPcapInstall.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
rpcapd.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
Masscan Advanced Mode/_config.ini
Resource
win10-20240611-en
Behavioral task
behavioral15
Sample
Masscan Advanced Mode/masscan.exe
Resource
win10-20240611-en
Behavioral task
behavioral16
Sample
Masscan Advanced Mode/msvcr100.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
Masscan Advanced Mode/wpcap.dll
Resource
win10-20240404-en
General
-
Target
$SYSDIR/wpcap.dll
-
Size
275KB
-
MD5
4633b298d57014627831ccac89a2c50b
-
SHA1
e5f449766722c5c25fa02b065d22a854b6a32a5b
-
SHA256
b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
-
SHA512
29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
SSDEEP
6144:E4yIm5rC9WNWwKcNBSCiLvK8+jKgZBwIbg2:jyIm59WwpqCuEKIwv2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2796 2924 rundll32.exe 73 PID 2924 wrote to memory of 2796 2924 rundll32.exe 73 PID 2924 wrote to memory of 2796 2924 rundll32.exe 73
Processes
Network
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request12.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
12.173.189.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa