Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 18:53

General

  • Target

    npcap-1.72.exe

  • Size

    1.1MB

  • MD5

    cab256acf99dc6e0685c0567ea6ee658

  • SHA1

    08aefa7d9a941ffe7d5c29d6b65d115109b5e2b7

  • SHA256

    b0efd269d32e581da747e5050ef98d2eb91e6de9080e0918f5af85b485a4bdd1

  • SHA512

    7f2147cd7d2e0e044e4e46c26df015decc4ae4c51d8500e91f1155cfe91e58c38d5f9a10710e6c70ba7ab590a4828e344ac32f28ecefaf9557429caac626af9b

  • SSDEEP

    24576:uZHcNHqqSX6AQzHlPnK7N1F7nJRFoK7EjvEYwa2MVZcXxZzHN9zqn4:aTUHlPK7rFj3qK7a2MV43O

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 5 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Drops file in System32 directory 25 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\npcap-1.72.exe
    "C:\Users\Admin\AppData\Local\Temp\npcap-1.72.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\SysWOW64\cmd.exe
      cmd /Q /C "%SYSTEMROOT%\System32\wbem\wmic.exe qfe get hotfixid | %SYSTEMROOT%\System32\findstr.exe "^KB4474419""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\wbem\WMIC.exe
        C:\Windows\System32\wbem\wmic.exe qfe get hotfixid
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2788
      • C:\Windows\SysWOW64\findstr.exe
        C:\Windows\System32\findstr.exe "^KB4474419"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2732
    • C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\NPFInstall.exe
      "C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\NPFInstall.exe" -n -check_dll
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:836
    • C:\Windows\SysWOW64\certutil.exe
      certutil -addstore -f "Root" "C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\roots.p7b"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:872
    • C:\Windows\SysWOW64\certutil.exe
      certutil -addstore -f "TrustedPublisher" "C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\signing.p7b"
      2⤵
      • Manipulates Digital Signatures
      • System Location Discovery: System Language Discovery
      PID:1492
    • C:\Program Files\Npcap\NPFInstall.exe
      "C:\Program Files\Npcap\NPFInstall.exe" -n -c
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Windows\system32\pnputil.exe
        pnputil.exe -e
        3⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:2908
    • C:\Program Files\Npcap\NPFInstall.exe
      "C:\Program Files\Npcap\NPFInstall.exe" -n -iw
      2⤵
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2212
    • C:\Program Files\Npcap\NPFInstall.exe
      "C:\Program Files\Npcap\NPFInstall.exe" -n -i
      2⤵
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2620
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{66c9f4f3-7301-111b-afe9-114cbb1f8c0b}\NPCAP.inf" "9" "605306be3" "0000000000000544" "WinSta0\Default" "00000000000003E0" "208" "C:\Program Files\Npcap"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{587805ae-4073-3b2d-1fb9-fb70c8be3f43} Global\{7ecb0761-f40d-5409-89e9-767c1d1c6b50} C:\Windows\System32\DriverStore\Temp\{196e59b8-eb61-1e32-dc89-ce74e7985e17}\NPCAP.inf C:\Windows\System32\DriverStore\Temp\{196e59b8-eb61-1e32-dc89-ce74e7985e17}\npcap.cat
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\Npcap\npcap.sys

    Filesize

    65KB

    MD5

    488c9ab147a3550990341e28f2f446cd

    SHA1

    e902a2bfbfb3951f4fda867d9c9f06cb24445d29

    SHA256

    47f39d6bf090abe687c095e15e1d52991fe68af3e93c1618c905699aa9bb2003

    SHA512

    f1391ba80766f7ae065732809910d27619f948f3ee6fcb8cd43f20cf0b1cf997776485d7bb044f8dbb69fad6d6986c0c0ce8430567c954e239e5fd95e7a4bc15

  • C:\Program Files\Npcap\NPCAP.inf

    Filesize

    8KB

    MD5

    c5a26b7a7af29f1aebe5644d7d78bfb2

    SHA1

    4a17051c0f902e951d41d5ca5c201c906909ed88

    SHA256

    ed180fc4830d6032bbb40692bf5a7f6dcff58a64883d34c72c9d2134e9a09748

    SHA512

    36c13301e99e14f19fd28e20f221263994d5a7c8b27a28cc11cf85256b9bcf7e76da1c3bd54bf1b7798e5fa7ccb4aa818b97ce2ab9f494b6727be8f73c16a655

  • C:\Program Files\Npcap\NPCAP_wfp.inf

    Filesize

    2KB

    MD5

    04849c73048bcd208ff0abba8ea167e9

    SHA1

    2a37af42c8aa1f335b7eade61a22c46b13dd5429

    SHA256

    b9e12f5e3cef2ba4a190809ffac4d02649f1d00e95b4f351c63940ae57bec39a

    SHA512

    d15a717515b85c92033c84b3ce82bd38589b3bfa8cd2ee1dc5e90b45a5845975dec68282ac0bad35a50f619cf1815cc4b65db5e5836c0b22b851f3bbd4a517ce

  • C:\Program Files\Npcap\NPFInstall.log

    Filesize

    876B

    MD5

    250d45607a05611dc6fcce937fc9a41a

    SHA1

    e0c26fbb20700632b4d86f5f34b85d094e348522

    SHA256

    4fd67e0437cde5755dba135786e8a6fbddd2ea9059149b7153039830f25d742e

    SHA512

    1a384e5fac4677c3d1c4a7960efa82716284cd6415aeaf2307ce1404a7047003dc7f59492bf2246452a9b22bcb6ba8a0bc471f42f507e254bc26969ac4f0432e

  • C:\Program Files\Npcap\NPFInstall.log

    Filesize

    2KB

    MD5

    ad99ee7d1b1af6ac7957fd5b1a5aa483

    SHA1

    f7cd0a460f5273ab9ffdff394b5f559dfbb08df7

    SHA256

    e589092607dfe07bd5c6aaf1675eddc5655175729b20c4ad1e3293aafbe108c5

    SHA512

    3a7f78ddc9b53bbc5ceb21dd16cc6fe29269659d6619115ebed46aa66a425d169bdb186dd775ad9d8d782acb7f162f4d71a6de54d6bec77b41cd330ae7fd697a

  • C:\Program Files\Npcap\NPFInstall.log

    Filesize

    2KB

    MD5

    35ab0f2f066e7191f4a52165c10cbcd6

    SHA1

    32d9713590f5a36a338701e7690dc87ce7c5fe43

    SHA256

    a09c42147f8ef8b1aeb6c9e425429fa5fc4b583859b2eb793a0c612885f801d9

    SHA512

    1529d3c225d119c47fa488dd41e6fd274e980a88fc101eb56ebc7bd2ecf6f306af36af315aecf9e0209c91fae02fdbaa7199cf8ddfa1105bbcd136f0f605328b

  • C:\Program Files\Npcap\NPFInstall.log

    Filesize

    2KB

    MD5

    2581624c1b77d027eebf4ed81098f027

    SHA1

    7ff22273fec080958e058c7442a69cc1c92e3cb9

    SHA256

    0a97debef7b7ccc666e65d58ba53c3877b4eee732fd4827708b8860f3237b282

    SHA512

    bf6f9bef3da2dcdb35f5abe9e25c0d9ddccfbaba2e38927e4a6c9a6dd03e32895036f15dec7e67413dd6b58e04694ef85a7d15e5fb25aee0c4c97ec82cb344ba

  • C:\Program Files\Npcap\NPFInstall.log

    Filesize

    2KB

    MD5

    9a383dcf9f301e09c99c96bdee519aad

    SHA1

    bc681801ed062a43409b430259a358821d8916d8

    SHA256

    a0b2c8edaeaa7d3f221d716c3dcab0f02121983930ab959b5004cd0e6ca8d371

    SHA512

    422b4669427d15db3ad47e5f74184496f3489c2237ef3d4578d43bdd2f5525cf32596e46c25d8c668fb6ef93d5a3e4e4bc495a82818297c76f24ca626ac2c926

  • C:\Program Files\Npcap\npcap.cat

    Filesize

    12KB

    MD5

    1620ac81649dc1aba17b2195528fb26f

    SHA1

    a2f6253df6ed60e8efa84e004bf1fcabd2e84772

    SHA256

    a126d843a984c6db3ff4118283514807e2d1a7721f31c578d661d32700ee9cd8

    SHA512

    33f949ff7c484b2c8f20d142c6cd68b8ba339614fda4d19c41dbefdab0b3770904777f9eb3ec7b358eeaa1ab0b62e4a2f1a4ad719c08402f45b20470a0b93e01

  • C:\Users\Admin\AppData\Local\Temp\Cab602C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\options.ini

    Filesize

    2KB

    MD5

    08b8bd30689a10cb1bcfe734522e9e76

    SHA1

    91581bfb971e1fb6897c2d8e2a17c65c871f3411

    SHA256

    0e185010227c3c8190822bbae6041dfc1d5b753fd8050bcef6c9422c487eff6d

    SHA512

    e5ab2f09fc8d09f37778e6e1994755e17b4cd46495048d05422e8a098aa466673c11ece71a40a03ca4bc977fdf283e56b914d356f46af39b1fd33dbdb10e306b

  • C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\options.ini

    Filesize

    2KB

    MD5

    5e4f6552475d520010bde54a173e8791

    SHA1

    60d947c828ee88b35bcf2e080d13b954c02bd75c

    SHA256

    9c9f91f8d60c66a88fe4ad6091dce4be584673b15aee6f53af191526ac559c10

    SHA512

    c69d6244ecfa7137e40de1cd82a2472a430db83550cde11bcd65516cc3a9e1a69b1721e55220cb8a724e01d2dbe3900b575129d88a6ba6b5ab179a186aa616cf

  • C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\options.ini

    Filesize

    2KB

    MD5

    13e97737a6246589891649c8d26770cf

    SHA1

    9cc20bbb0f6eabd4b6d4064367a530328cbcff52

    SHA256

    91a66f2ed3db2cce2487972159e21ad26062f8e6ddfff93faeaac5f1f278a6ee

    SHA512

    3cc5e4dd1b1bc91c9176959a84e65d0e45caa61bbdec96675f7b2d1285b6eb5afd7dc35ff9ba9aead65eb007182cb3f8771e38046e527126bcc0c75dc7b15d20

  • C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\roots.p7b

    Filesize

    1KB

    MD5

    397a5848d3696fc6ba0823088fea83db

    SHA1

    9189985f027de80d4882ab5e01604c59d6fc1f16

    SHA256

    ad3bca6f2b0ec032c7f1fe1adb186bd73be6a332c868bf16c9765087fff1c1ca

    SHA512

    66129a206990753967cd98c14a0a3e0e2a73bc4cd10cf84a5a05da7bf20719376989d64c6c7880a3e4754fc74653dd49f2ffeffd55fc4ee5966f65beb857118c

  • C:\Users\Admin\AppData\Local\Temp\nse21B6.tmp\signing.p7b

    Filesize

    7KB

    MD5

    dd4bc901ef817319791337fb345932e8

    SHA1

    f8a3454a09d90a09273935020c1418fdb7b7eb7c

    SHA256

    8e681692403c0f7c0b24160f4642daa1eb080ce5ec754b6f47cc56b43e731b71

    SHA512

    0a67cc346f9752e1c868b7dc60b25704255ab1e6ea745850c069212f2724eba62ffaaa48309d5eba6ae0235223518610fb4b60fc422e4babba4f33d331c71db5

  • C:\Windows\Temp\Cab5DEB.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar5F06.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Users\Admin\AppData\Local\Temp\nse21B6.tmp\InstallOptions.dll

    Filesize

    22KB

    MD5

    170c17ac80215d0a377b42557252ae10

    SHA1

    4cbab6cc189d02170dd3ba7c25aa492031679411

    SHA256

    61ea114d9d0cd1e884535095aa3527a6c28df55a4ecee733c8c398f50b84cc3d

    SHA512

    0fd65cad0fcaa98083c2021de3d6429e79978658809c62ae9e4ed630c016915ced36aa52f2f692986c3b600c92325e79fd6d757634e8e02d5e582ff03679163f

  • \Users\Admin\AppData\Local\Temp\nse21B6.tmp\NPFInstall.exe

    Filesize

    301KB

    MD5

    69a2863281739e40702e40fde07ef72d

    SHA1

    8cf737fb5845a45445483cb1fae533c5a61da028

    SHA256

    5c2e569db9c5a978004b8fbf04ed372071ad998d759a12e5aaba470df158889e

    SHA512

    2315a4aa52f579a3633bd9c61c293b9fa78725d8331deee6ca24db70fb2565f431fc0f7f1ee84881b2e34b778ffc91c45e1b694ae517cdd266b0875e7089f178

  • \Users\Admin\AppData\Local\Temp\nse21B6.tmp\System.dll

    Filesize

    19KB

    MD5

    f020a8d9ede1fb2af3651ad6e0ac9cb1

    SHA1

    341f9345d669432b2a51d107cbd101e8b82e37b1

    SHA256

    7efe73a8d32ed1b01727ad4579e9eec49c9309f2cb7bf03c8afa80d70242d1c0

    SHA512

    408fa5a797d3ff4b917bb4107771687004ba507a33cb5944b1cc3155e0372cb3e04a147f73852b9134f138ff709af3b0fb493cd8fa816c59e9f3d9b5649c68c4

  • \Users\Admin\AppData\Local\Temp\nse21B6.tmp\nsExec.dll

    Filesize

    14KB

    MD5

    f9e61a25016dcb49867477c1e71a704e

    SHA1

    c01dc1fa7475e4812d158d6c00533410c597b5d9

    SHA256

    274e53dc8c5ddc273a6f5683b71b882ef8917029e2eaf6c8dbee0c62d999225d

    SHA512

    b4a6289ef9e761e29dd5362fecb1707c97d7cb3e160f4180036a96f2f904b2c64a075b5bf0fea4a3bb94dea97f3cfa0d057d3d6865c68da65fdcb9c3070c33d8