Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/10/2024, 17:10

241022-vp365axgrj 8

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/10/2024, 17:10

General

  • Target

    WinPcap_4_1_3.exe

  • Size

    893KB

  • MD5

    a11a2f0cfe6d0b4c50945989db6360cd

  • SHA1

    e2516fcd1573e70334c8f50bee5241cdfdf48a00

  • SHA256

    fc4623b113a1f603c0d9ad5f83130bd6de1c62b973be9892305132389c8588de

  • SHA512

    2652d84eb91ca7957b4fb3ff77313e5dae978960492669242df4f246296f1bedaa48c0d33ffb286b2859a1b86ef5460060b551edca597b4ec60ee08676877c70

  • SSDEEP

    24576:UBOldyR6ORWsaM2QROxa6jsqUENfJjNK/CG6niqiL:2KzqWsayROxa6QDENuaG+ifL

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WinPcap_4_1_3.exe
    "C:\Users\Admin\AppData\Local\Temp\WinPcap_4_1_3.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Windows\SysWOW64\net.exe
      net start npf
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 start npf
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WinPcap\WinPcapInstall.dll

    Filesize

    91KB

    MD5

    e78291558cb803dfd091ad8fb56feecc

    SHA1

    4bde2f87e903fe8d3bd80179c5584cec7a8cbdc4

    SHA256

    d9f4cd9f0e1bc9a138fb4da6f83c92c3e86eb3de4f988d5943d75c9b1dc6bb9d

    SHA512

    042b96bc2c0e6d8b6e2730426938eb7400fd833be8a108a4942f559fedefabc35fd5dcb7ea1898d377b4382c0a9af8eeeebd663a4c852c706e3bd168c1f1f62f

  • C:\Users\Admin\AppData\Local\Temp\nsi99FF.tmp\ExecDos.dll

    Filesize

    5KB

    MD5

    a7cd6206240484c8436c66afb12bdfbf

    SHA1

    0bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919

    SHA256

    69ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926

    SHA512

    b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904

  • C:\Users\Admin\AppData\Local\Temp\nsi99FF.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • C:\Users\Admin\AppData\Local\Temp\nsi99FF.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nsi99FF.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsi99FF.tmp\bootOptions.ini

    Filesize

    371B

    MD5

    c2108c4f098cc0b78a218796075a7659

    SHA1

    3d371a22da0c25a2a9ca6c3329f5ecaf9e16ff18

    SHA256

    f3324dcc8979d32c37bf568a610d7e512100a78bc701e0169eb3c698c7fd4cec

    SHA512

    2ada47d499040c54410045e1f4a3e34b4f739f342e8e3018a41332a8dcd339173ef67afe1d01a146c245011d1e4ceb97f3febd1f7d619fad48d0cd003cc63d81

  • C:\Users\Admin\AppData\Local\Temp\nsi99FF.tmp\bootOptions.ini

    Filesize

    349B

    MD5

    73461ff69941beefb0f5630b29b5ae2e

    SHA1

    f8f33b309db03f1bc5a9fd452150245474c000f1

    SHA256

    81a27757de2fa404014be9a73f502537628f82a3da3f809b1ff5584a828910b8

    SHA512

    38b3a21683bb30cc301406e2f12d0cf916299a4618af552f9e01b1b0fecddf22c79e37f7aaf3f2a85706a263049d10c17ccc417fa9c07f8b74c28284a02da460

  • C:\Users\Admin\AppData\Local\Temp\nsi99FF.tmp\ioSpecial.ini

    Filesize

    556B

    MD5

    59d93fc66acff2b489a5151f95230a7e

    SHA1

    92d23b0eccc56aa41bdeb21ac8b4ff77336c0a5b

    SHA256

    f95be3b969017c818bb37ca16d65c812e2b1160fcca83e78ba8c2f9eebb5af46

    SHA512

    f6612116d034e8b1d6dcc7de4b2fd3cb5135ef3388d318b558bf0dca63340bea5e65ac98bf79cd24305329ae57c651087d17aca5440ac611d5407e0fcb799618

  • C:\Users\Admin\AppData\Local\Temp\nsi99FF.tmp\ioSpecial.ini

    Filesize

    578B

    MD5

    7cd44a0465f11824d7e1abcbe395ea81

    SHA1

    10ca413782b5a35ff8df4ecf855a8202a8cf8937

    SHA256

    b568005e38883c43565a8f8b4d70be6cf3bac9e3f0d82fea9024f5d4f16bf67a

    SHA512

    1ccbe293e8d656efeca932c3b92200114ae25cdc531809f6c457eee1e6e49d9de3a6844e1257b856ec11900e1a04ce090d510f53d782b46ef0ad16787d5de715

  • memory/4456-141-0x0000000004B30000-0x0000000004B46000-memory.dmp

    Filesize

    88KB