Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3WinPcap_4_1_3.exe
windows7-x64
8WinPcap_4_1_3.exe
windows10-2004-x64
8$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SYSDIR/Packet.dll
windows7-x64
3$SYSDIR/Packet.dll
windows10-2004-x64
3$SYSDIR/pthreadVC.dll
windows7-x64
3$SYSDIR/pthreadVC.dll
windows10-2004-x64
3$SYSDIR/wpcap.dll
windows7-x64
3$SYSDIR/wpcap.dll
windows10-2004-x64
3WinPcapInstall.dll
windows7-x64
3WinPcapInstall.dll
windows10-2004-x64
3rpcapd.exe
windows7-x64
1rpcapd.exe
windows10-2004-x64
3Resubmissions
22/10/2024, 17:10
241022-vp365axgrj 8Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
WinPcap_4_1_3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WinPcap_4_1_3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$SYSDIR/Packet.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$SYSDIR/Packet.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$SYSDIR/pthreadVC.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$SYSDIR/pthreadVC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$SYSDIR/wpcap.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$SYSDIR/wpcap.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
WinPcapInstall.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
WinPcapInstall.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
rpcapd.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
rpcapd.exe
Resource
win10v2004-20241007-en
General
-
Target
WinPcap_4_1_3.exe
-
Size
893KB
-
MD5
a11a2f0cfe6d0b4c50945989db6360cd
-
SHA1
e2516fcd1573e70334c8f50bee5241cdfdf48a00
-
SHA256
fc4623b113a1f603c0d9ad5f83130bd6de1c62b973be9892305132389c8588de
-
SHA512
2652d84eb91ca7957b4fb3ff77313e5dae978960492669242df4f246296f1bedaa48c0d33ffb286b2859a1b86ef5460060b551edca597b4ec60ee08676877c70
-
SSDEEP
24576:UBOldyR6ORWsaM2QROxa6jsqUENfJjNK/CG6niqiL:2KzqWsayROxa6QDENuaG+ifL
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys WinPcap_4_1_3.exe -
Loads dropped DLL 11 IoCs
pid Process 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe 4456 WinPcap_4_1_3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\wpcap.dll WinPcap_4_1_3.exe File created C:\Windows\SysWOW64\pthreadVC.dll WinPcap_4_1_3.exe File created C:\Windows\SysWOW64\Packet.dll WinPcap_4_1_3.exe File created C:\Windows\system32\wpcap.dll WinPcap_4_1_3.exe File created C:\Windows\system32\Packet.dll WinPcap_4_1_3.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\WinPcap\WinPcapInstall.dll WinPcap_4_1_3.exe File created C:\Program Files (x86)\WinPcap\Uninstall.exe WinPcap_4_1_3.exe File opened for modification C:\Program Files (x86)\WinPcap\WinPcapInstall.dll WinPcap_4_1_3.exe File created C:\Program Files (x86)\WinPcap\install.log WinPcap_4_1_3.exe File created C:\Program Files (x86)\WinPcap\rpcapd.exe WinPcap_4_1_3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinPcap_4_1_3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4456 wrote to memory of 2892 4456 WinPcap_4_1_3.exe 99 PID 4456 wrote to memory of 2892 4456 WinPcap_4_1_3.exe 99 PID 4456 wrote to memory of 2892 4456 WinPcap_4_1_3.exe 99 PID 2892 wrote to memory of 2952 2892 net.exe 101 PID 2892 wrote to memory of 2952 2892 net.exe 101 PID 2892 wrote to memory of 2952 2892 net.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinPcap_4_1_3.exe"C:\Users\Admin\AppData\Local\Temp\WinPcap_4_1_3.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\net.exenet start npf2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf3⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5e78291558cb803dfd091ad8fb56feecc
SHA14bde2f87e903fe8d3bd80179c5584cec7a8cbdc4
SHA256d9f4cd9f0e1bc9a138fb4da6f83c92c3e86eb3de4f988d5943d75c9b1dc6bb9d
SHA512042b96bc2c0e6d8b6e2730426938eb7400fd833be8a108a4942f559fedefabc35fd5dcb7ea1898d377b4382c0a9af8eeeebd663a4c852c706e3bd168c1f1f62f
-
Filesize
5KB
MD5a7cd6206240484c8436c66afb12bdfbf
SHA10bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919
SHA25669ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926
SHA512b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
371B
MD5c2108c4f098cc0b78a218796075a7659
SHA13d371a22da0c25a2a9ca6c3329f5ecaf9e16ff18
SHA256f3324dcc8979d32c37bf568a610d7e512100a78bc701e0169eb3c698c7fd4cec
SHA5122ada47d499040c54410045e1f4a3e34b4f739f342e8e3018a41332a8dcd339173ef67afe1d01a146c245011d1e4ceb97f3febd1f7d619fad48d0cd003cc63d81
-
Filesize
349B
MD573461ff69941beefb0f5630b29b5ae2e
SHA1f8f33b309db03f1bc5a9fd452150245474c000f1
SHA25681a27757de2fa404014be9a73f502537628f82a3da3f809b1ff5584a828910b8
SHA51238b3a21683bb30cc301406e2f12d0cf916299a4618af552f9e01b1b0fecddf22c79e37f7aaf3f2a85706a263049d10c17ccc417fa9c07f8b74c28284a02da460
-
Filesize
556B
MD559d93fc66acff2b489a5151f95230a7e
SHA192d23b0eccc56aa41bdeb21ac8b4ff77336c0a5b
SHA256f95be3b969017c818bb37ca16d65c812e2b1160fcca83e78ba8c2f9eebb5af46
SHA512f6612116d034e8b1d6dcc7de4b2fd3cb5135ef3388d318b558bf0dca63340bea5e65ac98bf79cd24305329ae57c651087d17aca5440ac611d5407e0fcb799618
-
Filesize
578B
MD57cd44a0465f11824d7e1abcbe395ea81
SHA110ca413782b5a35ff8df4ecf855a8202a8cf8937
SHA256b568005e38883c43565a8f8b4d70be6cf3bac9e3f0d82fea9024f5d4f16bf67a
SHA5121ccbe293e8d656efeca932c3b92200114ae25cdc531809f6c457eee1e6e49d9de3a6844e1257b856ec11900e1a04ce090d510f53d782b46ef0ad16787d5de715