Windows
Analysis Report
WinPcap_4_1_3.exe
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | true |
Confidence: | 100% |
Compliance
Score: | 18 |
Range: | 0 - 100 |
Signatures
Install WinpCap (used to filter network traffic)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
DLL planting / hijacking vulnerabilities found
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Found dropped PE file which has not been started or loaded
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Uses 32bit PE files
Classification
- System is w10x64
WinPcap_4_1_3.exe (PID: 6596 cmdline:
C:\Users\u ser\Deskto p\WinPcap_ 4_1_3.exe MD5: A11A2F0CFE6D0B4C50945989DB6360CD) net.exe (PID: 7140 cmdline:
net start npf MD5: 31890A7DE89936F922D44D677F681A7F) conhost.exe (PID: 7032 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) net1.exe (PID: 1592 cmdline:
C:\Windows \system32\ net1 start npf MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Snort rule has matched
- • Privilege Escalation
- • Compliance
- • Spreading
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • E-Banking Fraud
- • Spam, unwanted Advertisements and Ransom Demands
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Show All Signature Results
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior |
Source: | EXE: | Jump to behavior |
Compliance |
---|
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior |
Source: | EXE: | Jump to behavior |
Source: | Static PE information: |
Source: | Window detected: |