URL:

http://download.drp.su/stable/DriverPack-Online-lts-17-6-12.exe

Full analysis: https://app.any.run/tasks/7e63e30f-d740-4fdb-95ec-165bfa4332a3
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 17, 2020, 16:15:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MD5:

258521E91D906CD80F4E0AC6E8C29CBF

SHA1:

C61FA4CD4CD9849093AAA739D4EBC3755E3E04C9

SHA256:

73E4B46CEA2A5D5342D34C9C3202D63C2CE8CC89E5573077EEAD7EBAC332AAE4

SSDEEP:

3:N1KaKElHDXKBs9M00wp2A:Ca5z8suP2n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • DriverPack-Online-lts-17-6-12.exe (PID: 3824)
      • DriverPack.exe (PID: 2676)
      • DriverPack.exe (PID: 952)
      • driverpack-wget.exe (PID: 2572)
      • driverpack-wget.exe (PID: 1852)
      • driverpack-wget.exe (PID: 2848)
      • driverpack-wget.exe (PID: 1800)
      • 7za.exe (PID: 3504)
      • driverpack-wget.exe (PID: 1744)
      • driverpack-wget.exe (PID: 1860)
      • driverpack-wget.exe (PID: 2696)
      • driverpack-wget.exe (PID: 1688)
      • driverpack-wget.exe (PID: 3920)
      • driverpack-wget.exe (PID: 4060)
      • driverpack-wget.exe (PID: 816)
      • driverpack-wget.exe (PID: 1332)
      • driverpack-wget.exe (PID: 1400)
      • installer.exe (PID: 2940)
      • opera.exe (PID: 3976)
      • launcher.exe (PID: 3000)
      • installer.exe (PID: 2584)
      • opera_crashreporter.exe (PID: 3708)
      • opera.exe (PID: 3204)
      • opera.exe (PID: 2672)
      • opera_crashreporter.exe (PID: 3104)
      • opera.exe (PID: 2396)
      • opera.exe (PID: 2896)
      • opera.exe (PID: 3860)
      • opera.exe (PID: 2132)
      • opera.exe (PID: 1156)
      • opera.exe (PID: 3040)
      • opera.exe (PID: 1140)
      • opera.exe (PID: 280)
      • opera.exe (PID: 3880)
      • opera.exe (PID: 3940)
      • 7za.exe (PID: 3220)
      • opera.exe (PID: 2452)
      • opera.exe (PID: 2688)
      • opera.exe (PID: 2300)
      • 7za.exe (PID: 3252)
      • opera.exe (PID: 3384)
      • opera.exe (PID: 3872)
      • opera.exe (PID: 4020)
      • devcon.exe (PID: 4020)
      • opera.exe (PID: 952)
      • opera_autoupdate.exe (PID: 5304)
      • installer.exe (PID: 5820)
      • opera_autoupdate.exe (PID: 5676)
      • opera_autoupdate.exe (PID: 4776)
      • opera.exe (PID: 5080)
      • opera.exe (PID: 5792)
      • opera_autoupdate.exe (PID: 4552)
      • launcher.exe (PID: 4696)
      • 7za.exe (PID: 5488)
      • 7za.exe (PID: 5404)
      • devcon.exe (PID: 5268)
      • 7za.exe (PID: 5624)
      • 7za.exe (PID: 2424)
      • opera.exe (PID: 2748)
      • devcon.exe (PID: 4792)
      • 7za.exe (PID: 4000)
      • 7za.exe (PID: 4952)
      • devcon.exe (PID: 4520)
      • devcon.exe (PID: 5636)
      • 7za.exe (PID: 5800)
      • 7za.exe (PID: 4560)
    • Changes internet zones settings

      • mshta.exe (PID: 2884)
    • Downloads executable files from the Internet

      • driverpack-wget.exe (PID: 4060)
      • driverpack-wget.exe (PID: 1400)
      • driverpack-wget.exe (PID: 1332)
    • Loads dropped or rewritten executable

      • OperaBlink.exe (PID: 1632)
      • OperaBlink.exe (PID: 2092)
      • OperaBlink.exe (PID: 2116)
      • installer.exe (PID: 2584)
      • OperaBlink.exe (PID: 3460)
      • installer.exe (PID: 2940)
      • opera.exe (PID: 3976)
      • OperaBlink.exe (PID: 2124)
      • opera.exe (PID: 2748)
      • opera.exe (PID: 2672)
      • opera.exe (PID: 2396)
      • opera.exe (PID: 2132)
      • opera.exe (PID: 2896)
      • opera.exe (PID: 3860)
      • opera.exe (PID: 1156)
      • opera.exe (PID: 3040)
      • opera.exe (PID: 1140)
      • opera.exe (PID: 280)
      • opera.exe (PID: 3940)
      • opera.exe (PID: 3880)
      • opera.exe (PID: 2452)
      • opera.exe (PID: 2688)
      • opera.exe (PID: 2300)
      • opera.exe (PID: 3872)
      • opera.exe (PID: 3384)
      • opera.exe (PID: 952)
      • installer.exe (PID: 5820)
      • opera.exe (PID: 5080)
      • opera.exe (PID: 5792)
      • opera.exe (PID: 3204)
    • Changes settings of System certificates

      • OperaBlink.exe (PID: 2116)
      • mshta.exe (PID: 2884)
      • devcon.exe (PID: 4520)
    • Loads the Task Scheduler COM API

      • installer.exe (PID: 2584)
      • opera.exe (PID: 2748)
    • Actions looks like stealing of personal data

      • opera.exe (PID: 2748)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • DriverPack-Online-lts-17-6-12.exe (PID: 3824)
      • chrome.exe (PID: 3744)
      • chrome.exe (PID: 2072)
      • driverpack-wget.exe (PID: 4060)
      • driverpack-wget.exe (PID: 1332)
      • OperaBlink.exe (PID: 1632)
      • OperaBlink.exe (PID: 2116)
      • driverpack-wget.exe (PID: 1400)
      • driverpack-wget.exe (PID: 1860)
      • OperaBlink.exe (PID: 2092)
      • OperaBlink.exe (PID: 3460)
      • installer.exe (PID: 2584)
      • installer.exe (PID: 2940)
      • 7za.exe (PID: 3252)
      • launcher.exe (PID: 4696)
      • installer.exe (PID: 5820)
      • devcon.exe (PID: 4020)
      • DrvInst.exe (PID: 5944)
      • 7za.exe (PID: 5488)
      • 7za.exe (PID: 2424)
      • 7za.exe (PID: 4560)
      • 7za.exe (PID: 4952)
      • DrvInst.exe (PID: 2988)
      • devcon.exe (PID: 4520)
    • Starts CMD.EXE for commands execution

      • DriverPack.exe (PID: 2676)
      • mshta.exe (PID: 2884)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 2428)
    • Creates files in the user directory

      • wscript.exe (PID: 3356)
      • wscript.exe (PID: 2648)
      • wscript.exe (PID: 3928)
      • wscript.exe (PID: 3080)
      • mshta.exe (PID: 2884)
      • driverpack-wget.exe (PID: 2696)
      • driverpack-wget.exe (PID: 3920)
      • driverpack-wget.exe (PID: 2848)
      • cmd.exe (PID: 1468)
      • cmd.exe (PID: 2076)
      • cmd.exe (PID: 1328)
      • cmd.exe (PID: 3192)
      • cmd.exe (PID: 2752)
      • cmd.exe (PID: 3428)
      • cmd.exe (PID: 1812)
      • driverpack-wget.exe (PID: 1744)
      • driverpack-wget.exe (PID: 1860)
      • cmd.exe (PID: 2360)
      • driverpack-wget.exe (PID: 1852)
      • cmd.exe (PID: 3708)
      • driverpack-wget.exe (PID: 2572)
      • driverpack-wget.exe (PID: 1332)
      • driverpack-wget.exe (PID: 816)
      • driverpack-wget.exe (PID: 4060)
      • driverpack-wget.exe (PID: 1800)
      • driverpack-wget.exe (PID: 1688)
      • cmd.exe (PID: 2876)
      • cmd.exe (PID: 1548)
      • cmd.exe (PID: 3648)
      • cmd.exe (PID: 3544)
      • driverpack-wget.exe (PID: 1400)
      • OperaBlink.exe (PID: 1632)
      • cmd.exe (PID: 1064)
      • cmd.exe (PID: 1604)
      • cmd.exe (PID: 2484)
      • installer.exe (PID: 2584)
      • opera.exe (PID: 3976)
      • opera.exe (PID: 2748)
      • cmd.exe (PID: 2952)
      • opera.exe (PID: 2396)
      • cmd.exe (PID: 3128)
      • cmd.exe (PID: 3008)
      • opera_autoupdate.exe (PID: 5304)
      • cmd.exe (PID: 2488)
      • cmd.exe (PID: 4312)
      • cmd.exe (PID: 4376)
      • cmd.exe (PID: 4648)
      • cmd.exe (PID: 4484)
      • cmd.exe (PID: 5284)
      • cmd.exe (PID: 5056)
      • cmd.exe (PID: 5844)
      • cmd.exe (PID: 4284)
      • cmd.exe (PID: 5052)
      • cmd.exe (PID: 5916)
      • cmd.exe (PID: 5256)
    • Uses RUNDLL32.EXE to load library

      • mshta.exe (PID: 2884)
      • DrvInst.exe (PID: 5944)
      • DrvInst.exe (PID: 2988)
    • Executed as Windows Service

      • vssvc.exe (PID: 1352)
      • vssvc.exe (PID: 6124)
    • Executes scripts

      • DriverPack-Online-lts-17-6-12.exe (PID: 3824)
    • Reads Internet Cache Settings

      • mshta.exe (PID: 2884)
      • OperaBlink.exe (PID: 2116)
    • Executed via COM

      • DllHost.exe (PID: 2248)
      • DrvInst.exe (PID: 5944)
      • DrvInst.exe (PID: 5164)
      • DrvInst.exe (PID: 5032)
      • DrvInst.exe (PID: 4816)
      • DrvInst.exe (PID: 5752)
      • DrvInst.exe (PID: 2988)
      • rundll32.exe (PID: 5952)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • DriverPack.exe (PID: 2676)
    • Application launched itself

      • OperaBlink.exe (PID: 2116)
      • OperaBlink.exe (PID: 2092)
      • installer.exe (PID: 2584)
      • opera.exe (PID: 3976)
      • opera.exe (PID: 2748)
      • opera_autoupdate.exe (PID: 5304)
      • opera_autoupdate.exe (PID: 5676)
    • Adds / modifies Windows certificates

      • OperaBlink.exe (PID: 2116)
      • mshta.exe (PID: 2884)
      • devcon.exe (PID: 4520)
    • Creates files in the program directory

      • OperaBlink.exe (PID: 2092)
      • installer.exe (PID: 2584)
      • opera_autoupdate.exe (PID: 5676)
    • Modifies the open verb of a shell class

      • installer.exe (PID: 2584)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3744)
    • Reads the machine GUID from the registry

      • opera.exe (PID: 3976)
      • opera.exe (PID: 2748)
      • opera_autoupdate.exe (PID: 5304)
    • Creates a software uninstall entry

      • installer.exe (PID: 2584)
    • Starts itself from another location

      • OperaBlink.exe (PID: 2116)
    • Executed via Task Scheduler

      • launcher.exe (PID: 4696)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 5944)
      • DrvInst.exe (PID: 2988)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 5944)
      • DrvInst.exe (PID: 2988)
    • Creates files in the Windows directory

      • DrvInst.exe (PID: 5944)
      • DrvInst.exe (PID: 5164)
      • DrvInst.exe (PID: 2988)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2072)
      • chrome.exe (PID: 3744)
      • opera.exe (PID: 3976)
      • opera.exe (PID: 2748)
      • opera.exe (PID: 2396)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 3744)
    • Reads settings of System Certificates

      • mshta.exe (PID: 2884)
      • OperaBlink.exe (PID: 2116)
    • Reads internet explorer settings

      • mshta.exe (PID: 2884)
    • Application launched itself

      • chrome.exe (PID: 3744)
    • Dropped object may contain Bitcoin addresses

      • OperaBlink.exe (PID: 2092)
      • opera.exe (PID: 2748)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 1352)
      • vssvc.exe (PID: 6124)
    • Manual execution by user

      • opera.exe (PID: 2748)
    • Searches for installed software

      • DrvInst.exe (PID: 2988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
245
Monitored processes
164
Malicious processes
24
Suspicious processes
22

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs driverpack-online-lts-17-6-12.exe wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs chrome.exe no specs driverpack.exe no specs driverpack.exe cmd.exe no specs reg.exe no specs mshta.exe rundll32.exe no specs SPPSurrogate no specs vssvc.exe no specs chrome.exe no specs chrome.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs cmd.exe no specs 7za.exe no specs driverpack-wget.exe cmd.exe no specs extrac32.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs driverpack-wget.exe cmd.exe no specs driverpack-wget.exe cmd.exe no specs driverpack-wget.exe cmd.exe no specs operablink.exe operablink.exe operablink.exe no specs operablink.exe operablink.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs installer.exe installer.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs launcher.exe no specs chrome.exe no specs opera.exe no specs chrome.exe no specs opera_crashreporter.exe no specs opera.exe no specs opera.exe no specs chrome.exe no specs opera.exe opera_crashreporter.exe no specs opera.exe no specs opera.exe opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs cmd.exe no specs cmd.exe no specs opera.exe no specs 7za.exe no specs 7za.exe findstr.exe no specs find.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs cmd.exe no specs devcon.exe opera_autoupdate.exe opera_autoupdate.exe no specs launcher.exe installer.exe opera_autoupdate.exe drvinst.exe opera_autoupdate.exe no specs rundll32.exe no specs rundll32.exe no specs opera.exe no specs opera.exe no specs rundll32.exe no specs drvinst.exe no specs rundll32.exe no specs cmd.exe no specs cmd.exe no specs 7za.exe no specs 7za.exe findstr.exe no specs find.exe no specs cmd.exe no specs devcon.exe no specs drvinst.exe no specs cmd.exe no specs cmd.exe no specs 7za.exe no specs 7za.exe findstr.exe no specs find.exe no specs cmd.exe no specs devcon.exe no specs drvinst.exe no specs cmd.exe no specs cmd.exe no specs 7za.exe no specs findstr.exe no specs 7za.exe find.exe no specs cmd.exe no specs devcon.exe no specs drvinst.exe no specs cmd.exe no specs cmd.exe no specs 7za.exe no specs 7za.exe findstr.exe no specs find.exe no specs cmd.exe no specs devcon.exe drvinst.exe rundll32.exe no specs rundll32.exe no specs rundll32.exe no specs vssvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Program Files\Opera\64.0.3417.73\opera.exe" --type=renderer --field-trial-handle=1076,13651506680822825133,1302688354847781977,131072 --lang=en-US --extension-process --user-agent="Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 OPR/64.0.3417.73 (Edition Campaign 34)" --enable-auto-reload --with-feature:installer-experiment-test=off --with-feature:installer-use-minimal-package=off --ab_tests=DNA-70598-ref:DNA-70598 --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12462387058339199892 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2544 /prefetch:1C:\Program Files\Opera\64.0.3417.73\opera.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
LOW
Description:
Opera Internet Browser
Exit code:
0
Version:
64.0.3417.73
Modules
Images
c:\program files\opera\64.0.3417.73\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\opera\64.0.3417.73\opera_elf.dll
c:\windows\system32\userenv.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\shell32.dll
740"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,8622454726989532119,1493498682214405385,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=596395142774167942 --mojo-platform-channel-handle=2140 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
816"tools\driverpack-wget.exe" --timeout 10 --retry-connrefused --wait=10 --timestamping --directory-prefix="C:\Users\admin\AppData\Roaming\DRPSu\DRIVERS" "http://download.drp.su/driverpacks/repack/Vendor/KVM/FORCED/7x86/KVM-FORCED-7x86-drp.zip" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_10612.log" --no-verbose C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\bin\tools\driverpack-wget.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7zipsfx.000\bin\tools\driverpack-wget.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
848extrac32 /Y /E /A "C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\bin\tools\oc\cab\1.cab" /L "C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\bin\tools\oc" C:\Windows\system32\extrac32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® CAB File Extract Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\extrac32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,8622454726989532119,1493498682214405385,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=5421820199212468081 --mojo-platform-channel-handle=1820 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
952"C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\DriverPack.exe" --sfx "DriverPack-Online-lts-17-6-12.exe"C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\DriverPack.exeDriverPack-Online-lts-17-6-12.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Installs and updates drivers
Exit code:
3221226540
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\7zipsfx.000\driverpack.exe
c:\systemroot\system32\ntdll.dll
952"C:\Program Files\Opera\64.0.3417.73\opera.exe" --type=renderer --field-trial-handle=1076,13651506680822825133,1302688354847781977,131072 --lang=en-US --user-agent="Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 OPR/64.0.3417.73 (Edition Campaign 34)" --enable-auto-reload --with-feature:installer-experiment-test=off --with-feature:installer-use-minimal-package=off --ab_tests=DNA-70598-ref:DNA-70598 --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=137372143372699540 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1C:\Program Files\Opera\64.0.3417.73\opera.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
LOW
Description:
Opera Internet Browser
Exit code:
0
Version:
64.0.3417.73
Modules
Images
c:\users\admin\appdata\local\temp\7zipsfx.000\driverpack.exe
c:\program files\opera\64.0.3417.73\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\opera\64.0.3417.73\opera_elf.dll
c:\windows\system32\userenv.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
956"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,8622454726989532119,1493498682214405385,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=15263428188070165186 --mojo-platform-channel-handle=500 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1064"C:\Windows\System32\cmd.exe" /c ""tools\driverpack-wget.exe" --timeout 10 --retry-connrefused --wait=10 --timestamping --directory-prefix="C:\Users\admin\AppData\Roaming\DRPSu\PROGRAMS" "http://dl.drp.su/soft/OperaBlink.exe" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_71563.log" --no-verbose & echo DONE > "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_finished_71563.txt""C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1140"C:\Program Files\Opera\64.0.3417.73\opera.exe" --type=renderer --field-trial-handle=1076,13651506680822825133,1302688354847781977,131072 --lang=en-US --extension-process --user-agent="Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 OPR/64.0.3417.73 (Edition Campaign 34)" --enable-auto-reload --with-feature:installer-experiment-test=off --with-feature:installer-use-minimal-package=off --ab_tests=DNA-70598-ref:DNA-70598 --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=16747088559082500321 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2512 /prefetch:1C:\Program Files\Opera\64.0.3417.73\opera.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
LOW
Description:
Opera Internet Browser
Exit code:
0
Version:
64.0.3417.73
Modules
Images
c:\program files\opera\64.0.3417.73\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\opera\64.0.3417.73\opera_elf.dll
c:\windows\system32\userenv.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\shell32.dll
Total events
5 710
Read events
3 524
Write events
2 152
Delete events
34

Modification events

(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3120-13213713943555664
Value:
0
(PID) Process:(3744) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3744-13226429732956500
Value:
259
Executable files
73
Suspicious files
192
Text files
1 214
Unknown types
889

Dropped files

PID
Process
Filename
Type
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5E4ABC25-EA0.pma
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\bc363b6c-da0e-41b9-b461-daea98214fa1.tmp
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000028.dbtmp
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFa6776a.TMPtext
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.oldtext
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RFa67aa7.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
60
TCP/UDP connections
61
DNS requests
29
Threats
64

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2884
mshta.exe
GET
200
87.117.235.116:80
http://update.drp.su/v2/soft/?callback=__JSONP__0
GB
text
12.0 Kb
malicious
2884
mshta.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/collect?v=1&tid=UA-68879973-6&cid=321673176.6805235021&t=event&ec=driverpack%20online&ea=application%20opened&el=17.6.12%20online&ul=en&z=3332505574326732&sc=start&cd1=321673176.6805235021&cd2=17.6.12%20Online&cd3=7%20x86&cd4=SP%201&cd5=Windows%207%20Professional%20&cd6=old-ranking
US
image
35 b
whitelisted
2884
mshta.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/collect?v=1&tid=UA-68879973-6&cid=321673176.6805235021&t=event&ec=driverpack%20online&ea=installation%20sorted&el=17.6.12%20online&ul=en&z=49751586239891826&cd1=321673176.6805235021&cd2=17.6.12%20Online&cd3=7%20x86&cd4=SP%201&cd5=Windows%207%20Professional%20&cd6=old-ranking
US
image
35 b
whitelisted
2884
mshta.exe
HEAD
200
95.154.237.19:80
http://download.drp.su/driverpacks/repack/Chipset/Intel/WinAll/Chipset/9.3.2.1020_NEW/Intel-WinAll-Chipset-9.3.2.1020_NEW-drp.zip
GB
malicious
2884
mshta.exe
GET
200
151.139.236.246:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR5iK7tYk9tqQEoeQhZNkKcAol9bgQUjEPEy22YwaechGnr30oNYJY6w%2FsCEQCTkoVAAWVxX5R%2FKI%2FvyZso
US
der
1.62 Kb
whitelisted
2884
mshta.exe
HEAD
200
95.154.237.19:80
http://download.drp.su/driverpacks/repack/Chipset/Intel/WinAll/Chipset/9.3.2.1020_NEW/Intel-WinAll-Chipset-9.3.2.1020_NEW-drp.zip
GB
malicious
2696
driverpack-wget.exe
GET
87.117.239.150:80
http://download.drp.su/driverpacks/repack/Chipset/Intel/WinAll/Chipset/9.3.2.1020_NEW/Intel-WinAll-Chipset-9.3.2.1020_NEW-drp.zip
GB
malicious
2884
mshta.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/collect?v=1&tid=UA-68879973-6&cid=321673176.6805235021&t=event&ec=driverpack%20online&ea=installation%20started&el=17.6.12%20online&ul=en&z=757996158868472&cd1=321673176.6805235021&cd2=17.6.12%20Online&cd3=7%20x86&cd4=SP%201&cd5=Windows%207%20Professional%20&cd6=old-ranking
US
image
35 b
whitelisted
2884
mshta.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/collect?v=1&tid=UA-68879973-6&cid=321673176.6805235021&t=event&ec=driverpack%20online&ea=startpage%20install%20all%20clicked&el=17.6.12%20online&ul=en&z=5547464035900547&cd1=321673176.6805235021&cd2=17.6.12%20Online&cd3=7%20x86&cd4=SP%201&cd5=Windows%207%20Professional%20&cd6=old-ranking
US
image
35 b
whitelisted
2884
mshta.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/collect?v=1&tid=UA-68879973-6&cid=321673176.6805235021&t=event&ec=driverpack%20online&ea=startpage%20screen%20opened&el=17.6.12%20online&ul=en&z=11374836096065766&cd1=321673176.6805235021&cd2=17.6.12%20Online&cd3=7%20x86&cd4=SP%201&cd5=Windows%207%20Professional%20&cd6=old-ranking
US
image
35 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2072
chrome.exe
172.217.22.45:443
accounts.google.com
Google Inc.
US
whitelisted
2072
chrome.exe
172.217.18.99:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2072
chrome.exe
95.154.194.108:80
download-storage.drp.su
iomart Cloud Services Limited.
GB
malicious
2072
chrome.exe
172.217.18.110:443
sb-ssl.google.com
Google Inc.
US
whitelisted
2072
chrome.exe
172.217.22.68:443
www.google.com
Google Inc.
US
whitelisted
2884
mshta.exe
87.250.251.119:443
mc.yandex.ru
YANDEX LLC
RU
whitelisted
2884
mshta.exe
172.217.18.14:80
www.google-analytics.com
Google Inc.
US
whitelisted
2848
driverpack-wget.exe
87.117.239.150:80
download.drp.su
iomart Cloud Services Limited.
GB
malicious
2884
mshta.exe
87.117.235.116:80
update.drp.su
iomart Cloud Services Limited.
GB
unknown
2072
chrome.exe
172.217.22.35:443
ssl.gstatic.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
download.drp.su
  • 88.150.137.207
  • 81.94.205.66
  • 87.117.231.157
  • 87.117.239.148
  • 87.117.239.150
  • 87.117.239.151
  • 81.94.192.167
  • 95.154.237.19
malicious
clientservices.googleapis.com
  • 172.217.18.99
whitelisted
accounts.google.com
  • 172.217.22.45
shared
download-storage.drp.su
  • 95.154.194.108
unknown
www.google.com
  • 172.217.22.68
malicious
sb-ssl.google.com
  • 172.217.18.110
whitelisted
ssl.gstatic.com
  • 172.217.22.35
whitelisted
mc.yandex.ru
  • 87.250.251.119
  • 77.88.21.119
  • 87.250.250.119
  • 93.158.134.119
whitelisted
www.google-analytics.com
  • 172.217.18.14
whitelisted
api.drp.su
  • 87.117.235.118
  • 82.145.55.142
  • 37.9.8.77
  • 178.162.207.44
suspicious

Threats

PID
Process
Class
Message
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2072
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2072
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2072
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2884
mshta.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2884
mshta.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
No debug info