URL:

http://dwrapper-prod.herokuapp.com/bin/watcher.html

Full analysis: https://app.any.run/tasks/c153afb9-be73-491c-acac-f73e264bd4f4
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 15, 2024, 04:45:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
qrcode
loader
Indicators:
MD5:

096B85B7277E06FBB84C90C4496AE454

SHA1:

71007796746C90C892CC1E0DC1C59984E343810F

SHA256:

7ACD2B531F3E0F15F70B72F4C401F6080F91BE363F35EAB01EBAA33EB201507B

SSDEEP:

3:N1KaSMpVYNKRG3J:CaHMNKA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • DriverPack-17-Online.exe (PID: 2744)
      • csc.exe (PID: 3484)
      • mshta.exe (PID: 2620)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 3112)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 3152)
    • Starts Visual C# compiler

      • powershell.exe (PID: 3112)
    • Actions looks like stealing of personal data

      • mshta.exe (PID: 2620)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • DriverPack-17-Online.exe (PID: 2744)
      • csc.exe (PID: 3484)
      • mshta.exe (PID: 2620)
    • Creates a software uninstall entry

      • DriverPack-17-Online.exe (PID: 2744)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • DriverPack-17-Online.exe (PID: 2744)
    • The process creates files with name similar to system file names

      • DriverPack-17-Online.exe (PID: 2744)
    • Starts CMD.EXE for commands execution

      • DriverPack-17-Online.exe (PID: 2744)
      • mshta.exe (PID: 2620)
    • Executing commands from a ".bat" file

      • DriverPack-17-Online.exe (PID: 2744)
    • Reads the Internet Settings

      • cmd.exe (PID: 1232)
      • mshta.exe (PID: 2620)
    • The process hides Powershell's copyright startup banner

      • cmd.exe (PID: 3152)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 3152)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 3152)
    • Uses RUNDLL32.EXE to load library

      • mshta.exe (PID: 2620)
    • The process hide an interactive prompt from the user

      • cmd.exe (PID: 3152)
    • Get information on the list of running processes

      • cmd.exe (PID: 3152)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 3152)
    • Adds/modifies Windows certificates

      • mshta.exe (PID: 2620)
    • Uses .NET C# to load dll

      • powershell.exe (PID: 3112)
    • Executing commands from ".cmd" file

      • mshta.exe (PID: 2620)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 2032)
    • Changes internet zones settings

      • mshta.exe (PID: 2620)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • cmd.exe (PID: 1424)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2268)
    • Process drops legitimate windows executable

      • mshta.exe (PID: 2620)
    • Process requests binary or script from the Internet

      • mshta.exe (PID: 2620)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 2268)
  • INFO

    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 3668)
    • Application launched itself

      • iexplore.exe (PID: 3668)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 3668)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3668)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3668)
    • Reads the computer name

      • DriverPack-17-Online.exe (PID: 2744)
      • driverpack-wget.exe (PID: 3372)
      • driverpack-wget.exe (PID: 2476)
      • driverpack-wget.exe (PID: 3008)
      • driverpack-wget.exe (PID: 3860)
      • driverpack-wget.exe (PID: 2884)
      • driverpack-wget.exe (PID: 1824)
      • driverpack-wget.exe (PID: 2184)
      • driverpack-wget.exe (PID: 1496)
      • driverpack-wget.exe (PID: 2576)
      • driverpack-wget.exe (PID: 2688)
      • driverpack-wget.exe (PID: 3516)
      • driverpack-wget.exe (PID: 3700)
      • driverpack-wget.exe (PID: 2440)
      • driverpack-wget.exe (PID: 3644)
      • driverpack-wget.exe (PID: 2476)
      • driverpack-wget.exe (PID: 2732)
      • driverpack-wget.exe (PID: 2168)
      • driverpack-wget.exe (PID: 3580)
      • driverpack-wget.exe (PID: 848)
      • driverpack-wget.exe (PID: 2740)
      • driverpack-wget.exe (PID: 2104)
      • driverpack-wget.exe (PID: 4028)
      • driverpack-wget.exe (PID: 3820)
      • driverpack-wget.exe (PID: 2208)
      • driverpack-wget.exe (PID: 3584)
      • driverpack-wget.exe (PID: 1824)
      • driverpack-wget.exe (PID: 3964)
      • driverpack-wget.exe (PID: 3196)
      • driverpack-wget.exe (PID: 3624)
      • driverpack-wget.exe (PID: 2380)
      • driverpack-wget.exe (PID: 4020)
      • driverpack-wget.exe (PID: 2312)
      • driverpack-wget.exe (PID: 296)
      • driverpack-wget.exe (PID: 2960)
      • driverpack-wget.exe (PID: 2532)
      • driverpack-wget.exe (PID: 848)
      • driverpack-wget.exe (PID: 4012)
    • Checks supported languages

      • DriverPack-17-Online.exe (PID: 2744)
      • csc.exe (PID: 3484)
      • driverpack-wget.exe (PID: 3372)
      • cvtres.exe (PID: 3456)
      • driverpack-wget.exe (PID: 3008)
      • driverpack-wget.exe (PID: 2476)
      • driverpack-wget.exe (PID: 3860)
      • driverpack-wget.exe (PID: 1824)
      • driverpack-wget.exe (PID: 2884)
      • driverpack-wget.exe (PID: 2184)
      • driverpack-wget.exe (PID: 2576)
      • driverpack-wget.exe (PID: 1496)
      • driverpack-wget.exe (PID: 2688)
      • driverpack-wget.exe (PID: 3516)
      • driverpack-wget.exe (PID: 3700)
      • driverpack-wget.exe (PID: 2476)
      • driverpack-wget.exe (PID: 3644)
      • driverpack-wget.exe (PID: 2440)
      • driverpack-wget.exe (PID: 2168)
      • driverpack-wget.exe (PID: 3580)
      • driverpack-wget.exe (PID: 848)
      • driverpack-wget.exe (PID: 2732)
      • driverpack-wget.exe (PID: 2740)
      • driverpack-wget.exe (PID: 2104)
      • driverpack-wget.exe (PID: 4028)
      • driverpack-wget.exe (PID: 1824)
      • driverpack-wget.exe (PID: 3820)
      • driverpack-wget.exe (PID: 2208)
      • driverpack-wget.exe (PID: 3196)
      • driverpack-wget.exe (PID: 3584)
      • driverpack-wget.exe (PID: 2312)
      • driverpack-wget.exe (PID: 3964)
      • driverpack-wget.exe (PID: 4012)
      • driverpack-wget.exe (PID: 2380)
      • driverpack-wget.exe (PID: 4020)
      • driverpack-wget.exe (PID: 3624)
      • driverpack-wget.exe (PID: 296)
      • driverpack-wget.exe (PID: 848)
      • driverpack-wget.exe (PID: 2960)
      • driverpack-wget.exe (PID: 2532)
      • chcp.com (PID: 2080)
    • Create files in a temporary directory

      • DriverPack-17-Online.exe (PID: 2744)
      • cvtres.exe (PID: 3456)
      • csc.exe (PID: 3484)
    • Creates files in the program directory

      • DriverPack-17-Online.exe (PID: 2744)
      • mshta.exe (PID: 2620)
      • driverpack-wget.exe (PID: 3372)
      • driverpack-wget.exe (PID: 3860)
      • driverpack-wget.exe (PID: 3008)
      • driverpack-wget.exe (PID: 2476)
      • driverpack-wget.exe (PID: 2184)
      • driverpack-wget.exe (PID: 2884)
      • driverpack-wget.exe (PID: 2688)
      • driverpack-wget.exe (PID: 2576)
      • driverpack-wget.exe (PID: 1496)
      • driverpack-wget.exe (PID: 1824)
      • driverpack-wget.exe (PID: 3516)
      • driverpack-wget.exe (PID: 3700)
      • driverpack-wget.exe (PID: 2168)
      • driverpack-wget.exe (PID: 3644)
      • driverpack-wget.exe (PID: 2476)
      • driverpack-wget.exe (PID: 2440)
      • driverpack-wget.exe (PID: 2104)
      • driverpack-wget.exe (PID: 2740)
      • driverpack-wget.exe (PID: 4028)
      • driverpack-wget.exe (PID: 1824)
      • driverpack-wget.exe (PID: 3964)
      • driverpack-wget.exe (PID: 3820)
      • driverpack-wget.exe (PID: 2208)
      • driverpack-wget.exe (PID: 3196)
      • driverpack-wget.exe (PID: 3584)
      • driverpack-wget.exe (PID: 2380)
      • driverpack-wget.exe (PID: 2312)
      • driverpack-wget.exe (PID: 4020)
      • driverpack-wget.exe (PID: 3624)
      • driverpack-wget.exe (PID: 4012)
      • driverpack-wget.exe (PID: 296)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 2620)
    • Checks proxy server information

      • mshta.exe (PID: 2620)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 3484)
      • cvtres.exe (PID: 3456)
    • Creates files or folders in the user directory

      • driverpack-wget.exe (PID: 3372)
      • driverpack-wget.exe (PID: 2476)
      • driverpack-wget.exe (PID: 3008)
      • driverpack-wget.exe (PID: 2884)
      • driverpack-wget.exe (PID: 2184)
      • driverpack-wget.exe (PID: 1824)
      • driverpack-wget.exe (PID: 1496)
      • driverpack-wget.exe (PID: 3860)
      • driverpack-wget.exe (PID: 2688)
      • driverpack-wget.exe (PID: 3516)
      • driverpack-wget.exe (PID: 3700)
      • driverpack-wget.exe (PID: 2576)
      • driverpack-wget.exe (PID: 3644)
      • driverpack-wget.exe (PID: 2440)
      • driverpack-wget.exe (PID: 2168)
      • driverpack-wget.exe (PID: 2476)
      • driverpack-wget.exe (PID: 3580)
      • driverpack-wget.exe (PID: 848)
      • driverpack-wget.exe (PID: 2732)
      • driverpack-wget.exe (PID: 2104)
      • driverpack-wget.exe (PID: 2740)
      • driverpack-wget.exe (PID: 4028)
      • driverpack-wget.exe (PID: 3820)
      • driverpack-wget.exe (PID: 2208)
      • driverpack-wget.exe (PID: 3196)
      • driverpack-wget.exe (PID: 3584)
      • driverpack-wget.exe (PID: 1824)
      • driverpack-wget.exe (PID: 3964)
      • driverpack-wget.exe (PID: 2312)
      • driverpack-wget.exe (PID: 2380)
      • driverpack-wget.exe (PID: 4020)
      • driverpack-wget.exe (PID: 4012)
      • driverpack-wget.exe (PID: 3624)
      • driverpack-wget.exe (PID: 296)
      • driverpack-wget.exe (PID: 2960)
      • driverpack-wget.exe (PID: 848)
      • driverpack-wget.exe (PID: 2532)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
182
Monitored processes
93
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe driverpack-17-online.exe no specs driverpack-17-online.exe cmd.exe no specs mshta.exe cmd.exe no specs powershell.exe no specs rundll32.exe no specs csc.exe cvtres.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs driverpack-wget.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs driverpack-wget.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs chcp.com no specs netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120"C:\Windows\System32\cmd.exe" /c ""tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Program Files\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/CONTINUOUS-1.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_44061.log" & echo DONE > "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_finished_44061.txt""C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
296"tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Program Files\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/EXPERT-SETTINGS-1.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_80611.log" C:\Program Files\DriverPack\Tools\driverpack-wget.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\driverpack\tools\driverpack-wget.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
532"C:\Windows\System32\cmd.exe" /c ""tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Program Files\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/EXPERT-PROGRAMS_CHECKBOX_USED-2.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_8455.log" & echo DONE > "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_finished_8455.txt""C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
572rundll32 kernel32,SleepC:\Windows\System32\rundll32.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
848"tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Program Files\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/EXPERT-DRIVERS-2.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_78305.log" C:\Program Files\DriverPack\Tools\driverpack-wget.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\driverpack\tools\driverpack-wget.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
848"tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Program Files\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/TEAM-PROOF-1.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_59995.log" C:\Program Files\DriverPack\Tools\driverpack-wget.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\driverpack\tools\driverpack-wget.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1168"C:\Windows\System32\cmd.exe" /c ""tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Program Files\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/ANTIVIRUS-2.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_81659.log" & echo DONE > "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_finished_81659.txt""C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1232C:\Windows\system32\cmd.exe /c ""C:\Program Files\DriverPack\start.bat" "DriverPack-17-Online.exe""C:\Windows\System32\cmd.exeDriverPack-17-Online.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1388"C:\Windows\System32\cmd.exe" /c ""tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Program Files\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/ANTIVIRUS-3.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_88178.log" & echo DONE > "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_finished_88178.txt""C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1424"C:\Windows\System32\cmd.exe" /c "netsh advfirewall firewall delete rule name="DriverPack aria2c.exe" || echo Done & call echo Done %^errorLevel% > "C:\Users\admin\AppData\Roaming\DRPSu\temp\run_command_8341.txt""C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
56 572
Read events
55 838
Write events
685
Delete events
49

Modification events

(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31088585
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31088585
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
16
Suspicious files
109
Text files
618
Unknown types
40

Dropped files

PID
Process
Filename
Type
3972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\matomo[1].gifimage
MD5:DF3E567D6F16D040326C7A0EA29A4F41
SHA256:548F2D6F4D0D820C6C5FFBEFFCBD7F0E73193E2932EEFE542ACCC84762DEEC87
3972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\manual_download[1].htmhtml
MD5:EDC5C3BC0D5F7A2234D8DEFFCA49A3DE
SHA256:AF7FA29334ECD36D1A287E542FA01F7970C12AD669381620B3F77A0B197758E6
3972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\2[1].jstext
MD5:22D3D08CBEC1245327396FAA5B60725A
SHA256:923CBFF9E47CA64E292A8932A13ED11F9E4A488DC20775181B010231F15E3E26
3972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\1[1].jstext
MD5:B2AEEF062DB55284085A863B0FCF48A5
SHA256:C79C9F0F44CA9EF9E84346BB88C12187C3F0DDE18F6C8FA83A54D1D89CBB0CB7
3972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\statistics[1].jstext
MD5:0701E8CE6920DA0050B219769314E144
SHA256:5D53ECD246441E19CD7B305749C822132476170938E5B7A673856B1FD29708BF
3668iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[2].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
3668iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\imagestore\f7ruq93\imagestore.datbinary
MD5:0591605D230E4B3C95D7FCEC14BA9860
SHA256:56A3622E14991EDD1FBD714C2A00F5CB7B0862A3D2891E3419E217FF6CE200E3
3972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\3[1].jstext
MD5:CC9E168614A8D567352E24F970CA21E0
SHA256:578820B83CD0244FFC068665C531A8C7D633F890A927A682A1708B84B7A08702
3972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\script[1].jstext
MD5:5E3199E1E9AB11EF8DB27BDC821ECCDC
SHA256:DDF24F928593CF87E0DB0744F8456761089140766A23768D9106BB73EFBD0515
3972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\style[1].csstext
MD5:CE40483E494B033AA4A204080ABB54DA
SHA256:1FC4501622BAFC4560C28442D01F708579F26AFBB88229328B2CE7E83A2D36A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
311
TCP/UDP connections
137
DNS requests
33
Threats
164

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/watcher.html
IE
html
3.79 Kb
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/client_ip.js
IE
text
31 b
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js
IE
text
1.76 Kb
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.js
IE
text
2.48 Kb
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.js
IE
text
557 b
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js
IE
text
1.13 Kb
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.js
IE
text
4.97 Kb
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/script.js
IE
text
7.48 Kb
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/statistics.js
IE
text
7.75 Kb
unknown
3972
iexplore.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/manual_download.html
IE
html
1.42 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3972
iexplore.exe
46.137.15.86:80
dwrapper-prod.herokuapp.com
AMAZON-02
IE
unknown
3972
iexplore.exe
18.195.235.189:80
exampledd.matomo.cloud
AMAZON-02
DE
unknown
3668
iexplore.exe
46.137.15.86:80
dwrapper-prod.herokuapp.com
AMAZON-02
IE
unknown
3668
iexplore.exe
184.86.251.22:443
www.bing.com
Akamai International B.V.
DE
unknown
3668
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
3668
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2408
iexplore.exe
87.117.239.150:443
dl.driverpack.io
Iomart Cloud Services Limited
GB
unknown

DNS requests

Domain
IP
Reputation
dwrapper-prod.herokuapp.com
  • 46.137.15.86
  • 54.73.53.134
  • 54.220.192.176
unknown
exampledd.matomo.cloud
  • 18.195.235.189
  • 18.157.122.248
  • 3.126.133.169
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 184.86.251.22
  • 184.86.251.19
  • 184.86.251.27
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
dl.driverpack.io
  • 87.117.239.150
  • 87.117.239.151
  • 81.94.192.167
  • 87.117.231.157
unknown
ocsp2.globalsign.com
  • 151.101.2.133
  • 151.101.194.133
  • 151.101.66.133
  • 151.101.130.133
whitelisted
ocsp.globalsign.com
  • 151.101.2.133
  • 151.101.130.133
  • 151.101.66.133
  • 151.101.194.133
whitelisted
crl.globalsign.com
  • 151.101.130.133
  • 151.101.66.133
  • 151.101.194.133
  • 151.101.2.133
whitelisted

Threats

PID
Process
Class
Message
3972
iexplore.exe
A Network Trojan was detected
SUSPICIOUS [ANY.RUN] VBS is used to run Shell
3972
iexplore.exe
A Network Trojan was detected
SUSPICIOUS [ANY.RUN] VBS is used to run Shell
3972
iexplore.exe
A Network Trojan was detected
SUSPICIOUS [ANY.RUN] VBS is used to run Shell
3972
iexplore.exe
A Network Trojan was detected
SUSPICIOUS [ANY.RUN] VBS is used to run Shell
3972
iexplore.exe
A Network Trojan was detected
SUSPICIOUS [ANY.RUN] VBS is used to run Shell
1080
svchost.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to DriverPack Domain ( .drp .su)
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
1080
svchost.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP DriverPack Domain in DNS Query
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
1080
svchost.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to DriverPack Domain ( .drp .su)
5 ETPRO signatures available at the full report
No debug info