6ec6c457...2a18 | VTI
Try VMRay Analyzer
VTI SCORE: 98/100
Dynamic Analysis Report
Classification: Dropper, Pua, Spyware, Downloader

6ec6c457f112de97ece2f7b9c654ffe165ee1fa6bee52f0575dad1426c552a18 (SHA256)

DriverPack-17-Online.exe

Windows Exe (x86-32)

Created at 2018-11-07 11:27:00

Notifications (2/2)

The maximum number of reputation file hash requests (20 per analysis) was exceeded. As a result, the reputation status could not be queried for all file hashes. In order to get the reputation status for all file hashes, please increase the 'Max File Hash Requests' setting in the system configurations.

The overall sleep time of all monitored processes was truncated from "10 minutes" to "10 seconds" to reveal dormant functionality.

Severity Category Operation Classification
4/5
Process Executes encoded PowerShell script -
  • Executes encoded PowerShell script to possibly hide malicious payload.
4/5
File System Known malicious file Downloader
3/5
OS Modifies system configuration -
2/5
Anti Analysis Tries to detect debugger -
2/5
File System Known suspicious file Pua
2/5
YARA YARA match -
  • Rule "PowerShell_Registry_Commands" from ruleset "Generic" has matched for "C:\Users\CIIHMN~1\AppData\Local\Temp\7ZipSfx.000\bin\prepare.js"
1/5
Process Creates process with hidden window -
  • The process "C:\Windows\System32\cmd.exe" starts with hidden window.
  • The process ""C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\CIiHmnxMn6Ps\AppData\Local\Temp\22aputxk.cmdline"" starts with hidden window.
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Network Checks Internet connection -
1/5
Process Creates system object -
  • Creates mutex with name "Global\PowerShell_CommandAnalysis_Lock_S-1-5-21-1462094071-1423818996-289466292-1000".
1/5
Information Stealing Reads system data Spyware
1/5
File System Modifies operating system directory -
  • Creates file "C:\Windows\System32\spp\store\2.0\data.dat.tmp" in the OS directory.
  • Creates file "C:\Windows\System32\spp\store\2.0\data.dat.bak" in the OS directory.
  • Creates file "C:\Windows\System32\spp\store\2.0\data.dat" in the OS directory.
1/5
Network Downloads data Downloader
1/5
Network Connects to HTTP server -
1/5
PE The PE file was created with a packer -
  • File "\Users\CIiHmnxMn6Ps\Desktop\DriverPack-17-Online.exe" is packed with "Armadillo v1.71".
1/5
PE Drops PE file Dropper
1/5
PE Executes dropped PE file -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image