Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
270s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04/07/2023, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
DriverPackCloud.exe
Resource
win7-20230703-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
DriverPackCloud.exe
Resource
win10v2004-20230703-en
3 signatures
150 seconds
General
-
Target
DriverPackCloud.exe
-
Size
76KB
-
MD5
33c1fa40a14df3a5fadab43d9de446be
-
SHA1
e72148ad3818ab3acd88fa518262b0909b74bed4
-
SHA256
104dffbf8470d7b2ad476ca261f0af2d41ae63a8373fb457c75807a8da6cf3a1
-
SHA512
b9c4c6465cc4c96816e2af8c875af83b3bc90684cec95bd1d7c163ab7f4492faf4c827070b2a2d776cc0fa20b47d4d258672338fd11c0368138037f6eeb07354
-
SSDEEP
1536:4TgSFOJu2aF0gqqcZudzc+d4DBTiE9M3m/LiRIJi4d:/Zu2Vgc0B4DBTiEhiI7d
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1528 2416 DriverPackCloud.exe 29 PID 2416 wrote to memory of 1528 2416 DriverPackCloud.exe 29 PID 2416 wrote to memory of 1528 2416 DriverPackCloud.exe 29 PID 2416 wrote to memory of 1528 2416 DriverPackCloud.exe 29 PID 2416 wrote to memory of 2360 2416 DriverPackCloud.exe 31 PID 2416 wrote to memory of 2360 2416 DriverPackCloud.exe 31 PID 2416 wrote to memory of 2360 2416 DriverPackCloud.exe 31 PID 2416 wrote to memory of 2360 2416 DriverPackCloud.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\DriverPackCloud.exe"C:\Users\Admin\AppData\Local\Temp\DriverPackCloud.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Tools\init.cmd "C:\Users\Admin\AppData\Local\Temp\bin\Tools\run.hta"2⤵PID:1528
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\bin\Tools\run.hta"2⤵
- Modifies Internet Explorer settings
PID:2360
-