File name:

DE_OfficeStandard2021_VL_64bit.exe

Full analysis: https://app.any.run/tasks/b0528fdf-1bd6-48ee-ae95-9cb12e0c7923
Verdict: Malicious activity
Analysis date: December 05, 2022, 21:09:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9796AF6D8AD32F8ED4B2FF6C6BEFDF7D

SHA1:

33A72F11B2D2CE03BB2EF7842EA0615BC256467C

SHA256:

06D3719C9529D75B1CC7BDF6B6248697E479B2F1363967F5A9294A3C8CCEDCF1

SSDEEP:

49152:b8i8DAyaARmp13kzsC91iMDtM+H75f5fLKrxtdp5OS6u3Gx+RwOoiA3nzpw7R4nC:b8iya13/HMZM275RTKVtYRF+RrFA3nzq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • setup.exe (PID: 3480)
  • SUSPICIOUS

    • Reads the Internet Settings

      • DE_OfficeStandard2021_VL_64bit.exe (PID: 3236)
      • setup.exe (PID: 3480)
    • Reads settings of System Certificates

      • setup.exe (PID: 3480)
      • powershell.exe (PID: 3212)
      • powershell.exe (PID: 788)
    • Using PowerShell to operate with local accounts

      • powershell.exe (PID: 788)
      • powershell.exe (PID: 3212)
    • Adds/modifies Windows certificates

      • setup.exe (PID: 3480)
    • Checks Windows Trust Settings

      • setup.exe (PID: 3480)
    • Reads security settings of Internet Explorer

      • setup.exe (PID: 3480)
  • INFO

    • Process checks computer location settings

      • setup.exe (PID: 3480)
    • Reads Microsoft Office registry keys

      • setup.exe (PID: 3480)
    • Reads the computer name

      • setup.exe (PID: 3480)
      • DE_OfficeStandard2021_VL_64bit.exe (PID: 3236)
    • Checks supported languages

      • setup.exe (PID: 3480)
      • DE_OfficeStandard2021_VL_64bit.exe (PID: 3236)
    • Checks proxy server information

      • setup.exe (PID: 3480)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 3212)
      • powershell.exe (PID: 788)
    • Reads CPU info

      • setup.exe (PID: 3480)
    • Reads product name

      • setup.exe (PID: 3480)
    • Reads Environment values

      • setup.exe (PID: 3480)
    • Reads the CPU's name

      • setup.exe (PID: 3480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2016-Oct-04 15:12:31
Detected languages:
  • English - United States
CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 16.04
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2016 Igor Pavlov
OriginalFilename: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 16.04

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: 0
e_cparhdr: 4
e_minalloc: 0
e_maxalloc: 65535
e_ss: 0
e_sp: 184
e_csum: 0
e_ip: 0
e_cs: 0
e_ovno: 0
e_oemid: 0
e_oeminfo: 0
e_lfanew: 272

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 5
TimeDateStamp: 2016-Oct-04 15:12:31
PointerToSymbolTable: 0
NumberOfSymbols: 0
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
93125
93184
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.63827
.rdata
98304
14356
14848
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.23725
.data
114688
9264
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.87468
.sxdata
126976
4
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_LNK_INFO, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.0203931
.rsrc
131072
2736
3072
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.331

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.75404
744
UNKNOWN
English - United States
RT_ICON
2
3.18403
296
UNKNOWN
English - United States
RT_ICON
97
3.04857
184
UNKNOWN
English - United States
RT_DIALOG
188
2.17822
84
UNKNOWN
English - United States
RT_STRING
207
1.43775
52
UNKNOWN
English - United States
RT_STRING
1 (#2)
2.38262
96
UNKNOWN
English - United States
RT_STRING
1 (#3)
2.37086
34
UNKNOWN
English - United States
RT_GROUP_ICON
1 (#4)
3.45504
700
UNKNOWN
English - United States
RT_VERSION

Imports

KERNEL32.dll
MSVCRT.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start de_officestandard2021_vl_64bit.exe no specs de_officestandard2021_vl_64bit.exe setup.exe powershell.exe no specs powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
856"C:\Users\admin\AppData\Local\Temp\DE_OfficeStandard2021_VL_64bit.exe" C:\Users\admin\AppData\Local\Temp\DE_OfficeStandard2021_VL_64bit.exeExplorer.EXE
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7z Setup SFX
Exit code:
3221226540
Version:
16.04
Modules
Images
c:\users\admin\appdata\local\temp\de_officestandard2021_vl_64bit.exe
c:\windows\system32\ntdll.dll
3236"C:\Users\admin\AppData\Local\Temp\DE_OfficeStandard2021_VL_64bit.exe" C:\Users\admin\AppData\Local\Temp\DE_OfficeStandard2021_VL_64bit.exe
Explorer.EXE
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7z Setup SFX
Version:
16.04
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\de_officestandard2021_vl_64bit.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
3480"C:\Users\admin\AppData\Local\Temp\7zS4ACE2327\setup.exe" /configure Configuration.xmlC:\Users\admin\AppData\Local\Temp\7zS4ACE2327\setup.exe
DE_OfficeStandard2021_VL_64bit.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office
Version:
16.0.14326.20152
Modules
Images
c:\users\admin\appdata\local\temp\7zs4ace2327\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
788"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile "$package = Get-AppxPackage Microsoft.Office.Desktop -allUsers; if (!$package) { $Error.Add(\"Package is not installed\")}; if ($error.Count -eq 0) { Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '1' -Encoding ascii; } else { Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '0' -Encoding ascii; Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateError.scratch' -InputObject $error -Encoding ascii;} "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3212"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile "$package = Get-AppxPackage Microsoft.Office.Desktop -allUsers; if (!$package) { $Error.Add(\"Package is not installed\")}; if ($error.Count -eq 0) { Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '1' -Encoding ascii; } else { Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '0' -Encoding ascii; Out-File -FilePath 'C:\Users\admin\AppData\Local\Temp\Office.ValidateError.scratch' -InputObject $error -Encoding ascii;} "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
Total events
17 643
Read events
17 497
Write events
144
Delete events
2

Modification events

(PID) Process:(3236) DE_OfficeStandard2021_VL_64bit.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3236) DE_OfficeStandard2021_VL_64bit.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3236) DE_OfficeStandard2021_VL_64bit.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3236) DE_OfficeStandard2021_VL_64bit.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3480) setup.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3480) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources
Operation:writeName:UIFallbackLanguages
Value:
x-none
(PID) Process:(3480) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources
Operation:writeName:HelpLanguageTag
Value:
en-US
(PID) Process:(3480) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources
Operation:writeName:PreferredEditingLanguage
Value:
en-US
(PID) Process:(3480) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources
Operation:writeName:PreviousPreferredEditingLanguage
Value:
en-US
(PID) Process:(3480) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources
Operation:writeName:WordChangeInstallLanguage
Value:
No
Executable files
1
Suspicious files
10
Text files
10
Unknown types
5

Dropped files

PID
Process
Filename
Type
788powershell.exeC:\Users\admin\AppData\Local\Temp\ea11wc1f.bbj.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
3236DE_OfficeStandard2021_VL_64bit.exeC:\Users\admin\AppData\Local\Temp\7zS4ACE2327\Configuration.xmltext
MD5:91C1669AE77EB3BF7F3C8CBAD42A4CF4
SHA256:F611A03394F6B70318A7D7E36E02E39827228C8BA32D0247E1FFE053A105AAC2
3236DE_OfficeStandard2021_VL_64bit.exeC:\Users\admin\AppData\Local\Temp\7zS4ACE2327\setup.exeexecutable
MD5:567A4C265F3D910221C2769E5964C2FB
SHA256:6CFC00D087F4D23AC0478CB8DA29935F11A7C70DAE5240DA7455DF48B629356B
3480setup.exeC:\Users\admin\AppData\Local\Microsoft\Office\16.0\setup.exe_Rules.xmlxml
MD5:CC1E2177754466DF40F5F3A0124B8AE8
SHA256:44C557BECEEEA1A673DD9627D7829E3CC90A0D93092999EAE6A6D8EC0C2B193B
788powershell.exeC:\Users\admin\AppData\Local\Temp\yx2vwshg.zvv.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
788powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivedbf
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
788powershell.exeC:\Users\admin\AppData\Local\Temp\Office.ValidateError.scratchtext
MD5:03CA949E980AD3A9B98D66D053ACAE2C
SHA256:BD3B1323C2E19053EED647AC73AED55053789FB505EDD068514810B5149BAA12
788powershell.exeC:\Users\admin\AppData\Local\Temp\Office.ValidateResult.scratchtext
MD5:21438EF4B9AD4FC266B6129A2F60DE29
SHA256:13BF7B3039C63BF5A50491FA3CFD8EB4E699D1BA1436315AEF9CBE5711530354
3212powershell.exeC:\Users\admin\AppData\Local\Temp\yissdlmn.gau.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
3212powershell.exeC:\Users\admin\AppData\Local\Temp\mhl5gflw.i2q.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
18
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3480
setup.exe
HEAD
200
8.253.95.117:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20416.cab
US
whitelisted
3480
setup.exe
HEAD
200
8.253.95.117:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20416.cab
US
whitelisted
868
svchost.exe
HEAD
200
8.253.95.117:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20416.cab
US
whitelisted
868
svchost.exe
HEAD
200
8.253.95.117:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20416.cab
US
binary
1 b
whitelisted
868
svchost.exe
GET
206
8.253.95.117:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20416.cab
US
binary
1 b
whitelisted
868
svchost.exe
GET
200
8.253.95.117:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20416.cab
US
compressed
10.7 Kb
whitelisted
3480
setup.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?90cf87e136323a52
US
compressed
4.70 Kb
whitelisted
3480
setup.exe
GET
200
2.19.126.97:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
DE
der
824 b
whitelisted
3480
setup.exe
GET
200
2.19.126.97:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_2010-07-06.crl
DE
der
557 b
whitelisted
3480
setup.exe
GET
200
2.19.126.97:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
DE
der
555 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1376
svchost.exe
20.50.201.195:443
vortex-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
suspicious
3480
setup.exe
52.113.194.132:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
suspicious
3480
setup.exe
52.109.77.1:443
nexusrules.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
suspicious
3480
setup.exe
8.253.95.117:80
officecdn.microsoft.com
LEVEL3
US
unknown
868
svchost.exe
8.253.95.117:80
officecdn.microsoft.com
LEVEL3
US
unknown
1376
svchost.exe
40.79.189.59:443
vortex-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
JP
whitelisted
3480
setup.exe
52.109.88.33:443
mrodevicemgr.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
suspicious
3480
setup.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
suspicious
3480
setup.exe
104.79.89.142:80
www.microsoft.com
AKAMAI-AS
DE
malicious
3480
setup.exe
2.19.126.97:80
crl.microsoft.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
nexusrules.officeapps.live.com
  • 52.109.77.1
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
vortex-win.data.microsoft.com
  • 20.50.201.195
  • 40.79.189.59
  • 20.189.173.4
whitelisted
mrodevicemgr.officeapps.live.com
  • 52.109.88.33
whitelisted
officecdn.microsoft.com
  • 8.253.95.117
  • 8.253.95.116
  • 8.248.113.252
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
crl.microsoft.com
  • 2.19.126.97
  • 2.19.126.87
whitelisted
www.microsoft.com
  • 104.79.89.142
whitelisted
nexus.officeapps.live.com
  • 20.231.69.218
whitelisted

Threats

No threats detected
No debug info