File name:

anytoiso_setup.exe

Full analysis: https://app.any.run/tasks/1a506788-57c0-4bff-9cc6-55523c7fea02
Verdict: Malicious activity
Analysis date: February 18, 2024, 12:58:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

490128AD8C2FE36A4B3430860E61FE30

SHA1:

14BD1AA15559AC295D37BA47AA4D612E256FE85B

SHA256:

10C72764F6D4D5B571A45CF42034CBB6EAF7C2921BEC1F8B52C3540D596C3987

SSDEEP:

98304:5yUY9byZ6CCmn8QxKM8QXtiHZO35EHmlxS+HADCWqWg0TUSftPAGlXIPceW74T/L:5kHmTSf1xd/0MBrD+laJcZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • anytoiso_setup.exe (PID: 3916)
      • anytoiso_setup.exe (PID: 3800)
      • anytoiso_setup.tmp (PID: 3224)
      • unzip.exe (PID: 3444)
    • Registers / Runs the DLL via REGSVR32.EXE

      • anytoiso_setup.tmp (PID: 3224)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • anytoiso_setup.exe (PID: 3916)
      • anytoiso_setup.tmp (PID: 3224)
      • unzip.exe (PID: 3444)
      • anytoiso_setup.exe (PID: 3800)
    • Process drops legitimate windows executable

      • anytoiso_setup.exe (PID: 3916)
      • unzip.exe (PID: 3444)
    • Reads the Windows owner or organization settings

      • anytoiso_setup.exe (PID: 3916)
      • anytoiso_setup.tmp (PID: 3224)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3932)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 1484)
    • The process drops C-runtime libraries

      • unzip.exe (PID: 3444)
  • INFO

    • Reads the computer name

      • anytoiso_setup.exe (PID: 3916)
      • anytoiso_setup.tmp (PID: 2804)
      • anytoiso_setup.tmp (PID: 3224)
    • Checks supported languages

      • anytoiso_setup.exe (PID: 3916)
      • anytoiso_setup.exe (PID: 3800)
      • anytoiso_setup.tmp (PID: 2804)
      • unzip.exe (PID: 3444)
      • anytoiso_setup.tmp (PID: 3224)
    • Creates files in the program directory

      • anytoiso_setup.tmp (PID: 3224)
      • unzip.exe (PID: 3444)
    • Reads the machine GUID from the registry

      • anytoiso_setup.exe (PID: 3916)
    • Creates files or folders in the user directory

      • anytoiso_setup.exe (PID: 3916)
    • Reads Environment values

      • anytoiso_setup.exe (PID: 3916)
    • Create files in a temporary directory

      • anytoiso_setup.exe (PID: 3800)
      • anytoiso_setup.tmp (PID: 3224)
    • Creates a software uninstall entry

      • anytoiso_setup.tmp (PID: 3224)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:04:23 07:52:46+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.28
CodeSize: 1559040
InitializedDataSize: 648704
UninitializedDataSize: -
EntryPoint: 0x1260c8
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: anytoiso_setup
FileDescription: anytoiso_setup Installer
FileVersion: 1.0.0
InternalName: anytoiso_setup
LegalCopyright: Copyright (C) 2023 anytoiso_setup
OriginalFileName: anytoiso_setup.exe
ProductName: anytoiso_setup
ProductVersion: 1.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
9
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start anytoiso_setup.exe msiexec.exe no specs vssvc.exe no specs powershell.exe no specs anytoiso_setup.tmp no specs anytoiso_setup.exe anytoiso_setup.tmp regsvr32.exe no specs unzip.exe

Process information

PID
CMD
Path
Indicators
Parent process
1484"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\AnyToISO\anyshellext_x86.dll"C:\Windows\System32\regsvr32.exeanytoiso_setup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2804"C:\Users\admin\AppData\Local\Temp\is-I7AIQ.tmp\anytoiso_setup.tmp" /SL5="$F0170,10319616,857088,C:\Program Files\anytoiso_setup\anytoiso_setup\anytoiso_setup.exe" C:\Users\admin\AppData\Local\Temp\is-I7AIQ.tmp\anytoiso_setup.tmpanytoiso_setup.exe
User:
admin
Company:
CrystalIDEA Software
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-i7aiq.tmp\anytoiso_setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2840"C:\Windows\system32\msiexec.exe" /i "C:\Users\admin\AppData\Roaming\anytoiso_setup\anytoiso_setup 1.0.0\install\C9ABEC1\anytoiso_setup.msi" AI_SETUPEXEPATH=C:\Users\admin\AppData\Local\Temp\anytoiso_setup.exe SETUPEXEDIR=C:\Users\admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1708259568 " C:\Windows\System32\msiexec.exeanytoiso_setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2904"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwADsAIABSAGUAbQBvAHYAZQAtAEkAdABlAG0AIAAtAFAAYQB0AGgAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABXAGkAbgBkAG8AdwBzAEEAYwB0AGkAdgBlAFMAZQByAHYAaQBjAGUAcwBcAFAAYQB0AGMAaAAuAGUAeABlACIAIAAtAEYAbwByAGMAZQA=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePatch.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3224"C:\Users\admin\AppData\Local\Temp\is-18P2J.tmp\anytoiso_setup.tmp" /SL5="$1E01BC,10319616,857088,C:\Program Files\anytoiso_setup\anytoiso_setup\anytoiso_setup.exe" /SPAWNWND=$170158 /NOTIFYWND=$F0170 C:\Users\admin\AppData\Local\Temp\is-18P2J.tmp\anytoiso_setup.tmp
anytoiso_setup.exe
User:
admin
Company:
CrystalIDEA Software
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-18p2j.tmp\anytoiso_setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3444"C:\Users\admin\AppData\Local\Temp\is-BQF6I.tmp\unzip.exe" -o "C:\Users\admin\AppData\Local\Temp\is-BQF6I.tmp\qt_redist_x86.zip" -d "C:\Program Files\AnyToISO"C:\Users\admin\AppData\Local\Temp\is-BQF6I.tmp\unzip.exe
anytoiso_setup.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\is-bqf6i.tmp\unzip.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3800"C:\Program Files\anytoiso_setup\anytoiso_setup\anytoiso_setup.exe" /SPAWNWND=$170158 /NOTIFYWND=$F0170 C:\Program Files\anytoiso_setup\anytoiso_setup\anytoiso_setup.exe
anytoiso_setup.tmp
User:
admin
Company:
CrystalIDEA Software
Integrity Level:
HIGH
Description:
AnyToISO Setup
Exit code:
0
Version:
AnyToISO
Modules
Images
c:\program files\anytoiso_setup\anytoiso_setup\anytoiso_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3916"C:\Users\admin\AppData\Local\Temp\anytoiso_setup.exe" C:\Users\admin\AppData\Local\Temp\anytoiso_setup.exe
explorer.exe
User:
admin
Company:
anytoiso_setup
Integrity Level:
MEDIUM
Description:
anytoiso_setup Installer
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\anytoiso_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3932C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
5 386
Read events
5 238
Write events
148
Delete events
0

Modification events

(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000CA4EFB3D6A62DA015C0F0000E80C0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000CA4EFB3D6A62DA015C0F00001C090000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000CA4EFB3D6A62DA015C0F000078000000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000CA4EFB3D6A62DA015C0F0000600F0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Leave)
Value:
4000000000000000CA4EFB3D6A62DA015C0F00001C090000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Leave)
Value:
400000000000000024B1FD3D6A62DA015C0F000078000000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Leave)
Value:
400000000000000024B1FD3D6A62DA015C0F0000E80C0000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Leave)
Value:
400000000000000024B1FD3D6A62DA015C0F0000600F0000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
Operation:writeName:PROVIDER_BEGINPREPARE (Enter)
Value:
40000000000000009416683F6A62DA015C0F0000600F0000010400000100000000000000000000003333CDF2BB21A9479FBE1C8488110A950000000000000000
(PID) Process:(3932) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
Operation:writeName:PROVIDER_BEGINPREPARE (Leave)
Value:
40000000000000009416683F6A62DA015C0F0000600F0000010400000000000000000000000000003333CDF2BB21A9479FBE1C8488110A950000000000000000
Executable files
73
Suspicious files
5
Text files
75
Unknown types
4

Dropped files

PID
Process
Filename
Type
3916anytoiso_setup.exeC:\Users\admin\AppData\Roaming\anytoiso_setup\anytoiso_setup 1.0.0\install\holder0.aiph
MD5:
SHA256:
3916anytoiso_setup.exeC:\Users\admin\AppData\Roaming\anytoiso_setup\anytoiso_setup 1.0.0\install\C9ABEC1\anytoiso_setup.msiexecutable
MD5:3E25368D5BD27E6F2E69ACE42D554794
SHA256:6271FDB76F4E3115F65A335CE9C3F34CEB51CFC5974E38C82213E6CFA8B7F85F
3916anytoiso_setup.exeC:\Users\admin\AppData\Roaming\anytoiso_setup\anytoiso_setup 1.0.0\install\C9ABEC1\anytoiso_setup.exeexecutable
MD5:ADA8E39EFBE48CEC5FA440576EFDC834
SHA256:EA2A607714343AA54DF3501FB2E42A6BDD5E5629F18348F99A90937061A00DED
3916anytoiso_setup.exeC:\Users\admin\AppData\Roaming\anytoiso_setup\anytoiso_setup 1.0.0\install\C9ABEC1\LocalAppDataFolder\WindowsActiveServices\Patch.exeexecutable
MD5:2AFBB4562F46E981BEAE497935002D3C
SHA256:7B949EC5F73DFF9E83D9C5E8995E025940F1ED6D3B07C27923D9321CA9A42EAD
3916anytoiso_setup.exeC:\Users\admin\AppData\Roaming\anytoiso_setup\anytoiso_setup 1.0.0\install\decoder.dllexecutable
MD5:2CA6D4ED5DD15FB7934C87E857F5EBFC
SHA256:39412AACDCDDC4B2B3CFEB126456EDB125CE8CADB131CA5C23C031DB4431C5FC
3916anytoiso_setup.exeC:\Users\admin\AppData\Local\Temp\MSIFB48.tmpexecutable
MD5:0981D5C068A9C33F4E8110F81FFBB92E
SHA256:B3F5E10FB1B7352A6DBBCBB10ED605A8FDA24F3F9C31F954835BD5A41EB6EA68
3800anytoiso_setup.exeC:\Users\admin\AppData\Local\Temp\is-18P2J.tmp\anytoiso_setup.tmpexecutable
MD5:D7907C5D4C9B358AA951A8881FF56AD2
SHA256:8497ACC7371F8532D8A6BDA75E12B24C2BB4520E95D7E71C8DA14193A64A9BC9
3224anytoiso_setup.tmpC:\Program Files\AnyToISO\is-TCE1M.tmpexecutable
MD5:D7907C5D4C9B358AA951A8881FF56AD2
SHA256:8497ACC7371F8532D8A6BDA75E12B24C2BB4520E95D7E71C8DA14193A64A9BC9
3224anytoiso_setup.tmpC:\Program Files\AnyToISO\unins000.exeexecutable
MD5:D7907C5D4C9B358AA951A8881FF56AD2
SHA256:8497ACC7371F8532D8A6BDA75E12B24C2BB4520E95D7E71C8DA14193A64A9BC9
3224anytoiso_setup.tmpC:\Users\admin\AppData\Local\Temp\is-BQF6I.tmp\is-I7KLI.tmpexecutable
MD5:0CA0F8EFAEBE3636976165528D633560
SHA256:39DD69F54B934C34E84FE19747A5D3AD118B54D19158CDF641CA6F8B8D40FAE3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info