File name:

CCSPClientInstallationService.msi

Full analysis: https://app.any.run/tasks/b44c5379-5c9f-4661-b407-6291fba21bf5
Verdict: Malicious activity
Analysis date: April 01, 2020, 16:24:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: CCSP Client Installation Service, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: CCSP Client Installation Service, Author: InstallShield, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2011 - Professional Edition 17, Last Saved Time/Date: Tue Feb 19 22:54:06 2019, Create Time/Date: Tue Feb 19 22:54:06 2019, Last Printed: Tue Feb 19 22:54:06 2019, Revision Number: {ACE5BD2D-D5DE-447F-A12B-CF7A27625F00}, Code page: 1252, Template: Intel;1033
MD5:

BF15784A9FD7967A6D628630B0D78398

SHA1:

A11561AAA7877988AB713289390242B006D3402A

SHA256:

173D1A6446FADEC1273EA616826259DD37FC734A860A56B5212D1F6F0C9878AE

SSDEEP:

49152:d2FytYyTfR1wHeBjP6iFPsxYYkgmALLmGPVNNBF3/q8PHhVr5jHFAWi/HSNs:8ytYyTfR1qu6GPs7LlNXq8PHhVNjH+WQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 3716)
      • rundll32.exe (PID: 3800)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 772)
      • msiexec.exe (PID: 3876)
      • rundll32.exe (PID: 3800)
      • rundll32.exe (PID: 3716)
    • Executed as Windows Service

      • vssvc.exe (PID: 2852)
    • Uses RUNDLL32.EXE to load library

      • MsiExec.exe (PID: 2152)
  • INFO

    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 440)
      • MsiExec.exe (PID: 2152)
    • Application launched itself

      • msiexec.exe (PID: 772)
      • chrome.exe (PID: 3852)
    • Searches for installed software

      • msiexec.exe (PID: 772)
    • Manual execution by user

      • chrome.exe (PID: 3852)
    • Reads the hosts file

      • chrome.exe (PID: 3852)
      • chrome.exe (PID: 3004)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2852)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (84.2)
.mst | Windows SDK Setup Transform Script (9.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Characters: -
LastModifiedBy: InstallShield
Words: -
Title: CCSP Client Installation Service
Comments: Contact: Your local administrator
Keywords: Installer,MSI,Database
Subject: CCSP Client Installation Service
Author: InstallShield
Security: Password protected
Pages: 200
Software: InstallShield? 2011 - Professional Edition 17
ModifyDate: 2019:02:19 22:54:06
CreateDate: 2019:02:19 22:54:06
LastPrinted: 2019:02:19 22:54:06
RevisionNumber: {ACE5BD2D-D5DE-447F-A12B-CF7A27625F00}
CodePage: Windows Latin 1 (Western European)
Template: Intel;1033
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
72
Monitored processes
34
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs msiexec.exe no specs rundll32.exe rundll32.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
440C:\Windows\system32\MsiExec.exe -Embedding 47270329D05799D49F5FDC3405221532 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
564"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,3758186617873629274,3014467667475433745,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=7374645770430118951 --mojo-platform-channel-handle=3604 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
772C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1456"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,3758186617873629274,3014467667475433745,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=17335083832591063105 --mojo-platform-channel-handle=3676 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1872"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,3758186617873629274,3014467667475433745,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=10562405395582872417 --mojo-platform-channel-handle=3336 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2104"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,3758186617873629274,3014467667475433745,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=17164329255887886523 --mojo-platform-channel-handle=4184 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2132"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,3758186617873629274,3014467667475433745,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=13285460469621066467 --mojo-platform-channel-handle=3736 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2152C:\Windows\system32\MsiExec.exe -Embedding E9597DC6FC8C49E94E25498181C1DFD9C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2572"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,3758186617873629274,3014467667475433745,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=15317851758815126196 --mojo-platform-channel-handle=4544 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2632"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,3758186617873629274,3014467667475433745,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=14139712305506904364 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2176 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
895
Read events
667
Write events
220
Delete events
8

Modification events

(PID) Process:(3876) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
40000000000000004CC7A31C4208D60104030000E0050000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
40000000000000004CC7A31C4208D60104030000E0050000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
34
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
40000000000000001E110F1D4208D60104030000E0050000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000007873111D4208D60104030000C80F0000E80300000100000000000000000000000A16C92642769342B3940B8233E5C4A10000000000000000
(PID) Process:(2852) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000FC4A291D4208D601240B00000C0C0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2852) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000FC4A291D4208D601240B0000000B0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2852) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000FC4A291D4208D601240B0000A00D0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2852) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000FC4A291D4208D601240B0000DC0F0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
Executable files
16
Suspicious files
18
Text files
257
Unknown types
6

Dropped files

PID
Process
Filename
Type
3876msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI70C4.tmp
MD5:
SHA256:
772msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
440MsiExec.exeC:\Users\admin\AppData\Local\Temp\{451761B3-7122-408A-AD80-F491054ACE26}\CCUVersions.xmlxml
MD5:
SHA256:
440MsiExec.exeC:\Users\admin\AppData\Local\Temp\{451761B3-7122-408A-AD80-F491054ACE26}\CCUniverse6.1.1.xmlxml
MD5:
SHA256:
772msiexec.exeC:\Windows\Installer\MSIF1AB.tmpexecutable
MD5:
SHA256:
440MsiExec.exeC:\Users\admin\AppData\Local\Temp\{451761B3-7122-408A-AD80-F491054ACE26}\CCUniverse6.0.BI.xmlxml
MD5:
SHA256:
440MsiExec.exeC:\Users\admin\AppData\Local\Temp\{451761B3-7122-408A-AD80-F491054ACE26}\CCUniverse6.1.xmlxml
MD5:
SHA256:
440MsiExec.exeC:\Users\admin\AppData\Local\Temp\{451761B3-7122-408A-AD80-F491054ACE26}\CCUniverse6.0.xmlxml
MD5:
SHA256:
772msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:
SHA256:
2852vssvc.exeC:
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
21
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3004
chrome.exe
GET
302
216.58.205.238:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
539 b
whitelisted
3004
chrome.exe
GET
200
185.180.12.142:80
http://r3---sn-n02xgoxufvg3-8pxe.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mh=QJ&mip=185.183.107.236&mm=28&mn=sn-n02xgoxufvg3-8pxe&ms=nvh&mt=1585758259&mv=m&mvi=2&pl=24&shardbypass=yes
AT
crx
293 Kb
whitelisted
3004
chrome.exe
GET
302
216.58.205.238:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
544 b
whitelisted
3004
chrome.exe
GET
200
185.180.12.140:80
http://r1---sn-n02xgoxufvg3-8pxe.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mh=bs&mip=185.183.107.236&mm=28&mn=sn-n02xgoxufvg3-8pxe&ms=nvh&mt=1585758259&mv=m&mvi=0&pl=24&shardbypass=yes
AT
crx
862 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3004
chrome.exe
172.217.23.99:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3004
chrome.exe
172.217.21.238:443
clients2.google.com
Google Inc.
US
whitelisted
3004
chrome.exe
216.58.205.238:80
redirector.gvt1.com
Google Inc.
US
whitelisted
3004
chrome.exe
172.217.18.10:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3004
chrome.exe
216.58.206.3:443
www.gstatic.com
Google Inc.
US
whitelisted
3004
chrome.exe
172.217.21.227:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3004
chrome.exe
216.58.207.65:443
clients2.googleusercontent.com
Google Inc.
US
whitelisted
3004
chrome.exe
185.180.12.142:80
r3---sn-n02xgoxufvg3-8pxe.gvt1.com
Datacamp Limited
AT
whitelisted
3004
chrome.exe
216.58.207.78:443
apis.google.com
Google Inc.
US
whitelisted
3004
chrome.exe
172.217.23.142:443
ogs.google.com.ua
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
accounts.google.com
  • 172.217.18.13
shared
clientservices.googleapis.com
  • 172.217.23.99
whitelisted
www.google.com.ua
  • 216.58.207.35
whitelisted
clients2.google.com
  • 172.217.21.238
whitelisted
clients4.google.com
  • 172.217.21.238
whitelisted
redirector.gvt1.com
  • 216.58.205.238
whitelisted
fonts.googleapis.com
  • 172.217.18.10
whitelisted
www.gstatic.com
  • 216.58.206.3
whitelisted
r3---sn-n02xgoxufvg3-8pxe.gvt1.com
  • 185.180.12.142
whitelisted
fonts.gstatic.com
  • 172.217.21.227
whitelisted

Threats

No threats detected
No debug info