analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Full Fix-Xentry 2022.exe

Full analysis: https://app.any.run/tasks/d132b62d-deb2-4eda-bb15-f6c3952aa95b
Verdict: Malicious activity
Analysis date: May 20, 2022, 19:27:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

2C0FA6E8C0EBF78FC7875495D907C5C0

SHA1:

F50A542E49AD33B1A59C5223148B221CED62BC2C

SHA256:

219FB6AF7DA3A7E932A36FFCE9AD67FFF9B4E4AEE3D624514DDE36092E449CDF

SSDEEP:

393216:WKHx59nxhEzDrGNgj1j03Iqf7jAO/cKrn9vC5o:WWtUvGNgR04qf/pncC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • Full Fix-Xentry 2022.exe (PID: 1180)
      • full fix-xentry 2022.exe  (PID: 3652)
      • msiexec.exe (PID: 2840)
      • msiexec.exe (PID: 280)
      • DAS32R2sd.exe (PID: 2084)
      • start_Xentry.exe (PID: 1152)
    • Application was dropped or rewritten from another process

      • full fix-xentry 2022.exe  (PID: 3652)
    • Loads the Task Scheduler COM API

      • full fix-xentry 2022.exe  (PID: 3652)
    • Changes AppInit_DLLs value (autorun option)

      • msiexec.exe (PID: 280)
  • SUSPICIOUS

    • Checks supported languages

      • Full Fix-Xentry 2022.exe (PID: 1180)
      • icsys.icn.exe (PID: 3856)
      • full fix-xentry 2022.exe  (PID: 3652)
      • msiexec.exe (PID: 280)
      • MsiExec.exe (PID: 2540)
      • MsiExec.exe (PID: 3152)
      • MsiExec.exe (PID: 2224)
      • DAS32R2sd.exe (PID: 2084)
      • icsys.icn.exe (PID: 3660)
      • start_Xentry.exe (PID: 1152)
      • cmd.exe (PID: 4032)
      • start_xentry.exe  (PID: 2952)
      • icsys.icn.exe (PID: 2544)
    • Reads the computer name

      • Full Fix-Xentry 2022.exe (PID: 1180)
      • full fix-xentry 2022.exe  (PID: 3652)
      • icsys.icn.exe (PID: 3856)
      • msiexec.exe (PID: 280)
      • MsiExec.exe (PID: 2540)
      • MsiExec.exe (PID: 3152)
      • MsiExec.exe (PID: 2224)
      • DAS32R2sd.exe (PID: 2084)
      • icsys.icn.exe (PID: 3660)
      • start_Xentry.exe (PID: 1152)
      • icsys.icn.exe (PID: 2544)
    • Starts itself from another location

      • Full Fix-Xentry 2022.exe (PID: 1180)
      • DAS32R2sd.exe (PID: 2084)
      • start_Xentry.exe (PID: 1152)
    • Starts application with an unusual extension

      • Full Fix-Xentry 2022.exe (PID: 1180)
      • DAS32R2sd.exe (PID: 2084)
      • start_Xentry.exe (PID: 1152)
    • Executable content was dropped or overwritten

      • Full Fix-Xentry 2022.exe (PID: 1180)
      • full fix-xentry 2022.exe  (PID: 3652)
      • msiexec.exe (PID: 2840)
      • msiexec.exe (PID: 280)
      • DAS32R2sd.exe (PID: 2084)
      • start_Xentry.exe (PID: 1152)
    • Drops a file with a compile date too recent

      • Full Fix-Xentry 2022.exe (PID: 1180)
      • full fix-xentry 2022.exe  (PID: 3652)
      • msiexec.exe (PID: 2840)
      • msiexec.exe (PID: 280)
      • DAS32R2sd.exe (PID: 2084)
      • start_Xentry.exe (PID: 1152)
    • Creates files in the user directory

      • full fix-xentry 2022.exe  (PID: 3652)
      • MsiExec.exe (PID: 3152)
    • Reads Environment values

      • full fix-xentry 2022.exe  (PID: 3652)
      • vssvc.exe (PID: 3772)
    • Reads the Windows organization settings

      • full fix-xentry 2022.exe  (PID: 3652)
      • msiexec.exe (PID: 2840)
      • msiexec.exe (PID: 280)
    • Reads Windows owner or organization settings

      • full fix-xentry 2022.exe  (PID: 3652)
      • msiexec.exe (PID: 2840)
      • msiexec.exe (PID: 280)
    • Starts Microsoft Installer

      • full fix-xentry 2022.exe  (PID: 3652)
    • Executed as Windows Service

      • vssvc.exe (PID: 3772)
    • Creates a directory in Program Files

      • msiexec.exe (PID: 280)
    • Creates files in the Windows directory

      • msiexec.exe (PID: 280)
    • Changes the desktop background image

      • msiexec.exe (PID: 280)
    • Creates files in the program directory

      • DAS32R2sd.exe (PID: 2084)
      • start_Xentry.exe (PID: 1152)
  • INFO

    • Application launched itself

      • msiexec.exe (PID: 280)
    • Checks supported languages

      • msiexec.exe (PID: 2840)
      • vssvc.exe (PID: 3772)
      • explorer.exe (PID: 3696)
    • Reads the computer name

      • msiexec.exe (PID: 2840)
      • vssvc.exe (PID: 3772)
      • explorer.exe (PID: 3696)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 2540)
      • MsiExec.exe (PID: 3152)
      • MsiExec.exe (PID: 2224)
    • Manual execution by user

      • DAS32R2sd.exe (PID: 2084)
      • cmd.exe (PID: 4032)
      • start_Xentry.exe (PID: 1152)
      • explorer.exe (PID: 3696)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 280)
    • Creates files in the program directory

      • msiexec.exe (PID: 280)
    • Searches for installed software

      • msiexec.exe (PID: 280)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (26.5)
.exe | InstallShield setup (13.9)
.exe | Win32 Executable MS Visual C++ (generic) (10)
.exe | Win64 Executable (generic) (8.9)

EXIF

EXE

OriginalFileName: Win.exe
InternalName: Win
ProductVersion: 1
FileVersion: 1
ProductName: Win
CompanyName: Microsoft
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 1
OSVersion: 4
EntryPoint: 0x3670
UninitializedDataSize: -
InitializedDataSize: 12288
CodeSize: 176128
LinkerVersion: 6
PEType: PE32
TimeStamp: 2011:06:14 21:01:16+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 14-Jun-2011 19:01:16
Detected languages:
  • English - United States
CompanyName: Microsoft
ProductName: Win
FileVersion: 1.00
ProductVersion: 1.00
InternalName: Win
OriginalFilename: Win.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 14-Jun-2011 19:01:16
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0002A728
0x0002B000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.9472
.data
0x0002C000
0x00001B74
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0002E000
0x00001000
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.95655

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.12197
500
Unicode (UTF 16LE)
English - United States
RT_VERSION
30001
3.78952
3280
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

MSVBVM60.DLL
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
17
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start full fix-xentry 2022.exe full fix-xentry 2022.exe  icsys.icn.exe no specs msiexec.exe msiexec.exe no specs msiexec.exe msiexec.exe no specs vssvc.exe no specs msiexec.exe no specs das32r2sd.exe das32r2sd.exe  no specs icsys.icn.exe no specs cmd.exe no specs explorer.exe no specs start_xentry.exe start_xentry.exe  no specs icsys.icn.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1180"C:\Users\admin\AppData\Local\Temp\Full Fix-Xentry 2022.exe" C:\Users\admin\AppData\Local\Temp\Full Fix-Xentry 2022.exe
Explorer.EXE
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
3652"c:\users\admin\appdata\local\temp\full fix-xentry 2022.exe " c:\users\admin\appdata\local\temp\full fix-xentry 2022.exe 
Full Fix-Xentry 2022.exe
User:
admin
Company:
Mercedes
Integrity Level:
MEDIUM
Description:
DAS Diagnosis Installer
Exit code:
0
Version:
2022
3856C:\Users\admin\AppData\Local\icsys.icn.exeC:\Users\admin\AppData\Local\icsys.icn.exeFull Fix-Xentry 2022.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Version:
1.00
280C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2540C:\Windows\system32\MsiExec.exe -Embedding 0E713C331C178500594EF2386C4D8CA7 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2840"C:\Windows\system32\msiexec.exe" /i "C:\Users\admin\AppData\Roaming\Mercedes\DAS Diagnosis 2022\install\Full Fix-Xentry 2022.msi" AI_SETUPEXEPATH="c:\users\admin\appdata\local\temp\full fix-xentry 2022.exe " SETUPEXEDIR=c:\users\admin\appdata\local\temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1653073835 " ALLUSERS="1"C:\Windows\system32\msiexec.exe
full fix-xentry 2022.exe 
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
3152C:\Windows\system32\MsiExec.exe -Embedding E11ADF4315DC5812C0D43405D00E0F24 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
3772C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2224C:\Windows\system32\MsiExec.exe -Embedding 33A40B2463A4B1524791D1A7DD5DD052C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2084"C:\Program Files\Mercedes-Benz\DAS\bin\DAS32R2sd.exe" C:\Program Files\Mercedes-Benz\DAS\bin\DAS32R2sd.exe
Explorer.EXE
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
Total events
5 044
Read events
4 710
Write events
321
Delete events
13

Modification events

(PID) Process:(1180) Full Fix-Xentry 2022.exeKey:HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(3856) icsys.icn.exeKey:HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(280) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
40000000000000002E4EA2D97F6CD801180100009C0D0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(280) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
40000000000000002E4EA2D97F6CD801180100009C0D0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(280) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
69
(PID) Process:(280) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
40000000000000004CD308DA7F6CD801180100009C0D0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(280) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000004CD308DA7F6CD8011801000060070000E8030000010000000000000000000000EAAD8CCCA784DF4380F1853D1694A7EA0000000000000000
(PID) Process:(3772) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000001CE61BDA7F6CD801BC0E000068080000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3772) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000001CE61BDA7F6CD801BC0E0000BC0D0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3772) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000001CE61BDA7F6CD801BC0E000008090000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
Executable files
31
Suspicious files
17
Text files
33
Unknown types
21

Dropped files

PID
Process
Filename
Type
3652full fix-xentry 2022.exe C:\Users\admin\AppData\Roaming\Mercedes\DAS Diagnosis 2022\install\holder0.aiph
MD5:
SHA256:
280msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
280msiexec.exeC:\Windows\Installer\10e997.msiexecutable
MD5:579AE59283416D00359FFC291A8CA99E
SHA256:0F8A8C47434FBCFD8D18AFF50099379B9759F3C58865D263BF05AF8FFC3149CA
3652full fix-xentry 2022.exe C:\Users\admin\AppData\Roaming\Mercedes\DAS Diagnosis 2022\install\Full Fix-Xentry 2022.msiexecutable
MD5:579AE59283416D00359FFC291A8CA99E
SHA256:0F8A8C47434FBCFD8D18AFF50099379B9759F3C58865D263BF05AF8FFC3149CA
2840msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIC03A.tmpexecutable
MD5:95623BECF64DE0F8ED11C1BF4F8C48F2
SHA256:534B261A85B3BA8BD0F23DF4AB9A14AC737D9D7D5A617B1CCA0BDBB57CF03447
1180Full Fix-Xentry 2022.exeC:\Users\admin\AppData\Local\icsys.icn.exeexecutable
MD5:7D48E0E783F0B47A1F0A7E45546C8538
SHA256:9D3DB56C2444FFF55E5A49753ED58C9B91B68F820775355175E9F1A46399C074
3652full fix-xentry 2022.exe C:\Users\admin\AppData\Roaming\Mercedes\DAS Diagnosis 2022\install\Full Fix-Xentry 2022.x64.msiexecutable
MD5:5BF4A89769144F105E9116B92B30C824
SHA256:539F45FE23117F9301EFBD8CAE49697343C7AA969EA26B5B089E6F42EAA2BA35
3652full fix-xentry 2022.exe C:\Users\admin\AppData\Roaming\Mercedes\DAS Diagnosis 2022\install\Full Fix-Xentry 20221.cab
MD5:
SHA256:
1180Full Fix-Xentry 2022.exeC:\users\admin\appdata\local\temp\full fix-xentry 2022.exe executable
MD5:7D4315474724934A249A03D60E948EB8
SHA256:A69A7354AC7B91246D7FC7264AF69D1BD31C5A68CD9BDF3B4493BA0980803802
280msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:C3D7042651DA92081F68B1BA379A23DA
SHA256:69E1D280A21DD3FDA6F30868469B3AA05C1CF9BA52DEA930C5AA8A7E4AF7F31E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info