| File name: | Setup.msi |
| Full analysis: | https://app.any.run/tasks/3a4a9a94-6f8e-439f-b301-c6c605007ba3 |
| Verdict: | Malicious activity |
| Analysis date: | March 25, 2021, 21:19:22 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-msi |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Umbrella Roaming Client, Author: OpenDNS, Keywords: Installer, Comments: This installer database contains the logic and data required to install Umbrella Roaming Client., Template: Intel;1033, Revision Number: {91AA28DE-EFFA-4A8C-A3EB-79C704A955A4}, Create Time/Date: Wed Dec 16 14:20:54 2020, Last Saved Time/Date: Wed Dec 16 14:20:54 2020, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2 |
| MD5: | 19C4FE4C683E133D0DCC14E238A399D0 |
| SHA1: | 337806494C9A49F718ABCD4AFFBC293D666A65A0 |
| SHA256: | 301DB85270B118F294AAC15B1428AAAAD65903C71D544A02E5B0C0AD108956DD |
| SSDEEP: | 49152:6n+alKePa2M6yOK1isJrS9xv9aEl+1E1nUIox/21URQw9uP:6nxKeC2BK80y5Mq+5Nx6UX9u |
| .msi | | | Microsoft Windows Installer (98.5) |
|---|---|---|
| .msi | | | Microsoft Installer (100) |
| CodePage: | Windows Latin 1 (Western European) |
|---|---|
| Title: | Installation Database |
| Subject: | Umbrella Roaming Client |
| Author: | OpenDNS |
| Keywords: | Installer |
| Comments: | This installer database contains the logic and data required to install Umbrella Roaming Client. |
| Template: | Intel;1033 |
| RevisionNumber: | {91AA28DE-EFFA-4A8C-A3EB-79C704A955A4} |
| CreateDate: | 2020:12:16 14:20:54 |
| ModifyDate: | 2020:12:16 14:20:54 |
| Pages: | 200 |
| Words: | 2 |
| Software: | Windows Installer XML Toolset (3.11.2.4516) |
| Security: | Read-only recommended |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Windows\system32\nslookup.exe" -timeout=10 -type=txt -port=5353 debug.opendns.com. 2620:119:53::53 | C:\Windows\system32\nslookup.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: nslookup Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 184 | "C:\Windows\system32\ipconfig.exe" /all | C:\Windows\system32\ipconfig.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: IP Configuration Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 272 | "C:\Windows\system32\netstat.exe" -rn | C:\Windows\system32\netstat.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Netstat Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 536 | "C:\Windows\system32\tracert.exe" 2620:119:35::35 | C:\Windows\system32\tracert.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Traceroute Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 588 | "C:\Windows\system32\tracert.exe" 2620:119:53::53 | C:\Windows\system32\tracert.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Traceroute Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 632 | "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -Command "(New-Object System.Net.WebClient).DownloadString(\"http://67.215.70.91:8081/malware.htm\")" | C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe | UmbrellaDiagnostic.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 924 | "C:\Windows\system32\ping.exe" -n 5 www.opendns.com | C:\Windows\system32\ping.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 928 | "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -Command "(New-Object System.Net.WebClient).DownloadString(\"http://67.215.70.91:8081/favicon.ico\")" | C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe | UmbrellaDiagnostic.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 996 | "C:\Windows\system32\nslookup.exe" -timeout=10 myip.opendns.com. 208.67.220.220 | C:\Windows\system32\nslookup.exe | UmbrellaDiagnostic.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: nslookup Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1024 | rundll32.exe "C:\Windows\Installer\MSI4782.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_345984 8 InstallerCustomActions!InstallerCustomActions.CustomActions.ReadOrgInfo | C:\Windows\system32\rundll32.exe | MsiExec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\p2pcollab.dll,-8042 |
Value: Peer to Peer Trust | |||
| (PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\qagentrt.dll,-10 |
Value: System Health Authentication | |||
| (PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dnsapi.dll,-103 |
Value: Domain Name System (DNS) Server Trust | |||
| (PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\System32\fveui.dll,-843 |
Value: BitLocker Drive Encryption | |||
| (PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\System32\fveui.dll,-844 |
Value: BitLocker Data Recovery Agent | |||
| (PID) Process: | (2208) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore |
| Operation: | write | Name: | SrCreateRp (Enter) |
Value: 400000000000000060BBB9A5BC21D701A0080000C0060000D5070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2208) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP |
| Operation: | write | Name: | SppCreate (Enter) |
Value: 400000000000000060BBB9A5BC21D701A0080000C0060000D0070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2228) vssvc.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer |
| Operation: | write | Name: | IDENTIFY (Enter) |
Value: 4000000000000000BC5414A6BC21D701B4080000E0040000E8030000010000000100000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2228) vssvc.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer |
| Operation: | write | Name: | IDENTIFY (Enter) |
Value: 4000000000000000BC5414A6BC21D701B4080000FC000000E8030000010000000100000000000000000000000000000000000000000000000000000000000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1656 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSIC1B7.tmp | — | |
MD5:— | SHA256:— | |||
| 2208 | msiexec.exe | C:\System Volume Information\SPP\metadata-2 | — | |
MD5:— | SHA256:— | |||
| 2208 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\~DF1630988161204F55.TMP | — | |
MD5:— | SHA256:— | |||
| 2208 | msiexec.exe | C:\Windows\Installer\MSI46C5.tmp | — | |
MD5:— | SHA256:— | |||
| 2228 | vssvc.exe | C: | — | |
MD5:— | SHA256:— | |||
| 1024 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\MSI4782.tmp-\log4net.dll | — | |
MD5:— | SHA256:— | |||
| 1024 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\MSI4782.tmp-\NETWORKLIST.dll | — | |
MD5:— | SHA256:— | |||
| 1024 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\MSI4782.tmp-\stdole.dll | — | |
MD5:— | SHA256:— | |||
| 1024 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\MSI4782.tmp-\CustomAction.config | — | |
MD5:— | SHA256:— | |||
| 2208 | msiexec.exe | C:\Windows\Installer\MSI490A.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2268 | powershell.exe | GET | — | 67.215.70.91:80 | http://67.215.70.91/favicon.ico | US | — | — | unknown |
2616 | UmbrellaDiagnostic.exe | GET | — | 67.215.69.69:80 | http://67.215.69.69/ | US | — | — | unknown |
3568 | powershell.exe | GET | — | 67.215.70.91:80 | http://67.215.70.91/malware.htm | US | — | — | unknown |
4076 | powershell.exe | GET | — | 67.215.70.92:80 | http://67.215.70.92/some/page | US | — | — | unknown |
2616 | UmbrellaDiagnostic.exe | GET | 302 | 146.112.196.76:80 | http://bpb.opendns.com/monitor/ | DE | html | 127 b | whitelisted |
3632 | powershell.exe | GET | 302 | 146.112.62.40:8081 | http://146.112.62.40:8081/malware.htm | unknown | html | 161 b | malicious |
1460 | powershell.exe | GET | 302 | 146.112.62.39:80 | http://146.112.62.39/some/page | unknown | html | 161 b | unknown |
3592 | powershell.exe | GET | 302 | 146.112.62.40:80 | http://146.112.62.40/malware.htm | unknown | html | 161 b | malicious |
3592 | powershell.exe | GET | 200 | 146.112.62.40:80 | http://146.112.62.40/unproxied.html | unknown | html | 1.10 Kb | malicious |
1460 | powershell.exe | GET | 200 | 146.112.62.39:80 | http://146.112.62.39/index.html | unknown | html | 1.05 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1764 | nslookup.exe | 208.67.222.222:53 | — | OpenDNS, LLC | US | malicious |
1376 | nslookup.exe | 208.67.222.222:53 | — | OpenDNS, LLC | US | malicious |
3588 | nslookup.exe | 208.67.222.222:53 | — | OpenDNS, LLC | US | malicious |
3004 | nslookup.exe | 208.67.220.220:53 | — | OpenDNS, LLC | US | suspicious |
2608 | nslookup.exe | 208.67.220.220:53 | — | OpenDNS, LLC | US | suspicious |
2768 | nslookup.exe | 208.67.220.220:53 | — | OpenDNS, LLC | US | suspicious |
1976 | nslookup.exe | 208.67.222.222:53 | — | OpenDNS, LLC | US | malicious |
3496 | powershell.exe | 146.112.62.40:80 | — | OpenDNS, LLC | — | malicious |
3632 | powershell.exe | 146.112.62.40:8081 | — | OpenDNS, LLC | — | malicious |
1460 | powershell.exe | 146.112.62.39:80 | — | OpenDNS, LLC | — | unknown |
Domain | IP | Reputation |
|---|---|---|
myip.opendns.com |
| shared |
222.222.67.208.in-addr.arpa |
| unknown |
2.100.168.192.in-addr.arpa |
| whitelisted |
220.220.67.208.in-addr.arpa |
| unknown |
5.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.5.3.0.0.9.1.1.0.0.2.6.2.ip6.arpa |
| unknown |
3.5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.5.0.0.9.1.1.0.0.2.6.2.ip6.arpa |
| unknown |
api.opendns.com |
| suspicious |
bpb.opendns.com |
| whitelisted |
block.opendns.com |
| unknown |
hit-adult.opendns.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1048 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
1976 | nslookup.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
996 | nslookup.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
1976 | nslookup.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
996 | nslookup.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
Process | Message |
|---|---|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [INFO ] < 4> Start logging...
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [INFO ] < 4> ***** Starting ERC Service version 2.2.580
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [FATAL] < 4> Fatal Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [ERROR] < 4> Error Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [WARN ] < 4> Warn Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [NOTICE] < 4> Notice Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [INFO ] < 4> Info Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [DEBUG] < 4> Debug Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:32 [3512] [INFO ] < 4> udpating ACL on C:\ProgramData\OpenDNS\ERC
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:32 [3512] [DEBUG] < 4> NicWatcher: NIC cache system not running, getting all NICs without using cache.
|