File name: | Setup.msi |
Full analysis: | https://app.any.run/tasks/3a4a9a94-6f8e-439f-b301-c6c605007ba3 |
Verdict: | Malicious activity |
Analysis date: | March 25, 2021, 21:19:22 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-msi |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Umbrella Roaming Client, Author: OpenDNS, Keywords: Installer, Comments: This installer database contains the logic and data required to install Umbrella Roaming Client., Template: Intel;1033, Revision Number: {91AA28DE-EFFA-4A8C-A3EB-79C704A955A4}, Create Time/Date: Wed Dec 16 14:20:54 2020, Last Saved Time/Date: Wed Dec 16 14:20:54 2020, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2 |
MD5: | 19C4FE4C683E133D0DCC14E238A399D0 |
SHA1: | 337806494C9A49F718ABCD4AFFBC293D666A65A0 |
SHA256: | 301DB85270B118F294AAC15B1428AAAAD65903C71D544A02E5B0C0AD108956DD |
SSDEEP: | 49152:6n+alKePa2M6yOK1isJrS9xv9aEl+1E1nUIox/21URQw9uP:6nxKeC2BK80y5Mq+5Nx6UX9u |
.msi | | | Microsoft Windows Installer (98.5) |
---|---|---|
.msi | | | Microsoft Installer (100) |
CodePage: | Windows Latin 1 (Western European) |
---|---|
Title: | Installation Database |
Subject: | Umbrella Roaming Client |
Author: | OpenDNS |
Keywords: | Installer |
Comments: | This installer database contains the logic and data required to install Umbrella Roaming Client. |
Template: | Intel;1033 |
RevisionNumber: | {91AA28DE-EFFA-4A8C-A3EB-79C704A955A4} |
CreateDate: | 2020:12:16 14:20:54 |
ModifyDate: | 2020:12:16 14:20:54 |
Pages: | 200 |
Words: | 2 |
Software: | Windows Installer XML Toolset (3.11.2.4516) |
Security: | Read-only recommended |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
120 | "C:\Windows\system32\nslookup.exe" -timeout=10 -type=txt -port=5353 debug.opendns.com. 2620:119:53::53 | C:\Windows\system32\nslookup.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: nslookup Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
184 | "C:\Windows\system32\ipconfig.exe" /all | C:\Windows\system32\ipconfig.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: IP Configuration Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
272 | "C:\Windows\system32\netstat.exe" -rn | C:\Windows\system32\netstat.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Netstat Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
536 | "C:\Windows\system32\tracert.exe" 2620:119:35::35 | C:\Windows\system32\tracert.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Traceroute Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
588 | "C:\Windows\system32\tracert.exe" 2620:119:53::53 | C:\Windows\system32\tracert.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Traceroute Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
632 | "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -Command "(New-Object System.Net.WebClient).DownloadString(\"http://67.215.70.91:8081/malware.htm\")" | C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe | UmbrellaDiagnostic.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
924 | "C:\Windows\system32\ping.exe" -n 5 www.opendns.com | C:\Windows\system32\ping.exe | — | UmbrellaDiagnostic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
928 | "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -Command "(New-Object System.Net.WebClient).DownloadString(\"http://67.215.70.91:8081/favicon.ico\")" | C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe | UmbrellaDiagnostic.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
996 | "C:\Windows\system32\nslookup.exe" -timeout=10 myip.opendns.com. 208.67.220.220 | C:\Windows\system32\nslookup.exe | UmbrellaDiagnostic.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: nslookup Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
1024 | rundll32.exe "C:\Windows\Installer\MSI4782.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_345984 8 InstallerCustomActions!InstallerCustomActions.CustomActions.ReadOrgInfo | C:\Windows\system32\rundll32.exe | MsiExec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
Operation: | write | Name: | @%SystemRoot%\system32\p2pcollab.dll,-8042 |
Value: Peer to Peer Trust | |||
(PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
Operation: | write | Name: | @%SystemRoot%\system32\qagentrt.dll,-10 |
Value: System Health Authentication | |||
(PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
Operation: | write | Name: | @%SystemRoot%\system32\dnsapi.dll,-103 |
Value: Domain Name System (DNS) Server Trust | |||
(PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
Operation: | write | Name: | @%SystemRoot%\System32\fveui.dll,-843 |
Value: BitLocker Drive Encryption | |||
(PID) Process: | (1656) msiexec.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
Operation: | write | Name: | @%SystemRoot%\System32\fveui.dll,-844 |
Value: BitLocker Data Recovery Agent | |||
(PID) Process: | (2208) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore |
Operation: | write | Name: | SrCreateRp (Enter) |
Value: 400000000000000060BBB9A5BC21D701A0080000C0060000D5070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (2208) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP |
Operation: | write | Name: | SppCreate (Enter) |
Value: 400000000000000060BBB9A5BC21D701A0080000C0060000D0070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (2228) vssvc.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer |
Operation: | write | Name: | IDENTIFY (Enter) |
Value: 4000000000000000BC5414A6BC21D701B4080000E0040000E8030000010000000100000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (2228) vssvc.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer |
Operation: | write | Name: | IDENTIFY (Enter) |
Value: 4000000000000000BC5414A6BC21D701B4080000FC000000E8030000010000000100000000000000000000000000000000000000000000000000000000000000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1656 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSIC1B7.tmp | — | |
MD5:— | SHA256:— | |||
2208 | msiexec.exe | C:\System Volume Information\SPP\metadata-2 | — | |
MD5:— | SHA256:— | |||
2208 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\~DF1630988161204F55.TMP | — | |
MD5:— | SHA256:— | |||
2208 | msiexec.exe | C:\Windows\Installer\MSI46C5.tmp | — | |
MD5:— | SHA256:— | |||
2228 | vssvc.exe | C: | — | |
MD5:— | SHA256:— | |||
1024 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\MSI4782.tmp-\log4net.dll | — | |
MD5:— | SHA256:— | |||
1024 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\MSI4782.tmp-\NETWORKLIST.dll | — | |
MD5:— | SHA256:— | |||
1024 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\MSI4782.tmp-\stdole.dll | — | |
MD5:— | SHA256:— | |||
1024 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\MSI4782.tmp-\CustomAction.config | — | |
MD5:— | SHA256:— | |||
2208 | msiexec.exe | C:\Windows\Installer\MSI490A.tmp | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4076 | powershell.exe | GET | — | 67.215.70.92:80 | http://67.215.70.92/some/page | US | — | — | unknown |
2268 | powershell.exe | GET | — | 67.215.70.91:80 | http://67.215.70.91/favicon.ico | US | — | — | unknown |
2616 | UmbrellaDiagnostic.exe | GET | — | 67.215.69.69:80 | http://67.215.69.69/ | US | — | — | unknown |
3568 | powershell.exe | GET | — | 67.215.70.91:80 | http://67.215.70.91/malware.htm | US | — | — | unknown |
2616 | UmbrellaDiagnostic.exe | GET | 302 | 146.112.196.76:80 | http://bpb.opendns.com/monitor/ | DE | html | 127 b | whitelisted |
1460 | powershell.exe | GET | 302 | 146.112.62.39:80 | http://146.112.62.39/some/page | unknown | html | 161 b | unknown |
3496 | powershell.exe | GET | 200 | 146.112.62.40:80 | http://146.112.62.40/favicon.ico | unknown | image | 5.30 Kb | malicious |
3860 | powershell.exe | GET | 200 | 146.112.62.40:8081 | http://146.112.62.40:8081/favicon.ico | unknown | image | 5.30 Kb | malicious |
3632 | powershell.exe | GET | 200 | 146.112.62.40:8081 | http://146.112.62.40:8081/unproxied.html | unknown | html | 1.10 Kb | malicious |
3592 | powershell.exe | GET | 302 | 146.112.62.40:80 | http://146.112.62.40/malware.htm | unknown | html | 161 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1764 | nslookup.exe | 208.67.222.222:53 | — | OpenDNS, LLC | US | malicious |
1376 | nslookup.exe | 208.67.222.222:53 | — | OpenDNS, LLC | US | malicious |
3588 | nslookup.exe | 208.67.222.222:53 | — | OpenDNS, LLC | US | malicious |
2608 | nslookup.exe | 208.67.220.220:53 | — | OpenDNS, LLC | US | suspicious |
2768 | nslookup.exe | 208.67.220.220:53 | — | OpenDNS, LLC | US | suspicious |
3004 | nslookup.exe | 208.67.220.220:53 | — | OpenDNS, LLC | US | suspicious |
1976 | nslookup.exe | 208.67.222.222:53 | — | OpenDNS, LLC | US | malicious |
3784 | nslookup.exe | 204.61.216.4:53 | — | Packet Clearing House | US | unknown |
996 | nslookup.exe | 208.67.220.220:53 | — | OpenDNS, LLC | US | suspicious |
3864 | nslookup.exe | 192.33.4.12:53 | — | Cogent Communications | US | unknown |
Domain | IP | Reputation |
---|---|---|
myip.opendns.com |
| shared |
222.222.67.208.in-addr.arpa |
| unknown |
2.100.168.192.in-addr.arpa |
| whitelisted |
220.220.67.208.in-addr.arpa |
| unknown |
5.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.5.3.0.0.9.1.1.0.0.2.6.2.ip6.arpa |
| unknown |
3.5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.5.0.0.9.1.1.0.0.2.6.2.ip6.arpa |
| unknown |
api.opendns.com |
| suspicious |
bpb.opendns.com |
| whitelisted |
block.opendns.com |
| unknown |
hit-adult.opendns.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
— | — | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
— | — | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
— | — | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
— | — | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup) |
Process | Message |
---|---|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [INFO ] < 4> Start logging...
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [INFO ] < 4> ***** Starting ERC Service version 2.2.580
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [FATAL] < 4> Fatal Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [ERROR] < 4> Error Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [WARN ] < 4> Warn Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [NOTICE] < 4> Notice Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [INFO ] < 4> Info Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:31 [3512] [DEBUG] < 4> Debug Output Enabled
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:32 [3512] [INFO ] < 4> udpating ACL on C:\ProgramData\OpenDNS\ERC
|
ERCService.exe | OpenDNS-ERC: 2021-03-25 21:20:32 [3512] [DEBUG] < 4> NicWatcher: NIC cache system not running, getting all NICs without using cache.
|