File name:

WebPkiSetup_2.12.3_pt.msi

Full analysis: https://app.any.run/tasks/1cbbea67-3539-4b5b-b147-096bf2551aa6
Verdict: Malicious activity
Analysis date: November 23, 2023, 20:47:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Web PKI, Author: Lacuna Software, Keywords: Installer, Comments: This installer database contains the logic and data required to install Web PKI., Template: Intel;1033, Revision Number: {394F7544-0072-4360-98A3-0547DE7BBBA9}, Create Time/Date: Tue Oct 31 18:07:36 2023, Last Saved Time/Date: Tue Oct 31 18:07:36 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
MD5:

7089F4F475FBEF782F992407FF30BFB3

SHA1:

0B9C624B01B5BE170CF0B19AA753DAC820847129

SHA256:

45A1F4A415244143EC8A010F27270746B673E287303EFE64DD34E670FC03D7DF

SSDEEP:

98304:IcOg1VONBs9rNv5q5yKmRdZ4vdViPh/IYsaWd54SV1MbVqYnQrx12R5MruQEJ+MQ:pbSz2OzgYJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 3484)
  • SUSPICIOUS

    • Checks Windows Trust Settings

      • msiexec.exe (PID: 3484)
    • The process creates files with name similar to system file names

      • msiexec.exe (PID: 3484)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3124)
  • INFO

    • Checks supported languages

      • msiexec.exe (PID: 3484)
    • Reads the computer name

      • msiexec.exe (PID: 3484)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 3484)
    • Create files in a temporary directory

      • msiexec.exe (PID: 3484)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 3440)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 3484)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Web PKI
Author: Lacuna Software
Keywords: Installer
Comments: This installer database contains the logic and data required to install Web PKI.
Template: Intel;1033
RevisionNumber: {394F7544-0072-4360-98A3-0547DE7BBBA9}
CreateDate: 2023:10:31 18:07:36
ModifyDate: 2023:10:31 18:07:36
Pages: 200
Words: 10
Software: Windows Installer XML Toolset (3.11.2.4516)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe no specs vssvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3124C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3440"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\WebPkiSetup_2.12.3_pt.msi"C:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3484C:\Windows\system32\msiexec.exe /VC:\Windows\System32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
8 649
Read events
8 600
Write events
39
Delete events
10

Modification events

(PID) Process:(3440) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000F2B487BA16B0D901C80700002C0A0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4000000000000000F2B487BA16B0D901C80700002C0A0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
72
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
40000000000000008C62D6BA16B0D901C80700002C0A0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Leave)
Value:
400000000000000064514ABC16B0D901C80700002C0A0000D3070000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppAddInterestingComponents (Enter)
Value:
400000000000000064514ABC16B0D901C80700002C0A0000D4070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppAddInterestingComponents (Leave)
Value:
400000000000000034645DBC16B0D901C80700002C0A0000D4070000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Leave)
Value:
4000000000000000781D5ABD16B0D901C80700002C0A0000D0070000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3484) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Leave)
Value:
4000000000000000781D5ABD16B0D901C80700002C0A0000D5070000010000000000000000000000000000000000000000000000000000000000000000000000
Executable files
14
Suspicious files
12
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3484msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
3484msiexec.exeC:\Windows\Installer\16aa5e.msi
MD5:
SHA256:
3484msiexec.exeC:\Windows\Installer\MSIACEE.tmpbinary
MD5:BF99F1C15FD51FD3BC830E4EB16FCD4D
SHA256:19A7EF21A62DE4E7BC5903CE91EFC96418951C9F99EFEE346A6DFC3C37D20885
3484msiexec.exeC:\Users\admin\AppData\Local\Lacuna Software\Web PKI\Pkcs11Interop.dllexecutable
MD5:5E6BDAB1F9C593617BCE16FBAF392D75
SHA256:67408BE53E8C65B17000EC7BC435786B96763544B60C916B9E2F9C2C60286D9F
3484msiexec.exeC:\Users\admin\AppData\Local\Lacuna Software\Web PKI\Lacuna.WindowsApiCodePack.Shell.dllexecutable
MD5:EE7A983514E314B7136CB470BD556F22
SHA256:EF96DA19098553B7B680891DF5B1610C9715B9649FD05EAEF07174F82808B0A1
3484msiexec.exeC:\Users\admin\AppData\Local\Lacuna Software\Web PKI\Lacuna.WebPki.CommonApi.dllexecutable
MD5:9173D0DC09B044616CB9F3AB35E9AE6E
SHA256:8EF230EDCD48AA7B149AC1E39EC5058F495FFE38E55B3B5BF8CECD3A66EA29DC
3484msiexec.exeC:\Windows\Installer\16aa61.msi
MD5:
SHA256:
3484msiexec.exeC:\Users\admin\AppData\Local\Lacuna Software\Web PKI\Lacuna.Capi.dllexecutable
MD5:93485D40696CE668F5991EA23FF3390C
SHA256:C6901333A60AFE86ACC815E4159FBAC95B2BD660C8219F4767C73F29EDB38343
3484msiexec.exeC:\Users\admin\AppData\Local\Lacuna Software\Web PKI\Lacuna.Pki.RestrictedProductsLicenser.dllexecutable
MD5:CF37C7D9A7505B8E9C97BD1B991681B1
SHA256:97AB7FB595677B4B50CF0252E08D868F12652CD3982BC5B6427EDF3C74550727
3484msiexec.exeC:\Users\admin\AppData\Local\Lacuna Software\Web PKI\Newtonsoft.Json.dllexecutable
MD5:8F6875148B45C300B95514CB40703C2E
SHA256:EA7FD75E2BB069699D4DA09F3601D70CA8E401F58949178CDBF2C5928720DAA1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info