File name:

WinWSSAgentInstaller64-9.6.1.21437.msi

Full analysis: https://app.any.run/tasks/61f39e47-6897-48bf-b28f-61d38f4033f7
Verdict: Malicious activity
Analysis date: April 14, 2025, 17:14:41
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
advancedinstaller
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 14:06:51 2020, Security: 0, Code page: 1252, Revision Number: {3E420029-1072-4ACC-ADDF-7D02A76993CF}, Number of Words: 2, Subject: WSS Agent, Author: Symantec, Name of Creating Application: WSS Agent, Template: x64;1033, Comments: This installer database contains the logic and data required to install WSS Agent., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
MD5:

2684DF599B982E14DC6F3C73C4DCEC42

SHA1:

46EFA5E1CEBA2189FA7CB006B7B5D2E446562E27

SHA256:

624DABF41BDD7FC914F92A81B36402ED2949220C533E408EE68A0A5B67C31627

SSDEEP:

98304:CWZVY33ASdaKwY8rcuuGlxA8nh3sBsBMOC+F7vimxQyQtSEpl/hdcDju7cHPXc2i:HXq9aITbPq60oFwbcWyPS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • msiexec.exe (PID: 5640)
    • Detects AdvancedInstaller (YARA)

      • msiexec.exe (PID: 5576)
    • The process verifies whether the antivirus software is installed

      • msiexec.exe (PID: 5576)
  • INFO

    • Reads the software policy settings

      • msiexec.exe (PID: 5576)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 5576)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 5576)
    • Checks proxy server information

      • msiexec.exe (PID: 5576)
    • Reads the computer name

      • msiexec.exe (PID: 4980)
      • msiexec.exe (PID: 5640)
      • msiexec.exe (PID: 960)
    • Checks supported languages

      • msiexec.exe (PID: 5640)
      • msiexec.exe (PID: 4980)
      • msiexec.exe (PID: 960)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 5576)
    • Reads Environment values

      • msiexec.exe (PID: 4980)
    • The sample compiled with english language support

      • msiexec.exe (PID: 5576)
    • Create files in a temporary directory

      • msiexec.exe (PID: 4980)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

LastPrinted: 2009:12:11 11:47:44
CreateDate: 2009:12:11 11:47:44
ModifyDate: 2020:09:18 14:06:51
Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {3E420029-1072-4ACC-ADDF-7D02A76993CF}
Words: 2
Subject: WSS Agent
Author: Symantec
LastModifiedBy: -
Software: WSS Agent
Template: x64;1033
Comments: This installer database contains the logic and data required to install WSS Agent.
Title: Installation Database
Keywords: Installer, MSI, Database
Pages: 200
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe sppextcomobj.exe no specs slui.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
960C:\Windows\System32\MsiExec.exe -Embedding 225A75C2AAAEC837C20C061EC4567928 CC:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4980C:\Windows\syswow64\MsiExec.exe -Embedding F38BFCF4DF6DCF46785887298D3F7395 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5576"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\WinWSSAgentInstaller64-9.6.1.21437.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5640C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6620C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6728"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 230
Read events
4 230
Write events
0
Delete events
0

Modification events

No data
Executable files
10
Suspicious files
6
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5576msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:E272717AFAACA7A366E4A7188798038C
SHA256:C0B96854983ACE107CEF51827FAA5280EE7E3E464C2C1B2F41D6452BAEA83262
5576msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:6789CF61F4E45CDCF64E7A453932E9E0
SHA256:237E1DCC636D17FB5131C044804328B36DCD6570D8148785E2D9CBE62EC5BF67
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBEA1.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBCAB.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBD77.tmpexecutable
MD5:457A16E8C3234236BDBBFBF97DE2C6DA
SHA256:96A6FE61A0E07A518A293A516BA963BD8EF6B43489BE1CD85A7C4F7EA4F6D52C
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBEC1.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
5576msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:01EB80EF5AEDDF7640D48BDBA24302DC
SHA256:FCA7759681DDF1FD60364BD587A9D88A42802B31DCF5EEF39AC0FCDC36597A20
5576msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:290E260863726E0DFC70429F7C748FE3
SHA256:B7A80B86BB22355B9CD505516EC03874224AC1E905CA9EE5FF73A717B79FCA1A
5576msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_776129AD23F745C93AC5AD9EA03D416Bbinary
MD5:4EFFD5B3D220F69D5502C906C7FE07A0
SHA256:7AEA088E341825388D102C70E870A0140FD0D66C56219BEAF8E81C595536E089
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIC03D.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
18
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.191:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5576
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
5576
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAhBdRQ3wR%2FTJRs%2F6d2oGto%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7532
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7532
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5576
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4024
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.191:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5576
msiexec.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.48.23.191
  • 23.48.23.194
  • 23.48.23.137
  • 23.48.23.140
  • 23.48.23.190
  • 23.48.23.180
  • 23.48.23.141
  • 23.48.23.193
  • 23.48.23.143
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
login.live.com
  • 20.190.159.128
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.130
  • 40.126.31.3
  • 20.190.159.129
  • 20.190.159.68
  • 20.190.159.131
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info