File name:

WinWSSAgentInstaller64-9.6.1.21437.msi

Full analysis: https://app.any.run/tasks/61f39e47-6897-48bf-b28f-61d38f4033f7
Verdict: Malicious activity
Analysis date: April 14, 2025, 17:14:41
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
advancedinstaller
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 14:06:51 2020, Security: 0, Code page: 1252, Revision Number: {3E420029-1072-4ACC-ADDF-7D02A76993CF}, Number of Words: 2, Subject: WSS Agent, Author: Symantec, Name of Creating Application: WSS Agent, Template: x64;1033, Comments: This installer database contains the logic and data required to install WSS Agent., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
MD5:

2684DF599B982E14DC6F3C73C4DCEC42

SHA1:

46EFA5E1CEBA2189FA7CB006B7B5D2E446562E27

SHA256:

624DABF41BDD7FC914F92A81B36402ED2949220C533E408EE68A0A5B67C31627

SSDEEP:

98304:CWZVY33ASdaKwY8rcuuGlxA8nh3sBsBMOC+F7vimxQyQtSEpl/hdcDju7cHPXc2i:HXq9aITbPq60oFwbcWyPS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • msiexec.exe (PID: 5640)
    • The process verifies whether the antivirus software is installed

      • msiexec.exe (PID: 5576)
    • Detects AdvancedInstaller (YARA)

      • msiexec.exe (PID: 5576)
  • INFO

    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 5576)
    • Reads the software policy settings

      • msiexec.exe (PID: 5576)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 5576)
    • Checks proxy server information

      • msiexec.exe (PID: 5576)
    • Checks supported languages

      • msiexec.exe (PID: 4980)
      • msiexec.exe (PID: 5640)
      • msiexec.exe (PID: 960)
    • Reads the computer name

      • msiexec.exe (PID: 5640)
      • msiexec.exe (PID: 4980)
      • msiexec.exe (PID: 960)
    • Create files in a temporary directory

      • msiexec.exe (PID: 4980)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 5576)
    • Reads Environment values

      • msiexec.exe (PID: 4980)
    • The sample compiled with english language support

      • msiexec.exe (PID: 5576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

LastPrinted: 2009:12:11 11:47:44
CreateDate: 2009:12:11 11:47:44
ModifyDate: 2020:09:18 14:06:51
Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {3E420029-1072-4ACC-ADDF-7D02A76993CF}
Words: 2
Subject: WSS Agent
Author: Symantec
LastModifiedBy: -
Software: WSS Agent
Template: x64;1033
Comments: This installer database contains the logic and data required to install WSS Agent.
Title: Installation Database
Keywords: Installer, MSI, Database
Pages: 200
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe sppextcomobj.exe no specs slui.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
960C:\Windows\System32\MsiExec.exe -Embedding 225A75C2AAAEC837C20C061EC4567928 CC:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4980C:\Windows\syswow64\MsiExec.exe -Embedding F38BFCF4DF6DCF46785887298D3F7395 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5576"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\WinWSSAgentInstaller64-9.6.1.21437.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5640C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6620C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6728"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 230
Read events
4 230
Write events
0
Delete events
0

Modification events

No data
Executable files
10
Suspicious files
6
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5576msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_776129AD23F745C93AC5AD9EA03D416Bbinary
MD5:4EFFD5B3D220F69D5502C906C7FE07A0
SHA256:7AEA088E341825388D102C70E870A0140FD0D66C56219BEAF8E81C595536E089
5576msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:01EB80EF5AEDDF7640D48BDBA24302DC
SHA256:FCA7759681DDF1FD60364BD587A9D88A42802B31DCF5EEF39AC0FCDC36597A20
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBFDD.tmpexecutable
MD5:59F4B7E8B960987B68B311660C99957A
SHA256:3B43D469E1F3656F948EABBD9E1ED99570A7962118FCFC9CCAA309EB657502BF
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBCAB.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBED1.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
4980msiexec.exeC:\Users\admin\AppData\Local\Temp\installer.icoimage
MD5:833BD9365B74F461E46354C407B19346
SHA256:179B4838872125B553038E616C6D0FB480DA1C1BB4D3875C8AE352A7A7832A8B
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBF9E.tmpexecutable
MD5:5566149FC623F29D55CA72018369C780
SHA256:A8C8FF2A0E754059B1F44EF69DF492EF3CD582F3750F8C374037C9621069C608
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIC00D.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIC03D.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
5576msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBEC1.tmpexecutable
MD5:E1423FC5DDAEDC0152A09F4796243E31
SHA256:3042D947F0E3ACCD3307D4D983ABA352C4B01F6CA10AA45DBE660CA0A0A107DE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
18
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.191:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5576
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
5576
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
7532
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5576
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAhBdRQ3wR%2FTJRs%2F6d2oGto%3D
unknown
whitelisted
7532
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4024
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.191:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5576
msiexec.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.48.23.191
  • 23.48.23.194
  • 23.48.23.137
  • 23.48.23.140
  • 23.48.23.190
  • 23.48.23.180
  • 23.48.23.141
  • 23.48.23.193
  • 23.48.23.143
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
login.live.com
  • 20.190.159.128
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.130
  • 40.126.31.3
  • 20.190.159.129
  • 20.190.159.68
  • 20.190.159.131
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info