| File name: | 5c322c.msi |
| Full analysis: | https://app.any.run/tasks/850cbf91-a4e8-4b8b-ae21-94a16281f65c |
| Verdict: | Malicious activity |
| Threats: | MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations. |
| Analysis date: | December 12, 2024, 11:19:48 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-msi |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Google Chrome 125.0.6422.113, Subject: Google Chrome, Author: Google LLC, Keywords: Installer, Template: Intel;1033, Revision Number: {CC659C51-85CC-445F-B840-187BCCCBE876}, Create Time/Date: Thu Jan 11 14:59:44 2024, Last Saved Time/Date: Thu Jan 11 14:59:44 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2 |
| MD5: | EBF9AEC610FFB1A4CF2BC72722D2B7AA |
| SHA1: | C59E7409EBA5429321B9F1741DB9336DCDF6897D |
| SHA256: | 66D7083B0C8F714AAA89BF29EAF6B26F8FBDE249948401D777F75C99865A9AE3 |
| SSDEEP: | 49152:eUEEDU0piMGINrKoeqCT7ZhHV9lpIlVBiwYJ8u+7gMDs6nR4B9V3NcAQKWDQuuI/:eU3Z91eBbzScJ8/gMDsW4Jtl9yJn |
| .msi | | | Microsoft Installer (100) |
|---|
| Title: | Google Chrome 125.0.6422.113 |
|---|---|
| Subject: | Google Chrome |
| Author: | Google LLC |
| Keywords: | Installer |
| Template: | Intel;1033 |
| RevisionNumber: | {CC659C51-85CC-445F-B840-187BCCCBE876} |
| CreateDate: | 2024:01:11 14:59:44 |
| ModifyDate: | 2024:01:11 14:59:44 |
| Pages: | 200 |
| Words: | 12 |
| Software: | MSI Wrapper (11.0.53.0) |
| Security: | Read-only recommended |
| CodePage: | Windows Cyrillic |
| LocaleIndicator: | 1033 |
| Company: | Google LLC |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3032 | C:\Windows\syswow64\MsiExec.exe -Embedding 147974643A02EF2543D3926F82C981A2 | C:\Windows\SysWOW64\msiexec.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Exit code: 0 Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3040 | "C:\WINDOWS\system32\computerdefaults.exe" | C:\Windows\System32\ComputerDefaults.exe | setup.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Set Program Access and Computer Defaults Control Panel Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3540 | "C:\WINDOWS\system32\EXPAND.EXE" -R files.cab -F:* files | C:\Windows\SysWOW64\expand.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: LZ Expansion Utility Exit code: 0 Version: 5.00 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4556 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | expand.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4640 | "C:\Users\admin\AppData\Local\Temp\MW-2bd2962c-91b0-4eae-9ba2-b23e8754c29f\files\setup.exe" /VERYSILENT /VERYSILENT | C:\Users\admin\AppData\Local\Temp\MW-2bd2962c-91b0-4eae-9ba2-b23e8754c29f\files\setup.exe | msiexec.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 4824 | C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -Embedding | C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Modules Installer Worker Version: 10.0.19041.3989 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4932 | C:\Users\admin\AppData\Local\Microsoft\Windows\systemtask.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\systemtask.exe | ComputerDefaults.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 5892 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | SrTasks.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6004 | "C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\5c322c.msi | C:\Windows\System32\msiexec.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Exit code: 1603 Version: 5.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore |
| Operation: | write | Name: | SrCreateRp (Enter) |
Value: 480000000000000073D3CCC4874CDB013418000078180000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Enter) |
Value: 48000000000000004936CFC4874CDB013418000078180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Leave) |
Value: 480000000000000017C629C5874CDB013418000078180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Enter) |
Value: 480000000000000017C629C5874CDB013418000078180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Leave) |
Value: 48000000000000005A8E2EC5874CDB013418000078180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppCreate (Enter) |
Value: 480000000000000026F430C5874CDB013418000078180000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP |
| Operation: | write | Name: | LastIndex |
Value: 11 | |||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGatherWriterMetadata (Enter) |
Value: 4800000000000000FDAFB1C5874CDB013418000078180000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (6196) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher |
| Operation: | write | Name: | IDENTIFY (Enter) |
Value: 4800000000000000D314B4C5874CDB0134180000FC180000E8030000010000000000000000000000A200C9A1153C4249B8AE52DF578EEF5500000000000000000000000000000000 | |||
| (PID) Process: | (6280) VSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer |
| Operation: | write | Name: | IDENTIFY (Enter) |
Value: 4800000000000000A5F7BFC5874CDB0188180000A4180000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6196 | msiexec.exe | C:\System Volume Information\SPP\metadata-2 | — | |
MD5:— | SHA256:— | |||
| 3540 | expand.exe | C:\Users\admin\AppData\Local\Temp\MW-2bd2962c-91b0-4eae-9ba2-b23e8754c29f\files\setup.exe | — | |
MD5:— | SHA256:— | |||
| 4640 | setup.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\systemtask.exe | — | |
MD5:— | SHA256:— | |||
| 6196 | msiexec.exe | C:\Windows\Temp\~DF36813DE4E7EF63A1.TMP | binary | |
MD5:671B813BE0EBDE53D56E439D703E4F43 | SHA256:BB91B3203491E1B2CF60D71E3FC8DDDBA4F67402D58346357C976C3C3FB7C504 | |||
| 6196 | msiexec.exe | C:\Windows\Installer\MSIA7A9.tmp | binary | |
MD5:47066AAEE53F8E10E79FD2A676AD115D | SHA256:5BD4F11305A3CDBE7809883B21D11AABB26F64779359890B86B95F955FD6323B | |||
| 6196 | msiexec.exe | C:\Windows\Temp\~DFBC0B32881F66D55A.TMP | binary | |
MD5:E38DB566EA4411D8584F3877C710C5A1 | SHA256:AC11C4C79EAE788416255EBB143F4E5CEF587F0F86C0C0548531BEDFBA73BBA9 | |||
| 6196 | msiexec.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{a1c900a2-3c15-4942-b8ae-52df578eef55}_OnDiskSnapshotProp | binary | |
MD5:E71B542853282511F1D491B0D9CFAEA7 | SHA256:9F60B0BF18BD6732727AEE06961E47FA26F4E101458BFF582EBD16F9AE42E1CB | |||
| 6196 | msiexec.exe | C:\Windows\Installer\MSIB97F.tmp | executable | |
MD5:0C8921BBCC37C6EFD34FAF44CF3B0CB5 | SHA256:FD622CF73EA951A6DE631063ABA856487D77745DD1500ADCA61902B8DDE56FE1 | |||
| 3032 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MW-2bd2962c-91b0-4eae-9ba2-b23e8754c29f\files.cab | compressed | |
MD5:FA946FBC8ADB45FF63876866DFC4BAF4 | SHA256:17E2B8DE9EF45AD708ADEEEE5A98CA753751E2E7ECFE83C53DDA44D6E04E354A | |||
| 3032 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MW-2bd2962c-91b0-4eae-9ba2-b23e8754c29f\msiwrapper.ini | binary | |
MD5:69B03E8B16861B807C048BD4C39E36BF | SHA256:459235DE151DE2960ECFF0F569D706D567C700529C658B43ED68ADCC798159C4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
716 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
3208 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
3208 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6672 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
4932 | systemtask.exe | GET | 200 | 166.1.160.237:443 | http://aikmouciiqgecoqi.xyz:443/api/client_hello | unknown | — | — | unknown |
4932 | systemtask.exe | GET | — | 166.1.160.237:443 | http://aikmouciiqgecoqi.xyz:443/avast_update | unknown | — | — | unknown |
4932 | systemtask.exe | POST | 200 | 166.1.160.237:443 | http://aikmouciiqgecoqi.xyz:443/api/client/new | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
440 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
716 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
716 | svchost.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
716 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
5064 | SearchApp.exe | 2.23.209.187:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
5064 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
1176 | svchost.exe | 20.190.159.23:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4932 | systemtask.exe | Misc activity | ET HUNTING EXE Base64 Encoded potential malware |
4932 | systemtask.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
4932 | systemtask.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
4932 | systemtask.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
4932 | systemtask.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
4932 | systemtask.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |