URL:

http://appldnld.apple.com/Safari5/041-5487.20120509.INU8B/SafariSetup.exe

Full analysis: https://app.any.run/tasks/68045b7e-495e-4c0c-9898-ce0391ace413
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 14, 2020, 11:53:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

812E2DF1BFA7F5C1F679189E3EAC2291

SHA1:

9D910A0FEE6167A84B19FD3037A821725AB9AE56

SHA256:

70E8420877109F616A009E0016D77B64D9C87DFC53D23D437770B01437BF7B44

SSDEEP:

3:N1Kf3LoyGMQO0WoV5LKwd2RlA:CfLLG00WLwdmlA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3840)
    • Application was dropped or rewritten from another process

      • SafariSetup.exe (PID: 960)
      • SetupAdmin.exe (PID: 504)
      • SetupAdmin.exe (PID: 928)
      • SoftwareUpdate.exe (PID: 3892)
      • mDNSResponder.exe (PID: 2696)
      • Safari.exe (PID: 2440)
      • WebKit2WebProcess.exe (PID: 2828)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 2748)
      • SoftwareUpdate.exe (PID: 3892)
      • svchost.exe (PID: 692)
      • MsiExec.exe (PID: 328)
      • DllHost.exe (PID: 2276)
      • svchost.exe (PID: 864)
      • explorer.exe (PID: 352)
      • MsiExec.exe (PID: 3124)
      • Safari.exe (PID: 2440)
      • WebKit2WebProcess.exe (PID: 2828)
    • Loads the Task Scheduler COM API

      • MsiExec.exe (PID: 3864)
      • DllHost.exe (PID: 2276)
  • SUSPICIOUS

    • Starts Internet Explorer

      • explorer.exe (PID: 352)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 352)
    • Starts Microsoft Installer

      • SafariSetup.exe (PID: 960)
    • Creates COM task schedule object

      • MsiExec.exe (PID: 328)
      • msiexec.exe (PID: 2876)
    • Executable content was dropped or overwritten

      • SafariSetup.exe (PID: 960)
      • msiexec.exe (PID: 1792)
      • msiexec.exe (PID: 2876)
    • Executed via COM

      • DllHost.exe (PID: 2276)
    • Creates files in the Windows directory

      • svchost.exe (PID: 864)
      • msiexec.exe (PID: 2876)
    • Executed as Windows Service

      • mDNSResponder.exe (PID: 2696)
      • vssvc.exe (PID: 1576)
    • Creates files in the user directory

      • msiexec.exe (PID: 2876)
      • Safari.exe (PID: 2440)
      • WebKit2WebProcess.exe (PID: 2828)
    • Modifies the open verb of a shell class

      • msiexec.exe (PID: 2876)
    • Removes files from Windows directory

      • msiexec.exe (PID: 2876)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2160)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3840)
      • iexplore.exe (PID: 2160)
    • Application launched itself

      • iexplore.exe (PID: 2160)
      • msiexec.exe (PID: 2876)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 1016)
      • MsiExec.exe (PID: 1012)
      • MsiExec.exe (PID: 3864)
      • MsiExec.exe (PID: 2932)
      • MsiExec.exe (PID: 3712)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2876)
    • Searches for installed software

      • msiexec.exe (PID: 2876)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 1576)
    • Dropped object may contain Bitcoin addresses

      • msiexec.exe (PID: 2876)
    • Creates files in the program directory

      • msiexec.exe (PID: 2876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
67
Monitored processes
26
Malicious processes
9
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start iexplore.exe iexplore.exe safarisetup.exe msiexec.exe msiexec.exe msiexec.exe no specs setupadmin.exe no specs setupadmin.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs softwareupdate.exe no specs AppleSoftwareUpdateAdmin no specs svchost.exe no specs msiexec.exe no specs svchost.exe explorer.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs mdnsresponder.exe vssvc.exe no specs msiexec.exe no specs msiexec.exe no specs safari.exe webkit2webprocess.exe

Process information

PID
CMD
Path
Indicators
Parent process
328"C:\Windows\system32\MsiExec.exe" /Y "C:\Program Files\Apple Software Update\SoftwareUpdateAdmin.dll"C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
352C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
504"C:\Users\admin\AppData\Local\Temp\IXP413.TMP\SetupAdmin.exe" /evt E85B /pid 1012 /mon 504 516 C:\Users\admin\AppData\Local\Temp\IXP413.TMP\SetupAdmin.exeMsiExec.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
Apple Installer (Elevated)
Exit code:
3221226540
Version:
5.34.57.2
Modules
Images
c:\users\admin\appdata\local\temp\ixp413.tmp\setupadmin.exe
c:\systemroot\system32\ntdll.dll
692C:\Windows\system32\svchost.exe -k RPCSSC:\Windows\System32\svchost.exeservices.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\rpcepmap.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\secur32.dll
864C:\Windows\system32\svchost.exe -k netsvcsC:\Windows\System32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
920C:\Windows\system32\MsiExec.exe -Embedding 81B856220076EA27517691AC05C0070BC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
928"C:\Users\admin\AppData\Local\Temp\IXP413.TMP\SetupAdmin.exe" /evt E85B /pid 1012 /mon 504 516 C:\Users\admin\AppData\Local\Temp\IXP413.TMP\SetupAdmin.exe
MsiExec.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
HIGH
Description:
Apple Installer (Elevated)
Exit code:
0
Version:
5.34.57.2
Modules
Images
c:\users\admin\appdata\local\temp\ixp413.tmp\setupadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
960"C:\Users\admin\Downloads\SafariSetup.exe" C:\Users\admin\Downloads\SafariSetup.exe
iexplore.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
Safari Installer
Exit code:
0
Version:
5.34.57.2
Modules
Images
c:\users\admin\downloads\safarisetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1012C:\Windows\system32\MsiExec.exe -Embedding C93C74AAF5FCF1B16E85A4A499ADD451 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1016C:\Windows\system32\MsiExec.exe -Embedding 9F85ED15A8E932183886D9E2DD4D5949C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
12 455
Read events
9 978
Write events
2 420
Delete events
57

Modification events

(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{8AD8DA01-36C4-11EA-AB41-5254004A04AF}
Value:
0
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2160) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E407010002000E000B0035003900A700
Executable files
127
Suspicious files
83
Text files
881
Unknown types
61

Dropped files

PID
Process
Filename
Type
2160iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFBE47E350CE805BD4.TMP
MD5:
SHA256:
2160iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2160iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3840iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2NQ9D8JN\SafariSetup[1].exe
MD5:
SHA256:
2160iexplore.exeC:\Users\admin\Downloads\SafariSetup.exe
MD5:
SHA256:
960SafariSetup.exeC:\Users\admin\AppData\Local\Temp\IXP413.TMP\Safari.msi
MD5:
SHA256:
1792msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI41B2.tmp
MD5:
SHA256:
1792msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI4230.tmp
MD5:
SHA256:
1792msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI42AE.tmp
MD5:
SHA256:
1792msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI42CE.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
17
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2828
WebKit2WebProcess.exe
GET
301
2.17.4.238:80
http://www.apple.com/startpage/
unknown
whitelisted
2828
WebKit2WebProcess.exe
GET
301
2.17.4.238:80
http://www.apple.com/
unknown
whitelisted
2828
WebKit2WebProcess.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
US
der
471 b
whitelisted
2440
Safari.exe
GET
200
92.122.156.104:80
http://configuration.apple.com/configurations/internetservices/safari/ConfigurationsWin-5.1.7.plist.signed
unknown
nib
2.10 Kb
suspicious
3840
iexplore.exe
GET
200
17.253.57.210:80
http://appldnld.apple.com/Safari5/041-5487.20120509.INU8B/SafariSetup.exe
US
executable
36.7 Mb
malicious
2828
WebKit2WebProcess.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEARgGBo5Qfjbr%2F1R0FS30Is%3D
US
der
471 b
whitelisted
2160
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2440
Safari.exe
GET
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDr6AO8ib6TdQgAAAAAJe2h
US
der
472 b
whitelisted
2440
Safari.exe
GET
200
172.217.23.131:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2440
Safari.exe
GET
301
172.217.23.110:80
http://news.google.com/?output=rss
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2160
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2828
WebKit2WebProcess.exe
2.17.4.238:80
www.apple.com
Deutsche Telekom AG
unknown
2828
WebKit2WebProcess.exe
2.17.4.238:443
www.apple.com
Deutsche Telekom AG
unknown
2828
WebKit2WebProcess.exe
66.117.29.6:443
apple.tt.omtrdc.net
Adobe Systems Inc.
US
whitelisted
2440
Safari.exe
172.217.23.110:443
news.google.com
Google Inc.
US
whitelisted
2440
Safari.exe
172.217.23.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
2440
Safari.exe
92.122.156.104:80
configuration.apple.com
Akamai International B.V.
whitelisted
3840
iexplore.exe
17.253.57.210:80
appldnld.apple.com
Apple Inc.
US
suspicious
2440
Safari.exe
172.217.23.110:80
news.google.com
Google Inc.
US
whitelisted
2828
WebKit2WebProcess.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
appldnld.apple.com
  • 17.253.57.210
  • 17.253.57.208
malicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
db._dns-sd._udp.8Óz
unknown
r._dns-sd._udp.8Óz
unknown
dr._dns-sd._udp.8Óz
unknown
lb._dns-sd._udp.8Óz
unknown
b._dns-sd._udp.0.100.168.192.in-addr.arpa
unknown
db._dns-sd._udp.0.100.168.192.in-addr.arpa
unknown
r._dns-sd._udp.0.100.168.192.in-addr.arpa
unknown
dr._dns-sd._udp.0.100.168.192.in-addr.arpa
unknown

Threats

PID
Process
Class
Message
3840
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3840
iexplore.exe
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
Process
Message
WebKit2WebProcess.exe
Safari
WebKit2WebProcess.exe
ASL checking for logging parameters in environment variable "WebKit2WebProcess.exe.log"
WebKit2WebProcess.exe
ASL checking for logging parameters in environment variable "asl.log"
WebKit2WebProcess.exe
[com.apple.WebKit2WebProcess WebKit2WebProcess.exe] (Initialize|Accept)SecurityContext failed with error 0x80090326
WebKit2WebProcess.exe
ASL logging to file "C:\Users\admin\AppData\Roaming\Apple Computer\Logs\asl.115621_14Jan20.log"
WebKit2WebProcess.exe
[com.apple.WebKit2WebProcess WebKit2WebProcess.exe] CertGetCertificateChain failed with error 0x80090301
WebKit2WebProcess.exe
[com.apple.WebKit2WebProcess WebKit2WebProcess.exe] (Initialize|Accept)SecurityContext failed with error 0x80090326
WebKit2WebProcess.exe
[com.apple.WebKit2WebProcess WebKit2WebProcess.exe] CertGetCertificateChain failed with error 0x80090301