| URL: | http://appldnld.apple.com/Safari5/041-5487.20120509.INU8B/SafariSetup.exe |
| Full analysis: | https://app.any.run/tasks/68045b7e-495e-4c0c-9898-ce0391ace413 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 14, 2020, 11:53:41 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 812E2DF1BFA7F5C1F679189E3EAC2291 |
| SHA1: | 9D910A0FEE6167A84B19FD3037A821725AB9AE56 |
| SHA256: | 70E8420877109F616A009E0016D77B64D9C87DFC53D23D437770B01437BF7B44 |
| SSDEEP: | 3:N1Kf3LoyGMQO0WoV5LKwd2RlA:CfLLG00WLwdmlA |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 328 | "C:\Windows\system32\MsiExec.exe" /Y "C:\Program Files\Apple Software Update\SoftwareUpdateAdmin.dll" | C:\Windows\system32\MsiExec.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 352 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | — | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 504 | "C:\Users\admin\AppData\Local\Temp\IXP413.TMP\SetupAdmin.exe" /evt E85B /pid 1012 /mon 504 516 | C:\Users\admin\AppData\Local\Temp\IXP413.TMP\SetupAdmin.exe | — | MsiExec.exe | |||||||||||
User: admin Company: Apple Inc. Integrity Level: MEDIUM Description: Apple Installer (Elevated) Exit code: 3221226540 Version: 5.34.57.2 Modules
| |||||||||||||||
| 692 | C:\Windows\system32\svchost.exe -k RPCSS | C:\Windows\System32\svchost.exe | — | services.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 864 | C:\Windows\system32\svchost.exe -k netsvcs | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 920 | C:\Windows\system32\MsiExec.exe -Embedding 81B856220076EA27517691AC05C0070B | C:\Windows\system32\MsiExec.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 928 | "C:\Users\admin\AppData\Local\Temp\IXP413.TMP\SetupAdmin.exe" /evt E85B /pid 1012 /mon 504 516 | C:\Users\admin\AppData\Local\Temp\IXP413.TMP\SetupAdmin.exe | MsiExec.exe | ||||||||||||
User: admin Company: Apple Inc. Integrity Level: HIGH Description: Apple Installer (Elevated) Exit code: 0 Version: 5.34.57.2 Modules
| |||||||||||||||
| 960 | "C:\Users\admin\Downloads\SafariSetup.exe" | C:\Users\admin\Downloads\SafariSetup.exe | iexplore.exe | ||||||||||||
User: admin Company: Apple Inc. Integrity Level: MEDIUM Description: Safari Installer Exit code: 0 Version: 5.34.57.2 Modules
| |||||||||||||||
| 1012 | C:\Windows\system32\MsiExec.exe -Embedding C93C74AAF5FCF1B16E85A4A499ADD451 C | C:\Windows\system32\MsiExec.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1016 | C:\Windows\system32\MsiExec.exe -Embedding 9F85ED15A8E932183886D9E2DD4D5949 | C:\Windows\system32\MsiExec.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones |
| Operation: | write | Name: | SecuritySafe |
Value: 1 | |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active |
| Operation: | write | Name: | {8AD8DA01-36C4-11EA-AB41-5254004A04AF} |
Value: 0 | |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Type |
Value: 4 | |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Count |
Value: 2 | |||
| (PID) Process: | (2160) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Time |
Value: E407010002000E000B0035003900A700 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2160 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DFBE47E350CE805BD4.TMP | — | |
MD5:— | SHA256:— | |||
| 2160 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
| 2160 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 3840 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2NQ9D8JN\SafariSetup[1].exe | — | |
MD5:— | SHA256:— | |||
| 2160 | iexplore.exe | C:\Users\admin\Downloads\SafariSetup.exe | — | |
MD5:— | SHA256:— | |||
| 960 | SafariSetup.exe | C:\Users\admin\AppData\Local\Temp\IXP413.TMP\Safari.msi | — | |
MD5:— | SHA256:— | |||
| 1792 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSI41B2.tmp | — | |
MD5:— | SHA256:— | |||
| 1792 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSI4230.tmp | — | |
MD5:— | SHA256:— | |||
| 1792 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSI42AE.tmp | — | |
MD5:— | SHA256:— | |||
| 1792 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSI42CE.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2828 | WebKit2WebProcess.exe | GET | 301 | 2.17.4.238:80 | http://www.apple.com/startpage/ | unknown | — | — | whitelisted |
2828 | WebKit2WebProcess.exe | GET | 301 | 2.17.4.238:80 | http://www.apple.com/ | unknown | — | — | whitelisted |
2828 | WebKit2WebProcess.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D | US | der | 471 b | whitelisted |
2440 | Safari.exe | GET | 200 | 92.122.156.104:80 | http://configuration.apple.com/configurations/internetservices/safari/ConfigurationsWin-5.1.7.plist.signed | unknown | nib | 2.10 Kb | suspicious |
3840 | iexplore.exe | GET | 200 | 17.253.57.210:80 | http://appldnld.apple.com/Safari5/041-5487.20120509.INU8B/SafariSetup.exe | US | executable | 36.7 Mb | malicious |
2828 | WebKit2WebProcess.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEARgGBo5Qfjbr%2F1R0FS30Is%3D | US | der | 471 b | whitelisted |
2160 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
2440 | Safari.exe | GET | 200 | 172.217.23.131:80 | http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDr6AO8ib6TdQgAAAAAJe2h | US | der | 472 b | whitelisted |
2440 | Safari.exe | GET | 200 | 172.217.23.131:80 | http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D | US | der | 468 b | whitelisted |
2440 | Safari.exe | GET | 301 | 172.217.23.110:80 | http://news.google.com/?output=rss | US | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2160 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2828 | WebKit2WebProcess.exe | 2.17.4.238:80 | www.apple.com | Deutsche Telekom AG | — | unknown |
2828 | WebKit2WebProcess.exe | 2.17.4.238:443 | www.apple.com | Deutsche Telekom AG | — | unknown |
2828 | WebKit2WebProcess.exe | 66.117.29.6:443 | apple.tt.omtrdc.net | Adobe Systems Inc. | US | whitelisted |
2440 | Safari.exe | 172.217.23.110:443 | news.google.com | Google Inc. | US | whitelisted |
2440 | Safari.exe | 172.217.23.131:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
2440 | Safari.exe | 92.122.156.104:80 | configuration.apple.com | Akamai International B.V. | — | whitelisted |
3840 | iexplore.exe | 17.253.57.210:80 | appldnld.apple.com | Apple Inc. | US | suspicious |
2440 | Safari.exe | 172.217.23.110:80 | news.google.com | Google Inc. | US | whitelisted |
2828 | WebKit2WebProcess.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
appldnld.apple.com |
| malicious |
www.bing.com |
| whitelisted |
db._dns-sd._udp.8Óz |
| unknown |
r._dns-sd._udp.8Óz |
| unknown |
dr._dns-sd._udp.8Óz |
| unknown |
lb._dns-sd._udp.8Óz |
| unknown |
b._dns-sd._udp.0.100.168.192.in-addr.arpa |
| unknown |
db._dns-sd._udp.0.100.168.192.in-addr.arpa |
| unknown |
r._dns-sd._udp.0.100.168.192.in-addr.arpa |
| unknown |
dr._dns-sd._udp.0.100.168.192.in-addr.arpa |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3840 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3840 | iexplore.exe | Misc activity | ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) |
Process | Message |
|---|---|
WebKit2WebProcess.exe | Safari
|
WebKit2WebProcess.exe | ASL checking for logging parameters in environment variable "WebKit2WebProcess.exe.log"
|
WebKit2WebProcess.exe | ASL checking for logging parameters in environment variable "asl.log"
|
WebKit2WebProcess.exe | [com.apple.WebKit2WebProcess WebKit2WebProcess.exe] (Initialize|Accept)SecurityContext failed with error 0x80090326
|
WebKit2WebProcess.exe | ASL logging to file "C:\Users\admin\AppData\Roaming\Apple Computer\Logs\asl.115621_14Jan20.log"
|
WebKit2WebProcess.exe | [com.apple.WebKit2WebProcess WebKit2WebProcess.exe] CertGetCertificateChain failed with error 0x80090301
|
WebKit2WebProcess.exe | [com.apple.WebKit2WebProcess WebKit2WebProcess.exe] (Initialize|Accept)SecurityContext failed with error 0x80090326
|
WebKit2WebProcess.exe | [com.apple.WebKit2WebProcess WebKit2WebProcess.exe] CertGetCertificateChain failed with error 0x80090301
|