File name:

tightvnc-2.8.84-gpl-setup-32bit.msi

Full analysis: https://app.any.run/tasks/6be2f140-c190-4df6-95ad-7999ab8274ba
Verdict: Malicious activity
Analysis date: May 28, 2024, 15:39:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: TightVNC, Author: GlavSoft LLC., Keywords: Installer, Comments: This installer database contains the logic and data required to install TightVNC., Template: Intel;1033, Revision Number: {E3F7046B-43B7-475F-A50D-785A7AD35191}, Create Time/Date: Wed May 8 07:06:12 2024, Last Saved Time/Date: Wed May 8 07:06:12 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
MD5:

1D061EA0A0413669C4320040B308CB4C

SHA1:

DDAC4E4CC6A510F5B48E168293961F71A4318DE2

SHA256:

74777A93BA424EE70B3020AF8BA03E7A6A618C74AB447F83291AAD5211F1A3EA

SSDEEP:

98304:29FMEM2zLOPN5uuBq9L4/c5TI98y5BcOBvn73wAMEoI4Ty0M33/0fnraa5ybtY:yR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 3972)
      • msiexec.exe (PID: 4020)
    • Changes the autorun value in the registry

      • tvnserver.exe (PID: 2256)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • msiexec.exe (PID: 4020)
    • Executes as Windows Service

      • VSSVC.exe (PID: 1200)
      • tvnserver.exe (PID: 1804)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 4020)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 4020)
    • Application launched itself

      • tvnserver.exe (PID: 824)
      • tvnserver.exe (PID: 444)
  • INFO

    • Reads the software policy settings

      • msiexec.exe (PID: 3972)
      • msiexec.exe (PID: 4020)
    • Reads the computer name

      • msiexec.exe (PID: 4020)
      • msiexec.exe (PID: 4060)
      • msiexec.exe (PID: 1132)
      • msiexec.exe (PID: 1552)
      • tvnserver.exe (PID: 2256)
      • tvnserver.exe (PID: 824)
      • tvnserver.exe (PID: 1804)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 3972)
    • Checks supported languages

      • msiexec.exe (PID: 4020)
      • msiexec.exe (PID: 4060)
      • msiexec.exe (PID: 1132)
      • msiexec.exe (PID: 1552)
      • tvnserver.exe (PID: 2256)
      • tvnserver.exe (PID: 824)
      • tvnserver.exe (PID: 2464)
      • tvnserver.exe (PID: 1804)
      • tvnviewer.exe (PID: 2656)
      • tvnserver.exe (PID: 444)
      • tvnserver.exe (PID: 2476)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 4020)
      • msiexec.exe (PID: 4060)
      • msiexec.exe (PID: 1132)
      • msiexec.exe (PID: 1552)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3972)
      • msiexec.exe (PID: 4020)
    • Application launched itself

      • msiexec.exe (PID: 4020)
    • Create files in a temporary directory

      • msiexec.exe (PID: 4020)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 4020)
    • Manual execution by a user

      • tvnviewer.exe (PID: 2656)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: TightVNC
Author: GlavSoft LLC.
Keywords: Installer
Comments: This installer database contains the logic and data required to install TightVNC.
Template: Intel;1033
RevisionNumber: {E3F7046B-43B7-475F-A50D-785A7AD35191}
CreateDate: 2024:05:08 07:06:12
ModifyDate: 2024:05:08 07:06:12
Pages: 200
Words: 2
Software: Windows Installer XML Toolset (3.11.2.4516)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
13
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs msiexec.exe no specs msiexec.exe no specs tvnserver.exe tvnserver.exe no specs tvnserver.exe no specs tvnserver.exe no specs tvnserver.exe tvnserver.exe tvnviewer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
444"C:\Program Files\TightVNC\tvnserver.exe" -checkservicepasswordsC:\Program Files\TightVNC\tvnserver.exemsiexec.exe
User:
admin
Company:
GlavSoft LLC.
Integrity Level:
MEDIUM
Description:
TightVNC Server
Exit code:
0
Version:
2, 8, 84, 0
Modules
Images
c:\program files\tightvnc\tvnserver.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
824"C:\Program Files\TightVNC\tvnserver.exe" -startC:\Program Files\TightVNC\tvnserver.exemsiexec.exe
User:
admin
Company:
GlavSoft LLC.
Integrity Level:
MEDIUM
Description:
TightVNC Server
Exit code:
0
Version:
2, 8, 84, 0
Modules
Images
c:\program files\tightvnc\tvnserver.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1132C:\Windows\system32\MsiExec.exe -Embedding 4359C2A185FCDFA5C95ECE89A7170BF8C:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1200C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1552C:\Windows\system32\MsiExec.exe -Embedding E547009CDBB2C079299F71A45E85DEF5 E Global\MSI0000C:\Windows\System32\msiexec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1804"C:\Program Files\TightVNC\tvnserver.exe" -serviceC:\Program Files\TightVNC\tvnserver.exeservices.exe
User:
SYSTEM
Company:
GlavSoft LLC.
Integrity Level:
SYSTEM
Description:
TightVNC Server
Version:
2, 8, 84, 0
Modules
Images
c:\program files\tightvnc\tvnserver.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2256"C:\Program Files\TightVNC\tvnserver.exe" -reinstall -silentC:\Program Files\TightVNC\tvnserver.exe
msiexec.exe
User:
admin
Company:
GlavSoft LLC.
Integrity Level:
MEDIUM
Description:
TightVNC Server
Exit code:
0
Version:
2, 8, 84, 0
Modules
Images
c:\program files\tightvnc\tvnserver.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2464"C:\Program Files\TightVNC\tvnserver.exe" -controlservice -slaveC:\Program Files\TightVNC\tvnserver.exe
tvnserver.exe
User:
SYSTEM
Company:
GlavSoft LLC.
Integrity Level:
SYSTEM
Description:
TightVNC Server
Version:
2, 8, 84, 0
Modules
Images
c:\program files\tightvnc\tvnserver.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2476"C:\Program Files\TightVNC\tvnserver.exe" -controlservice -reloadC:\Program Files\TightVNC\tvnserver.exe
tvnserver.exe
User:
SYSTEM
Company:
GlavSoft LLC.
Integrity Level:
SYSTEM
Description:
TightVNC Server
Exit code:
0
Version:
2, 8, 84, 0
Modules
Images
c:\program files\tightvnc\tvnserver.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2656"C:\Program Files\TightVNC\tvnviewer.exe" C:\Program Files\TightVNC\tvnviewer.exeexplorer.exe
User:
admin
Company:
GlavSoft LLC.
Integrity Level:
MEDIUM
Description:
TightVNC Viewer
Exit code:
0
Version:
2, 8, 84, 0
Modules
Images
c:\program files\tightvnc\tvnviewer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
14 158
Read events
13 719
Write events
423
Delete events
16

Modification events

(PID) Process:(3972) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(4020) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
400000000000000086F4515915B1DA01B40F000000040000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4020) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
400000000000000086F4515915B1DA01B40F000000040000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4020) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
75
(PID) Process:(4020) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
40000000000000005A75155A15B1DA01B40F000000040000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4020) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000B4D7175A15B1DA01B40F0000EC070000E80300000100000000000000000000007533668F9B99C64DB66399535A48C6B30000000000000000
(PID) Process:(1200) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000084EA2A5A15B1DA01B004000048010000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1200) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000084EA2A5A15B1DA01B0040000A0030000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1200) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000084EA2A5A15B1DA01B004000038080000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1200) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000084EA2A5A15B1DA01B0040000A0040000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
Executable files
13
Suspicious files
16
Text files
3
Unknown types
5

Dropped files

PID
Process
Filename
Type
4020msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
3972msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI5C2B.tmpexecutable
MD5:A3AE5D86ECF38DB9427359EA37A5F646
SHA256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
4020msiexec.exeC:\Windows\Installer\10da25.msiexecutable
MD5:1D061EA0A0413669C4320040B308CB4C
SHA256:74777A93BA424EE70B3020AF8BA03E7A6A618C74AB447F83291AAD5211F1A3EA
4020msiexec.exeC:\Windows\Installer\MSIE332.tmpexecutable
MD5:A3AE5D86ECF38DB9427359EA37A5F646
SHA256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
4020msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{8f663375-999b-4dc6-b663-99535a48c6b3}_OnDiskSnapshotPropbinary
MD5:8391AF5E7D968C1734199F1C528FAA62
SHA256:CFDDC68799F5DDF0A51FB0F49F67F6687E9C5D98ABD3BE73C7AB6D7F0B1A4FF4
4020msiexec.exeC:\Users\admin\AppData\Local\Temp\~DF5FA16CC8FA5042A1.TMPgmc
MD5:2C390CAC8DFB1EC1C109C2365116CA0D
SHA256:077B866BF4F2649F33E2D9FBA18D45C80AE4B63DF2EAD95C92EE2C72D27F5247
4020msiexec.exeC:\Windows\Installer\MSIE312.tmpexecutable
MD5:93394D2866590FB66759F5F0263453F2
SHA256:5C29B8255ACE0CD94C066C528C8AD04F0F45EBA12FCF94DA7B9CA1B64AD4288B
4020msiexec.exeC:\Windows\Installer\MSIE301.tmpexecutable
MD5:93394D2866590FB66759F5F0263453F2
SHA256:5C29B8255ACE0CD94C066C528C8AD04F0F45EBA12FCF94DA7B9CA1B64AD4288B
4020msiexec.exeC:\Windows\Installer\10da26.ipibinary
MD5:AB85BEC6C2CD9E2DF918DA61674ED078
SHA256:4770CD453F61677292AA4A8A2E62002FF95742B286FE813C8A2A0A73B49BEF97
4020msiexec.exeC:\Windows\Installer\MSIE282.tmpbinary
MD5:C982193AA71387041B08163132DEC292
SHA256:BA0C49DE0FC34CB98D5AEDADA92BBBA7421AEFD3EA5F7EDF9BDB61A6B6FAE4B7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info