File name:

782462857fa6aa85c7f7378b82974a0ebdf4a13ffdd219ba0a416e5af92e2e23.msi

Full analysis: https://app.any.run/tasks/d5894c1f-c75c-4a53-8fa7-10a7633b9f30
Verdict: Malicious activity
Analysis date: July 02, 2024, 17:30:17
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: easyConverter SDK 4 Word, Author: BCL Technologies, Keywords: BCL easyConverter SDK Word, Comments: (C) 2016 BCL Technologies, Template: Intel;1033, Revision Number: {31248407-0343-46D6-B37F-B147C0BDE56B}, Create Time/Date: Thu Jul 28 20:42:16 2016, Last Saved Time/Date: Thu Jul 28 20:42:16 2016, Number of Pages: 100, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.9.1208.0), Security: 2
MD5:

BA5DE7BD59011DE17B4F636180D38825

SHA1:

2B2303CD14B40EB03D63D0759701567EAE3CDDB0

SHA256:

782462857FA6AA85C7F7378B82974A0EBDF4A13FFDD219BA0A416E5AF92E2E23

SSDEEP:

98304:iylneOCpTxLxhwYjD+AIptwfC15g9mlk67x5koPU6M2maIo8Zp01nkCZTEu8wkV3:chbc4dQWImv4Nn7TtujyuXVQfRe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 3392)
    • Registers / Runs the DLL via REGSVR32.EXE

      • msiexec.exe (PID: 3392)
  • SUSPICIOUS

    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 3556)
      • msiexec.exe (PID: 3392)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3180)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 3392)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 3392)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 6316)
      • msiexec.exe (PID: 3392)
  • INFO

    • Reads the software policy settings

      • msiexec.exe (PID: 3556)
      • msiexec.exe (PID: 3392)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 3556)
    • An automatically generated document

      • msiexec.exe (PID: 3556)
    • Checks proxy server information

      • msiexec.exe (PID: 3556)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 3556)
    • Reads the computer name

      • msiexec.exe (PID: 3392)
      • msiexec.exe (PID: 1648)
      • becldr.exe (PID: 6376)
    • Checks supported languages

      • msiexec.exe (PID: 3392)
      • msiexec.exe (PID: 1648)
      • becldr.exe (PID: 6376)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3556)
      • msiexec.exe (PID: 3392)
    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 3556)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 3392)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3392)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: easyConverter SDK 4 Word
Author: BCL Technologies
Keywords: BCL easyConverter SDK Word
Comments: (C) 2016 BCL Technologies
Template: Intel;1033
RevisionNumber: {31248407-0343-46D6-B37F-B147C0BDE56B}
CreateDate: 2016:07:28 20:42:16
ModifyDate: 2016:07:28 20:42:16
Pages: 100
Words: 2
Software: Windows Installer XML Toolset (3.9.1208.0)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
8
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs regsvr32.exe no specs becldr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1648C:\Windows\syswow64\MsiExec.exe -Embedding 463D246A85747EE9A38E47F86BC593BB CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3180C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3392C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3556"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\782462857fa6aa85c7f7378b82974a0ebdf4a13ffdd219ba0a416e5af92e2e23.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4276C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6316"C:\WINDOWS\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\BCL Technologies\easyConverter SDK 4\Rtf\beconv.dll"C:\Windows\SysWOW64\regsvr32.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6376"C:\Program Files (x86)\BCL Technologies\easyConverter SDK 4\Common\becldr.exe" "C:\Program Files (x86)\BCL Technologies\easyConverter SDK 4\Common\becldr.exe" /RegServerC:\Program Files (x86)\BCL Technologies\easyConverter SDK 4\Common\becldr.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Description:
BCL EasyConverter Loader
Exit code:
0
Version:
4, 0, 0, 1
Modules
Images
c:\program files (x86)\bcl technologies\easyconverter sdk 4\common\becldr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
Total events
14 925
Read events
14 289
Write events
607
Delete events
29

Modification events

(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4800000000000000CFDD4D8CA5CCDA01400D0000F8040000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000005942508CA5CCDA01400D0000F8040000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
48000000000000008978898CA5CCDA01400D0000F8040000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
48000000000000008978898CA5CCDA01400D0000F8040000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000EA2F8E8CA5CCDA01400D0000F8040000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000001795908CA5CCDA01400D0000F8040000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000D1EFEF8CA5CCDA01400D0000F8040000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3392) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000FF53F28CA5CCDA01400D000040130000E8030000010000000000000000000000CACAEB44F0C26047BA654E6AC871CA3C00000000000000000000000000000000
(PID) Process:(3180) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000064B7F48CA5CCDA016C0C00009C0C0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
29
Suspicious files
110
Text files
80
Unknown types
47

Dropped files

PID
Process
Filename
Type
3392msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
3392msiexec.exeC:\WINDOWS\Installer\1b2576.msi
MD5:
SHA256:
3556msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EA618097E393409AFA316F0F87E2C202_FF5EB26160850ADC74D22788914C1202der
MD5:5B79AA149A22607775D15C7E0255BACA
SHA256:9ABF4786A396CDAEE2F7E512C162DECBFB6BC90DD2F411EE1CA39E978FE1D5A1
3392msiexec.exeC:\Program Files (x86)\BCL Technologies\easyConverter SDK 4\Common\Resource\90ms-RKSJ-Hbinary
MD5:228A3E09302BBDBC66D6F5C643D8444F
SHA256:D4D1781BB79AB6CD34AEC3A5AFE8FC9111E611F9F2983CEA0EEF616E85F38B67
3392msiexec.exeC:\WINDOWS\TEMP\~DF10A535E8D99C1287.TMPbinary
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
3392msiexec.exeC:\Program Files (x86)\BCL Technologies\easyConverter SDK 4\Common\Resource\90ms-RKSJ-Vbinary
MD5:3907193B99CD738EB1C1ACB1B4152ECB
SHA256:CFA3DA1ED44C6517A4D968E2F908FDDECE340FF797ECF9B9B028A875C41EF47D
3392msiexec.exeC:\WINDOWS\Installer\MSI2A58.tmpbinary
MD5:8E2A11B01A29E9EE68FDC0DD4A8AEC8F
SHA256:760B79C02483A96675AA5AC6764A6FE47A5F726AE27EF1403B4535D05DCB3B57
3392msiexec.exeC:\WINDOWS\Installer\inprogressinstallinfo.ipibinary
MD5:A04135ECEC62ED094D34A029A7F52122
SHA256:3F9B221FD0A1B160466B7D54860FA55BB8E794035BE51E0C3D02FF4D86B79E27
3392msiexec.exeC:\Program Files (x86)\BCL Technologies\easyConverter SDK 4\Common\Resource\90ms-RKSJ-UCS2binary
MD5:931262181FF6C52E3FDBD648C9808062
SHA256:542C30FC65095E0140784D63B0906C16CA221F3C55061079DFEC0A709E300873
3392msiexec.exeC:\Program Files (x86)\BCL Technologies\easyConverter SDK 4\Common\Resource\90msp-RKSJ-Hps
MD5:AE871D0E24E3CC7F23E07A072E9EAF72
SHA256:2212DD34CEC2AA77EEB1C0B926367DC933F8BF5FB5DF973F8E1371FEDA3A5BAE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
63
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3556
msiexec.exe
GET
200
152.199.19.74:80
http://s2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCED141%2Fl2SWCyYX308B7Khio%3D
unknown
unknown
3556
msiexec.exe
GET
200
152.199.19.74:80
http://s2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCED141%2Fl2SWCyYX308B7Khio%3D
unknown
unknown
3556
msiexec.exe
GET
200
192.229.221.95:80
http://s1.symcb.com/pca3-g5.crl
unknown
unknown
3556
msiexec.exe
GET
200
152.199.19.74:80
http://sv.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQe6LNDJdqx%2BJOp7hVgTeaGFJ%2FCQgQUljtT8Hkzl699g%2B8uK8zKt4YecmYCEAY32wra%2BgI8deasQ1ULEtU%3D
unknown
unknown
1544
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
4656
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
unknown
3800
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
3040
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
unknown
3800
svchost.exe
GET
200
2.21.20.133:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
2364
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2624
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5636
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
3800
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3556
msiexec.exe
152.199.19.74:80
s2.symcb.com
EDGECAST
US
unknown
3556
msiexec.exe
192.229.221.95:80
s1.symcb.com
EDGECAST
US
whitelisted
3040
OfficeClickToRun.exe
13.89.179.10:443
self.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3040
OfficeClickToRun.exe
192.229.221.95:80
s1.symcb.com
EDGECAST
US
whitelisted
3800
svchost.exe
2.21.20.133:80
crl.microsoft.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
s2.symcb.com
  • 152.199.19.74
whitelisted
s1.symcb.com
  • 192.229.221.95
whitelisted
sv.symcd.com
  • 152.199.19.74
shared
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
self.events.data.microsoft.com
  • 13.89.179.10
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 2.21.20.133
  • 2.21.20.137
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.0
  • 20.190.159.23
  • 40.126.31.73
  • 20.190.159.75
  • 40.126.31.71
  • 20.190.159.4
  • 20.190.159.68
whitelisted
www.bing.com
  • 104.126.37.152
  • 104.126.37.144
  • 104.126.37.139
  • 104.126.37.137
  • 104.126.37.153
  • 104.126.37.146
  • 104.126.37.136
  • 104.126.37.147
  • 104.126.37.155
whitelisted

Threats

No threats detected
No debug info