File name: | 55.msi |
Full analysis: | https://app.any.run/tasks/0fbea0aa-c272-495c-8c03-1c7e3c076f97 |
Verdict: | Malicious activity |
Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
Analysis date: | November 15, 2018, 11:43:29 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-msi |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Last Printed: Fri Sep 21 10:56:09 2012, Create Time/Date: Fri Sep 21 10:56:09 2012, Name of Creating Application: Windows Installer, Title: Exe to msi converter free, Author: www.exetomsi.com, Template: ;0, Last Saved By: devuser, Revision Number: {C35CF0AA-9B3F-4903-9F05-EBF606D58D3E}, Last Saved Time/Date: Tue May 21 12:56:44 2013, Number of Pages: 100, Number of Words: 0, Security: 0 |
MD5: | C85CF0DFA2801FF99A97063F961B37A4 |
SHA1: | A69FD66B2569BD749A0142BA8F53B38D7448755A |
SHA256: | 82970BCF938FCFB390F3BC527BB3F87BB34559A0484727DB86CA4A08F4DD14C2 |
SSDEEP: | 12288:/ER/sOFdDnI4m5RZ0EG8iHJyc65ozvIY9Y4k1q:/ERPjDnI4OBipyx5ozv1Y4V |
.msi | | | Microsoft Installer (100) |
---|
CodePage: | Windows Latin 1 (Western European) |
---|---|
LastPrinted: | 2012:09:21 09:56:09 |
CreateDate: | 2012:09:21 09:56:09 |
Software: | Windows Installer |
Title: | Exe to msi converter free |
Subject: | - |
Author: | www.exetomsi.com |
Keywords: | - |
Comments: | - |
Template: | ;0 |
LastModifiedBy: | devuser |
RevisionNumber: | {C35CF0AA-9B3F-4903-9F05-EBF606D58D3E} |
ModifyDate: | 2013:05:21 11:56:44 |
Pages: | 100 |
Words: | - |
Security: | None |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1392 | "C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\55.msi" | C:\Windows\System32\msiexec.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.7600.16385 (win7_rtm.090713-1255) | ||||
3572 | C:\Windows\system32\msiexec.exe /V | C:\Windows\system32\msiexec.exe | services.exe | |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Version: 5.0.7600.16385 (win7_rtm.090713-1255) | ||||
2024 | C:\Windows\system32\vssvc.exe | C:\Windows\system32\vssvc.exe | — | services.exe |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2184 | DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot18" "" "" "6792c44eb" "00000000" "000004E0" "000005BC" | C:\Windows\system32\DrvInst.exe | — | svchost.exe |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2068 | "C:\Windows\Installer\MSIE2EB.tmp" | C:\Windows\Installer\MSIE2EB.tmp | msiexec.exe | |
User: admin Company: News Corporation Integrity Level: MEDIUM Description: Rowprovider Settings Chances Verschluckt |
PID | Process | Filename | Type | |
---|---|---|---|---|
3572 | msiexec.exe | C:\System Volume Information\SPP\metadata-2 | — | |
MD5:— | SHA256:— | |||
2184 | DrvInst.exe | C:\Windows\INF\setupapi.ev3 | binary | |
MD5:80B77BD9EC39520E5F07B2BF31E363F3 | SHA256:5358BA868639D8703C840259DBC92E99AD90507C3525B0613A78F065070C16B5 | |||
2184 | DrvInst.exe | C:\Windows\INF\setupapi.dev.log | ini | |
MD5:4DC049F4CB64A78BEC16A10487446501 | SHA256:B6043C54009ED4C543A8B94BADA35C98FC0BFAA83D39B8F8833F63586BA2BD7F | |||
3572 | msiexec.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{c5ee5e13-999c-4e64-b5c6-3f25bf956a8b}_OnDiskSnapshotProp | binary | |
MD5:D98F11C44B15AA89FB29DE4D31713451 | SHA256:7839F29CAC8F4B8BE866CD4670C5013B5A6F8EA53103D091BCF99C2B19D8C6F2 | |||
2184 | DrvInst.exe | C:\Windows\INF\setupapi.ev1 | binary | |
MD5:A0B79E3CE3077061C70441B2AD2C3147 | SHA256:3BD2C24A4FEAD72C44124639183A4214BC1AAD1841CDE068AC8A29B6ADCA16A2 | |||
3572 | msiexec.exe | C:\System Volume Information\SPP\snapshot-2 | binary | |
MD5:D98F11C44B15AA89FB29DE4D31713451 | SHA256:7839F29CAC8F4B8BE866CD4670C5013B5A6F8EA53103D091BCF99C2B19D8C6F2 | |||
3572 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\~DFB96A455D0F589975.TMP | — | |
MD5:— | SHA256:— | |||
2024 | vssvc.exe | C: | — | |
MD5:— | SHA256:— | |||
3572 | msiexec.exe | C:\Windows\Installer\5ddbf4.msi | executable | |
MD5:C85CF0DFA2801FF99A97063F961B37A4 | SHA256:82970BCF938FCFB390F3BC527BB3F87BB34559A0484727DB86CA4A08F4DD14C2 | |||
3572 | msiexec.exe | C:\Windows\Installer\MSIE182.tmp | binary | |
MD5:D2C3DEA902F0A88B2E3C45EC0358EC0D | SHA256:E2BB7222FA4036A52EEB16EFE0B398A3A99C529F3014E3CA797BAEFD91BDCB77 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2068 | MSIE2EB.tmp | POST | — | 103.63.2.245:80 | http://slimiyt.us/coastgard/index.php | HK | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2068 | MSIE2EB.tmp | 103.63.2.245:80 | slimiyt.us | Guochao Group limited | HK | suspicious |
Domain | IP | Reputation |
---|---|---|
slimiyt.us |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
2068 | MSIE2EB.tmp | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 5 |
2068 | MSIE2EB.tmp | A Network Trojan was detected | ET TROJAN AZORult Variant.4 Checkin M2 |
2068 | MSIE2EB.tmp | A Network Trojan was detected | MALWARE [PTsecurity] AZORult HTTP Header |
2068 | MSIE2EB.tmp | A Network Trojan was detected | MALWARE [PTsecurity] AZORult encrypted PE file |