File name:

install-photoshop.exe

Full analysis: https://app.any.run/tasks/3b656a1b-a3b1-4cf7-bbc5-adef60162edb
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 13, 2021, 19:28:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

B51BA2824A0B4992F43E48ADC472912C

SHA1:

402873DC0B4F5C4B0D2AA642695510C738A68A72

SHA256:

A3D39FC411EA9C7AF94C575C60EDFA77C48EC0B1B2C6FA7D8B05BC2BE0BD4FD4

SSDEEP:

49152:DRhoFTk6KN58lVwYHQpP0Sx3u5KvTVNTP0Tr:Feg6Kn8lmYwBh3u5Kr6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • install-photoshop.exe (PID: 2508)
      • install-photoshop.exe (PID: 3328)
      • install-photoshop.tmp (PID: 3944)
      • unzip.exe (PID: 2748)
      • unzip.exe (PID: 3168)
      • OperaSetup.exe (PID: 1900)
      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 2732)
      • OperaSetup.exe (PID: 948)
      • OperaSetup.exe (PID: 3520)
      • UnoSetup.exe (PID: 1736)
      • UnoSetup.tmp (PID: 3132)
      • MsiExec.exe (PID: 2204)
    • Actions looks like stealing of personal data

      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 1900)
      • OperaSetup.exe (PID: 3520)
      • OperaSetup.exe (PID: 948)
      • seederexe.exe (PID: 3836)
      • lite_installer.exe (PID: 2816)
    • Application was dropped or rewritten from another process

      • OperaSetup.exe (PID: 2732)
      • UnoSetup.exe (PID: 1336)
      • UnoSetup.exe (PID: 3368)
      • UnoSetup.exe (PID: 1736)
      • YandexPackSetup.exe (PID: 836)
      • seederexe.exe (PID: 3836)
      • lite_installer.exe (PID: 2816)
    • Changes settings of System certificates

      • downloader.exe (PID: 2064)
    • Loads dropped or rewritten executable

      • OperaSetup.exe (PID: 2732)
    • Steals credentials from Web Browsers

      • seederexe.exe (PID: 3836)
  • SUSPICIOUS

    • Reads the computer name

      • install-photoshop.tmp (PID: 2684)
      • install-photoshop.tmp (PID: 3944)
      • avast_free_antivirus_setup_online.exe (PID: 2052)
      • downloader.exe (PID: 2064)
      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 948)
      • cmd.exe (PID: 572)
      • YandexPackSetup.exe (PID: 836)
      • UnoSetup.tmp (PID: 3132)
      • lite_installer.exe (PID: 2816)
      • seederexe.exe (PID: 3836)
      • downloader.exe (PID: 3064)
    • Checks supported languages

      • install-photoshop.tmp (PID: 2684)
      • install-photoshop.exe (PID: 2508)
      • install-photoshop.exe (PID: 3328)
      • install-photoshop.tmp (PID: 3944)
      • unzip.exe (PID: 2748)
      • unzip.exe (PID: 3168)
      • unzip.exe (PID: 3748)
      • downloader.exe (PID: 2064)
      • OperaSetup.exe (PID: 3588)
      • avast_free_antivirus_setup_online.exe (PID: 2052)
      • OperaSetup.exe (PID: 1900)
      • OperaSetup.exe (PID: 2732)
      • cmd.exe (PID: 2972)
      • chcp.com (PID: 756)
      • OperaSetup.exe (PID: 948)
      • OperaSetup.exe (PID: 3520)
      • cmd.exe (PID: 572)
      • UnoSetup.exe (PID: 1736)
      • downloader.exe (PID: 3064)
      • YandexPackSetup.exe (PID: 836)
      • UnoSetup.tmp (PID: 3132)
      • lite_installer.exe (PID: 2816)
      • seederexe.exe (PID: 3836)
    • Executable content was dropped or overwritten

      • install-photoshop.exe (PID: 2508)
      • install-photoshop.exe (PID: 3328)
      • install-photoshop.tmp (PID: 3944)
      • unzip.exe (PID: 2748)
      • unzip.exe (PID: 3168)
      • OperaSetup.exe (PID: 1900)
      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 2732)
      • OperaSetup.exe (PID: 948)
      • OperaSetup.exe (PID: 3520)
      • downloader.exe (PID: 2064)
      • UnoSetup.exe (PID: 1736)
      • UnoSetup.tmp (PID: 3132)
      • msiexec.exe (PID: 1280)
      • MsiExec.exe (PID: 2204)
      • avast_free_antivirus_setup_online.exe (PID: 2052)
    • Reads the Windows organization settings

      • install-photoshop.tmp (PID: 3944)
      • UnoSetup.tmp (PID: 3132)
      • msiexec.exe (PID: 1280)
    • Drops a file with a compile date too recent

      • install-photoshop.tmp (PID: 3944)
      • OperaSetup.exe (PID: 1900)
      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 2732)
      • OperaSetup.exe (PID: 948)
      • OperaSetup.exe (PID: 3520)
      • avast_free_antivirus_setup_online.exe (PID: 2052)
    • Drops a file that was compiled in debug mode

      • install-photoshop.tmp (PID: 3944)
      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 1900)
      • OperaSetup.exe (PID: 2732)
      • OperaSetup.exe (PID: 948)
      • downloader.exe (PID: 2064)
      • OperaSetup.exe (PID: 3520)
      • UnoSetup.tmp (PID: 3132)
      • avast_free_antivirus_setup_online.exe (PID: 2052)
      • msiexec.exe (PID: 1280)
      • MsiExec.exe (PID: 2204)
    • Creates files in the Windows directory

      • install-photoshop.tmp (PID: 3944)
      • avast_free_antivirus_setup_online.exe (PID: 2052)
    • Reads Windows owner or organization settings

      • install-photoshop.tmp (PID: 3944)
      • UnoSetup.tmp (PID: 3132)
      • msiexec.exe (PID: 1280)
    • Drops a file with too old compile date

      • install-photoshop.tmp (PID: 3944)
      • UnoSetup.tmp (PID: 3132)
    • Application launched itself

      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 948)
      • downloader.exe (PID: 2064)
      • msiexec.exe (PID: 1280)
    • Starts itself from another location

      • OperaSetup.exe (PID: 3588)
    • Creates files in the user directory

      • OperaSetup.exe (PID: 1900)
      • MsiExec.exe (PID: 2204)
      • seederexe.exe (PID: 3836)
    • Searches for installed software

      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 948)
      • seederexe.exe (PID: 3836)
    • Starts CMD.EXE for commands execution

      • install-photoshop.tmp (PID: 2684)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2972)
    • Adds / modifies Windows certificates

      • downloader.exe (PID: 2064)
    • Executed as Windows Service

      • msiexec.exe (PID: 1280)
    • Reads Environment values

      • MsiExec.exe (PID: 2204)
  • INFO

    • Application was dropped or rewritten from another process

      • install-photoshop.tmp (PID: 2684)
      • install-photoshop.tmp (PID: 3944)
      • unzip.exe (PID: 2748)
      • unzip.exe (PID: 3168)
      • unzip.exe (PID: 3748)
      • downloader.exe (PID: 2064)
      • OperaSetup.exe (PID: 3588)
      • avast_free_antivirus_setup_online.exe (PID: 2052)
      • OperaSetup.exe (PID: 1900)
      • OperaSetup.exe (PID: 948)
      • OperaSetup.exe (PID: 3520)
      • downloader.exe (PID: 3064)
      • UnoSetup.tmp (PID: 3132)
    • Loads dropped or rewritten executable

      • install-photoshop.tmp (PID: 3944)
      • UnoSetup.tmp (PID: 3132)
      • OperaSetup.exe (PID: 3588)
      • OperaSetup.exe (PID: 3520)
      • OperaSetup.exe (PID: 1900)
      • OperaSetup.exe (PID: 948)
    • Creates a software uninstall entry

      • install-photoshop.tmp (PID: 3944)
    • Reads settings of System Certificates

      • avast_free_antivirus_setup_online.exe (PID: 2052)
      • OperaSetup.exe (PID: 3588)
      • downloader.exe (PID: 2064)
      • msiexec.exe (PID: 1280)
    • Creates files in the program directory

      • install-photoshop.tmp (PID: 3944)
    • Checks Windows Trust Settings

      • OperaSetup.exe (PID: 3588)
      • downloader.exe (PID: 2064)
      • msiexec.exe (PID: 1280)
    • Checks supported languages

      • msiexec.exe (PID: 1280)
      • MsiExec.exe (PID: 2204)
    • Reads the computer name

      • msiexec.exe (PID: 1280)
      • MsiExec.exe (PID: 2204)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (79.7)
.exe | Win32 Executable (generic) (8.6)
.exe | Win16/32 Executable Delphi generic (3.9)
.exe | Generic Win/DOS Executable (3.8)
.exe | DOS Executable Generic (3.8)

EXIF

EXE

ProductVersion: 1.0Metal7
ProductName: DedMetal6
OriginalFileName: photoshop
LegalCopyright: DedMetal4
FileVersion: 1.2.3.4
FileDescription: -
CompanyName: photoshop
Comments: DedMetal1
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 6.1
ImageVersion: 6
OSVersion: 6.1
EntryPoint: 0x21bd4
UninitializedDataSize: -
InitializedDataSize: 168448
CodeSize: 133632
LinkerVersion: 2.25
PEType: PE32
TimeStamp: 2021:05:08 21:10:28+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 08-May-2021 19:10:28
Detected languages:
  • English - United States
Comments: DedMetal1
CompanyName: photoshop
FileDescription: -
FileVersion: 1.2.3.4
LegalCopyright: DedMetal4
OriginalFilename: photoshop
ProductName: DedMetal6
ProductVersion: 1.0Metal7

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0050
Pages in file: 0x0002
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x000F
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x001A
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 10
Time date stamp: 08-May-2021 19:10:28
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_BYTES_REVERSED_HI
  • IMAGE_FILE_BYTES_REVERSED_LO
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0001F500
0x0001F600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.25077
.itext
0x00021000
0x00001370
0x00001400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.92385
.data
0x00023000
0x00001818
0x00001A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.4915
.bss
0x00025000
0x000061F4
0x00000000
IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.idata
0x0002C000
0x0000104C
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.69964
.didata
0x0002E000
0x000001A4
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
2.73853
.edata
0x0002F000
0x00000071
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.31036
.tls
0x00030000
0x00000008
0x00000000
IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rdata
0x00031000
0x0000005D
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.3457
.rsrc
0x00032000
0x00025E0C
0x00026000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.83092

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.13965
1580
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.65559
67624
Latin 1 / Western European
English - United States
RT_ICON
3
3.89093
16936
Latin 1 / Western European
English - United States
RT_ICON
4
4.25144
9640
Latin 1 / Western European
English - United States
RT_ICON
5
4.42061
4264
Latin 1 / Western European
English - United States
RT_ICON
6
5.05457
1128
Latin 1 / Western European
English - United States
RT_ICON
7
1.49649
2216
Latin 1 / Western European
English - United States
RT_ICON
8
0.972379
1384
Latin 1 / Western European
English - United States
RT_ICON
9
7.68913
4837
Latin 1 / Western European
English - United States
RT_ICON
10
2.03031
16936
Latin 1 / Western European
English - United States
RT_ICON

Imports

advapi32.dll
comctl32.dll
kernel32.dll
kernel32.dll (delay-loaded)
netapi32.dll
oleaut32.dll
user32.dll
version.dll

Exports

Title
Ordinal
Address
dbkFCallWrapperAddr
1
0x000285A0
__dbk_fcall_wrapper
2
0x0000A240
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
76
Monitored processes
28
Malicious processes
15
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start install-photoshop.exe install-photoshop.tmp no specs install-photoshop.exe install-photoshop.tmp unzip.exe unzip.exe no specs unzip.exe downloader.exe avast_free_antivirus_setup_online.exe operasetup.exe operasetup.exe operasetup.exe cmd.exe no specs chcp.com no specs operasetup.exe operasetup.exe cmd.exe no specs unosetup.exe no specs unosetup.exe no specs unosetup.exe unosetup.tmp yandexpacksetup.exe downloader.exe msiexec.exe msiexec.exe lite_installer.exe seederexe.exe yandex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
572"C:\Windows\system32\cmd.exe" /C ""C:\Users\admin\Adobe Photoshop\run.bat" /build=[photoshop]"C:\Windows\system32\cmd.exeinstall-photoshop.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
756chcp 1251C:\Windows\system32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
836"C:\Users\admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /quiet /msicl "VID=123 YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y"C:\Users\admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe
downloader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Software Installer
Exit code:
0
Version:
3.0.5419.0
Modules
Images
c:\users\admin\appdata\local\temp\7f4987fb1a6e43d69e3e94b29eb75926\yandexpacksetup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
948"C:\Users\admin\AppData\Local\Temp\is-RM681.tmp\OperaSetup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --launchopera=1 --installfolder="C:\Program Files\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=0 --pintotaskbar=1 --pin-additional-shortcuts=1 --server-tracking-data=server_tracking_data --initial-pid=3588 --package-dir-prefix="C:\Users\admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20210713202937" --session-guid=aad4fd09-89dc-4bd9-a784-dc9913f2b08a --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=E802000000000000C:\Users\admin\AppData\Local\Temp\is-RM681.tmp\OperaSetup.exe
OperaSetup.exe
User:
admin
Company:
Opera Software
Integrity Level:
HIGH
Description:
Opera Installer
Exit code:
0
Version:
77.0.4054.203
Modules
Images
c:\users\admin\appdata\local\temp\is-rm681.tmp\operasetup.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
1280C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows� installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msiexec.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1336UnoSetup.exe /build=[photoshop]C:\Users\admin\Adobe Photoshop\UnoSetup.execmd.exe
User:
admin
Company:
UnoSetup2
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
1.2.3.4
Modules
Images
c:\users\admin\adobe photoshop\unosetup.exe
c:\windows\system32\ntdll.dll
1736"C:\Users\admin\Adobe Photoshop\UnoSetup.exe" /build=[photoshop]C:\Users\admin\Adobe Photoshop\UnoSetup.exe
cmd.exe
User:
admin
Company:
UnoSetup2
Integrity Level:
HIGH
Exit code:
0
Version:
1.2.3.4
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
1900C:\Users\admin\AppData\Local\Temp\is-RM681.tmp\OperaSetup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=77.0.4054.203 --initial-client-data=0x15c,0x160,0x164,0x130,0x168,0x6e5f43b0,0x6e5f43c0,0x6e5f43ccC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\OperaSetup.exe
OperaSetup.exe
User:
admin
Company:
Opera Software
Integrity Level:
HIGH
Description:
Opera Installer
Exit code:
0
Version:
77.0.4054.203
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\appdata\local\temp\is-rm681.tmp\operasetup.exe
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2052"C:\Users\admin\AppData\Local\Temp\is-RM681.tmp\avast_free_antivirus_setup_online.exe" /SILENT /WSC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\avast_free_antivirus_setup_online.exe
install-photoshop.tmp
User:
admin
Company:
AVAST Software
Integrity Level:
HIGH
Description:
Avast Installer
Exit code:
0
Version:
2.1.55.0
Modules
Images
c:\users\admin\appdata\local\temp\is-rm681.tmp\avast_free_antivirus_setup_online.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\shlwapi.dll
2064"C:\Users\admin\AppData\Local\Temp\is-RM681.tmp\downloader.exe" --partner 7053 --distr /quiet /msicl "VID=123 YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y"C:\Users\admin\AppData\Local\Temp\is-RM681.tmp\downloader.exe
install-photoshop.tmp
User:
admin
Integrity Level:
HIGH
Description:
Setup Downloader
Exit code:
0
Version:
0.1.0.32
Modules
Images
c:\users\admin\appdata\local\temp\is-rm681.tmp\downloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
Total events
25 501
Read events
25 218
Write events
258
Delete events
25

Modification events

(PID) Process:(3944) install-photoshop.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
680F0000B9E1E8511D78D701
(PID) Process:(3944) install-photoshop.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
8C0696C72AC462BFFE6AA86D78FC875635B2A4B17456962FDEF680573671E352
(PID) Process:(3944) install-photoshop.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(3944) install-photoshop.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3944) install-photoshop.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3944) install-photoshop.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3944) install-photoshop.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2064) downloader.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2064) downloader.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2064) downloader.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
51
Suspicious files
39
Text files
198
Unknown types
22

Dropped files

PID
Process
Filename
Type
3328install-photoshop.exeC:\Users\admin\AppData\Local\Temp\is-L4AF6.tmp\install-photoshop.tmpexecutable
MD5:
SHA256:
2508install-photoshop.exeC:\Users\admin\AppData\Local\Temp\is-MA0VC.tmp\install-photoshop.tmpexecutable
MD5:
SHA256:
3944install-photoshop.tmpC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\PTB.dllexecutable
MD5:85C343098C79F5FD5B910031A5ED8E64
SHA256:53A56B4C1A8CE9452EFA9D0F484F0D251326F37D227B7A9B399BE655E3E1C5BA
3944install-photoshop.tmpC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\ssleay32.dllexecutable
MD5:E7EFFE997BDBF1E0F9DD1C271EAB5F3F
SHA256:8BDFF8C4DD2D8B1690E4D63DEB9AB4068A5109A0B78B64BF1E920F1696B0FB41
3944install-photoshop.tmpC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\is-BPG4P.tmptext
MD5:
SHA256:
3944install-photoshop.tmpC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\WebKitTime.dllexecutable
MD5:08E99159C0194360DD801746D7245107
SHA256:6C43E922C3CDAF1317A69E1573BCEADB8BC01B91FE4F0AC49360E71ECD7694FF
3944install-photoshop.tmpC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\config.txttext
MD5:
SHA256:
3944install-photoshop.tmpC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\bigimage2.pngimage
MD5:
SHA256:
3944install-photoshop.tmpC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\is-1QIAO.tmpimage
MD5:
SHA256:
3944install-photoshop.tmpC:\Users\admin\AppData\Local\Temp\is-RM681.tmp\is-EQE4T.tmpimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
44
TCP/UDP connections
73
DNS requests
46
Threats
684

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3944
install-photoshop.tmp
GET
302
5.45.205.245:80
http://download.yandex.ru/yandex-pack/downloader/downloader.exe
RU
whitelisted
3944
install-photoshop.tmp
GET
302
5.45.205.245:80
http://download.yandex.ru/yandex-pack/downloader/downloader.exe
RU
whitelisted
2064
downloader.exe
GET
302
5.45.205.245:80
http://downloader.yandex.net/yandex-pack/downloader/info.rss
RU
whitelisted
2064
downloader.exe
GET
302
5.45.205.245:80
http://downloader.yandex.net/yandex-pack/7053/YandexPackSetup.exe
RU
whitelisted
3944
install-photoshop.tmp
GET
200
5.101.153.82:80
http://omgmedia.ru/universal/pics/photoshopbig.png
RU
image
67.2 Kb
suspicious
3944
install-photoshop.tmp
GET
200
5.101.153.82:80
http://omgmedia.ru/universal/pics/photoshopbig.png
RU
image
67.2 Kb
suspicious
3944
install-photoshop.tmp
GET
200
5.101.153.82:80
http://omgmedia.ru/universal/packs/icopack.zip
RU
compressed
2.59 Mb
suspicious
3944
install-photoshop.tmp
GET
200
5.101.153.82:80
http://omgmedia.ru/universal/packs/UnoSetup.zip
RU
compressed
2.45 Mb
suspicious
3944
install-photoshop.tmp
GET
200
5.101.153.82:80
http://omgmedia.ru/universal/packs/UnoSetup.zip
RU
compressed
2.45 Mb
suspicious
3944
install-photoshop.tmp
GET
200
84.53.168.35:80
http://bits.avcdn.net/platform_WIN/productfamily_ANTIVIRUS/cookie_mmm_rsp_ppi_003_462_h
US
executable
219 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3588
OperaSetup.exe
82.145.216.20:443
autoupdate.geo.opera.com
Opera Software AS
unknown
3588
OperaSetup.exe
82.145.217.121:443
desktop-netinstaller-sub.osp.opera.software
Opera Software AS
suspicious
3588
OperaSetup.exe
8.248.113.254:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
3588
OperaSetup.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2052
avast_free_antivirus_setup_online.exe
2.16.170.42:80
iavs9x.u.avast.com
Akamai International B.V.
DE
suspicious
3944
install-photoshop.tmp
5.101.153.82:80
omgmedia.ru
Beget Ltd
RU
malicious
3944
install-photoshop.tmp
185.26.182.111:443
net.geo.opera.com
Opera Software AS
whitelisted
3944
install-photoshop.tmp
5.45.205.245:80
download.yandex.ru
YANDEX LLC
RU
whitelisted
3944
install-photoshop.tmp
5.45.205.221:80
cache-man01i.cdn.yandex.net
YANDEX LLC
RU
whitelisted
3944
install-photoshop.tmp
84.53.168.35:80
bits.avcdn.net
Akamai Technologies, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
omgmedia.ru
  • 5.101.153.82
suspicious
net.geo.opera.com
  • 185.26.182.111
  • 185.26.182.112
whitelisted
download.yandex.ru
  • 5.45.205.245
  • 5.45.205.243
  • 5.45.205.244
  • 5.45.205.241
  • 5.45.205.242
whitelisted
cache-man01i.cdn.yandex.net
  • 5.45.205.221
whitelisted
bits.avcdn.net
  • 84.53.168.35
whitelisted
iavs9x.u.avast.com
  • 2.16.170.42
  • 2.16.170.51
whitelisted
www.google-analytics.com
  • 142.251.6.102
  • 142.251.6.100
  • 142.251.6.113
  • 142.251.6.139
  • 142.251.6.101
  • 142.251.6.138
whitelisted
v7event.stats.avast.com
  • 5.62.40.204
  • 5.62.40.213
whitelisted
downloader.yandex.net
  • 5.45.205.245
  • 5.45.205.243
  • 5.45.205.241
  • 5.45.205.242
  • 5.45.205.244
whitelisted
autoupdate.geo.opera.com
  • 82.145.216.20
  • 82.145.216.19
whitelisted

Threats

PID
Process
Class
Message
3944
install-photoshop.tmp
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3944
install-photoshop.tmp
A Network Trojan was detected
ET MALWARE Possible FakeAV Binary Download
3944
install-photoshop.tmp
A Network Trojan was detected
ET TROJAN AntiVirus exe Download Likely FakeAV Install
3944
install-photoshop.tmp
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3944
install-photoshop.tmp
Misc activity
ET INFO EXE - Served Attached HTTP
2064
downloader.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2052
avast_free_antivirus_setup_online.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3064
downloader.exe
Attempted Information Leak
ET POLICY curl User-Agent Outbound
2816
lite_installer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2816
lite_installer.exe
Misc activity
ET INFO EXE - Served Attached HTTP
2 ETPRO signatures available at the full report
Process
Message
YandexPackSetup.exe
IsAlreadyRun() In
YandexPackSetup.exe
IsAlreadyRun() Out : ret (BOOL) = 0
YandexPackSetup.exe
IsMSISrvFree() In
YandexPackSetup.exe
IsMSISrvFree() : OpenMutex() err ret = 2
YandexPackSetup.exe
IsMSISrvFree() Out ret = 1
YandexPackSetup.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1
YandexPackSetup.exe
GetSidFromEnumSess(): i = 0 : szUserName = Administrator, szDomain = USER-PC, dwSessionId = 0
YandexPackSetup.exe
GetSidFromEnumSess(): ProfileImagePath(1) = C:\Users\admin
YandexPackSetup.exe
GetSidFromEnumSess(): LsaEnumerateLogonSessions() lpszSid = S-1-5-21-1302019708-1500728564-335382590-1000
YandexPackSetup.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1