File name:

install.exe

Full analysis: https://app.any.run/tasks/fd8b1ec4-5aa6-4e7b-b749-2a5791703932
Verdict: Malicious activity
Analysis date: February 02, 2024, 21:33:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

1A18DE8AB57662D8FAD95D737B1213A6

SHA1:

F1D445FE3156DB83CD6AABBD181F34BB332FEFEB

SHA256:

B297E6EBBFCE504C34D038DE7B87771B382D868F9D5363EE7EA8058441EC782E

SSDEEP:

49152:+oti3O8Yy0bt3pxHG+atvkmnD/DF+W+lIpFgMG/PcqAFhbGri2MrY3YFTnXKE38Z:RsYyUGLv5D8JlIpFdGoMi3rYoVnXh38a

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • install.exe (PID: 1392)
  • SUSPICIOUS

    • Reads the Internet Settings

      • install.exe (PID: 1392)
      • install.exe (PID: 2868)
    • Application launched itself

      • install.exe (PID: 1392)
      • install.exe (PID: 2868)
    • Reads the BIOS version

      • install.exe (PID: 2868)
    • Reads Microsoft Outlook installation path

      • install.exe (PID: 2868)
    • Reads Internet Explorer settings

      • install.exe (PID: 2868)
  • INFO

    • Reads the machine GUID from the registry

      • install.exe (PID: 1392)
      • install.exe (PID: 2868)
      • install.exe (PID: 3572)
    • Checks supported languages

      • install.exe (PID: 1392)
      • install.exe (PID: 2868)
      • install.exe (PID: 3572)
    • Reads the computer name

      • install.exe (PID: 1392)
      • install.exe (PID: 2868)
    • Process checks whether UAC notifications are on

      • install.exe (PID: 1392)
      • install.exe (PID: 2868)
    • Create files in a temporary directory

      • install.exe (PID: 1392)
      • install.exe (PID: 2868)
    • Checks proxy server information

      • install.exe (PID: 2868)
    • Reads product name

      • install.exe (PID: 2868)
    • Reads Environment values

      • install.exe (PID: 2868)
    • Reads Windows Product ID

      • install.exe (PID: 2868)
    • Reads CPU info

      • install.exe (PID: 2868)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.6)
.exe | Win16/32 Executable Delphi generic (19.5)
.exe | Generic Win/DOS Executable (18.9)
.exe | DOS Executable Generic (18.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:20 00:22:17+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 37888
InitializedDataSize: 17920
UninitializedDataSize: -
EntryPoint: 0x9c40
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Internet Application
FileDescription: Installer Setup
FileVersion: 3.2.1.8
LegalCopyright: Installer
ProductName: Installer
ProductVersion: 1.3.7
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start install.exe no specs install.exe install.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1392"C:\Users\admin\Desktop\install.exe" C:\Users\admin\Desktop\install.exeexplorer.exe
User:
admin
Company:
Internet Application
Integrity Level:
MEDIUM
Description:
Installer Setup
Exit code:
0
Version:
3.2.1.8
Modules
Images
c:\users\admin\desktop\install.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2868"C:\Users\admin\Desktop\install.exe" /RSF /ppn:YyhwYgxaFRAiP211FM5W /mnlC:\Users\admin\Desktop\install.exe
install.exe
User:
admin
Company:
Internet Application
Integrity Level:
HIGH
Description:
Installer Setup
Exit code:
0
Version:
3.2.1.8
Modules
Images
c:\users\admin\desktop\install.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3572"C:\Users\admin\Desktop\install.exe" /_ShowProgress /PrTxt:TG9hZGluZy4uLg==C:\Users\admin\Desktop\install.exeinstall.exe
User:
admin
Company:
Internet Application
Integrity Level:
HIGH
Description:
Installer Setup
Exit code:
0
Version:
3.2.1.8
Modules
Images
c:\users\admin\desktop\install.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
Total events
1 787
Read events
1 315
Write events
472
Delete events
0

Modification events

(PID) Process:(1392) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1392) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1392) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1392) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2868) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2868) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2868) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2868) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2868) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2868) install.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
8
Suspicious files
2
Text files
92
Unknown types
0

Dropped files

PID
Process
Filename
Type
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\images\BGD.pngimage
MD5:EF4807F71B1A16027309E0D289A63F24
SHA256:CD0AA95A19252837C802FC72082470D2466675FBA7B269F70243AA8B5126CB50
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\css\sdk-ui\images\progress-bg2.pngimage
MD5:B582D9A67BFE77D523BA825FD0B9DAE3
SHA256:AB4EEB3EA1EEF4E84CB61ECCB0BA0998B32108D70B3902DF3619F4D9393F74C3
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\csshover3.htchtml
MD5:52FA0DA50BF4B27EE625C80D36C67941
SHA256:E37E99DDFC73AC7BA774E23736B2EF429D9A0CB8C906453C75B14C029BDD5493
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\images\Color_Button_Hover.pngimage
MD5:3DA57801E1AA51237D1A7A4C54D1C4D6
SHA256:0C3C4F7DE98FE09E4D07AFE4BA2C88A38450E84472B3F7E3878057AE54706F66
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\css\sdk-ui\images\progress-bg.pngimage
MD5:E9F12F92A9EEB8EBE911080721446687
SHA256:C1CF449536BC2778E27348E45F0F53D04C284109199FB7A9AF7A61016B91F8BC
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\images\Close_Hover.pngimage
MD5:9D356DD702E8CC89C84682E7DA899AEA
SHA256:1B7D254408069AB82277A147A4AFBFAB871402D03A94CE735959CFBAD7E08DD1
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\css\sdk-ui\progress-bar.csstext
MD5:5335F1C12201B5F7CF5F8B4F5692E3D1
SHA256:974CD89E64BDAA85BF36ED2A50AF266D245D781A8139F5B45D7C55A0B0841DDA
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\css\mainDlm.csstext
MD5:87F5B206895781B2D28A517E97EFCD5E
SHA256:863F3DAF9BF6E87DFC4618FF563620CCDC6716089F223D5385D3856AAA899252
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\images\default_tb.pngimage
MD5:E7895CFADF62FB9EAD3C39CC1BFF7F36
SHA256:E47F318E2999FC2C40192AA2840C3103D4676844820A79DC639383565534B607
1392install.exeC:\Users\admin\AppData\Local\Temp\INH145~1\css\sdk-ui\browse.csstext
MD5:6009D6E864F60AEA980A9DF94C1F7E1C
SHA256:5EF48A8C8C3771B4F233314D50DD3B5AFDCD99DD4B74A9745C8FE7B22207056D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
4
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

Domain
IP
Reputation
rp.medabemidam.com
unknown
info.medabemidam.com
unknown
os.medabemidam.com
unknown
os2.medabemidam.com
unknown

Threats

No threats detected
No debug info