File name:

YBQOFHCX.msi

Full analysis: https://app.any.run/tasks/dd730b05-c9a7-4e25-8402-1d8e4930e7d4
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: May 19, 2025, 20:07:46
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
auto
generic
rat
asyncrat
remote
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Dreamboat, Author: Salve Pupil, Keywords: Installer, Comments: This installer database contains the logic and data required to install Dreamboat., Template: Intel;1033, Revision Number: {D1A14993-475A-4072-88BE-E22241CC6BC1}, Create Time/Date: Sun May 18 15:25:28 2025, Last Saved Time/Date: Sun May 18 15:25:28 2025, Number of Pages: 500, Number of Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
MD5:

B4D08697B7DE193A675E9F2AFF4A25F4

SHA1:

9157AE69B2BB045BAD06480AFBC6FD7886BEDA59

SHA256:

B38F89519205F6183C4CE10141CBFD77AEB5406153A5440537A33A591D64E37D

SSDEEP:

98304:fB8X+OyYDZeUGOOJ8URXZhfu0trfZOec/erjqIUKkzDhfKLI1e0baq8t+mORYUqj:i42eU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • msiexec.exe (PID: 5304)
      • msiexec.exe (PID: 7216)
      • LogicD.exe (PID: 6744)
    • ASYNCRAT has been detected (SURICATA)

      • PlanExplorer.exe (PID: 6540)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • LogicD.exe (PID: 6744)
      • msiexec.exe (PID: 7216)
    • Executable content was dropped or overwritten

      • LogicD.exe (PID: 1324)
      • LogicD.exe (PID: 6744)
    • Starts itself from another location

      • LogicD.exe (PID: 6744)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7268)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 7216)
      • LogicD.exe (PID: 6744)
    • Connects to unusual port

      • PlanExplorer.exe (PID: 6540)
    • Contacting a server suspected of hosting an CnC

      • PlanExplorer.exe (PID: 6540)
    • Uses WMIC.EXE to obtain computer system information

      • PlanExplorer.exe (PID: 6540)
  • INFO

    • The sample compiled with english language support

      • msiexec.exe (PID: 5304)
      • LogicD.exe (PID: 1324)
      • msiexec.exe (PID: 7216)
      • LogicD.exe (PID: 6744)
    • Checks supported languages

      • msiexec.exe (PID: 7216)
    • Reads the computer name

      • msiexec.exe (PID: 7216)
    • Manages system restore points

      • SrTasks.exe (PID: 7228)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7216)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Dreamboat
Author: Salve Pupil
Keywords: Installer
Comments: This installer database contains the logic and data required to install Dreamboat.
Template: Intel;1033
RevisionNumber: {D1A14993-475A-4072-88BE-E22241CC6BC1}
CreateDate: 2025:05:18 15:25:28
ModifyDate: 2025:05:18 15:25:28
Pages: 500
Words: 10
Software: WiX Toolset (4.0.0.0)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
14
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe no specs #GENERIC msiexec.exe vssvc.exe no specs sppextcomobj.exe no specs slui.exe srtasks.exe no specs conhost.exe no specs #GENERIC logicd.exe logicd.exe #ASYNCRAT planexplorer.exe tcpvcon64.exe no specs wmic.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1324C:\ProgramData\ctDocker\LogicD.exeC:\ProgramData\ctDocker\LogicD.exe
LogicD.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
Splash Window
Version:
4.0.0.0
Modules
Images
c:\programdata\ctdocker\logicd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2420"wmic" computersystem get domainC:\Windows\SysWOW64\wbem\WMIC.exePlanExplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\iphlpapi.dll
5304"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\YBQOFHCX.msiC:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6540C:\Users\admin\PlanExplorer.exeC:\Users\admin\PlanExplorer.exe
LogicD.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
Check Language
Version:
1.0.0.20
Modules
Images
c:\users\admin\appdata\local\temp\f06219f.tmp
c:\users\admin\planexplorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6744"C:\Users\admin\AppData\Roaming\Inflictor\LogicD.exe"C:\Users\admin\AppData\Roaming\Inflictor\LogicD.exe
msiexec.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
Splash Window
Exit code:
0
Version:
4.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\inflictor\logicd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7152\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7216C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
7228C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7268C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
6 845
Read events
6 580
Write events
247
Delete events
18

Modification events

(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000C91835B6F9C8DB01641C0000141D0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000C91835B6F9C8DB01641C0000081D0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000C91835B6F9C8DB01641C0000801C0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000C91835B6F9C8DB01641C0000841C0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Leave)
Value:
4800000000000000E6E039B6F9C8DB01641C0000801C0000E80300000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Operation:delete keyName:(default)
Value:
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Operation:writeName:Element
Value:
\EFI\Microsoft\Boot\bootmgfw.efi
(PID) Process:(7268) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001
Operation:delete keyName:(default)
Value:
Executable files
12
Suspicious files
25
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7216msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
7216msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:65E658FAF6C963CDCDC519C0BA4FC69C
SHA256:F4C9304BB503E4C23B279FD4C35713768CF1FF10D507BF0347CCA56076666851
7216msiexec.exeC:\Windows\Installer\110df7.msiexecutable
MD5:B4D08697B7DE193A675E9F2AFF4A25F4
SHA256:B38F89519205F6183C4CE10141CBFD77AEB5406153A5440537A33A591D64E37D
7216msiexec.exeC:\Windows\Installer\MSIF4F.tmpbinary
MD5:F729CF3B41B230DDED83D503309152CF
SHA256:68B592347B4F86D49E2A4EB42C5E2447228F72F4336D4E8438F250B254C3F4B1
7216msiexec.exeC:\Windows\Installer\inprogressinstallinfo.ipibinary
MD5:4FE48BF5806BB85358A82D1CD24ACD06
SHA256:2BE1E3E5FEABB7C04F718A2C62A88DD89F9B5A652831C45D466CEE8FC101ED28
7216msiexec.exeC:\Windows\Temp\~DF86E646D0777C998F.TMPbinary
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
7216msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{66eed979-6ae8-46f3-91b1-83459ab8728a}_OnDiskSnapshotPropbinary
MD5:65E658FAF6C963CDCDC519C0BA4FC69C
SHA256:F4C9304BB503E4C23B279FD4C35713768CF1FF10D507BF0347CCA56076666851
7216msiexec.exeC:\Windows\Temp\~DF4BE8505CC5D64EB4.TMPbinary
MD5:4FE48BF5806BB85358A82D1CD24ACD06
SHA256:2BE1E3E5FEABB7C04F718A2C62A88DD89F9B5A652831C45D466CEE8FC101ED28
7216msiexec.exeC:\Users\admin\AppData\Roaming\Inflictor\DuiLib_u.dllexecutable
MD5:67A58419C438E0C8D3CCA5877FE48FA2
SHA256:4E038F234A09E8C917E831708359E10618840A97B9343822C4450033E6624C71
7216msiexec.exeC:\Config.Msi\110df8.rbsbinary
MD5:61A2EE306F1CE44E103BF50E217794F4
SHA256:F4CF2011E2F353DF08355851310FCCAEA88E42023D512959566CC1D64E15F6F8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
28
DNS requests
16
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.193:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2088
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2088
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5024
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.193:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
8020
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.238
whitelisted
crl.microsoft.com
  • 23.48.23.193
  • 23.48.23.194
  • 23.48.23.141
  • 23.48.23.185
  • 23.48.23.181
  • 23.48.23.139
  • 23.48.23.190
  • 23.48.23.178
  • 23.48.23.140
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.3
  • 40.126.31.73
  • 40.126.31.0
  • 40.126.31.2
  • 40.126.31.71
  • 40.126.31.128
  • 20.190.159.131
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

PID
Process
Class
Message
6540
PlanExplorer.exe
Domain Observed Used for C2 Detected
REMOTE [ANY.RUN] AsyncRAT SSL certificate
6540
PlanExplorer.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] AsyncRAT Successful Connection
No debug info