File name:

SetupVCD5520.exe

Full analysis: https://app.any.run/tasks/7c67b371-5ea5-45d7-b06b-0144ba482204
Verdict: Malicious activity
Analysis date: October 30, 2023, 15:08:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

DEC8EDA3A1AF6A8039987FE854A84A91

SHA1:

B869A7C4F1F8E2CEEB9B248CCC41782F005B02A1

SHA256:

B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F

SSDEEP:

24576:wihLOEdf7GOApNkiGz7CyNjP6xs1pBeNORUvL4nOTgr4EWl8DXfX8aGko77ISC4F:wiBOEdvvz7CyhgNrMn34ElXf0kxh4EW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • SetupVCD5520.exe (PID: 2560)
      • DevCon.exe (PID: 3884)
      • nstFDB8.tmp (PID: 2996)
      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3464)
    • Application was dropped or rewritten from another process

      • nstFDB8.tmp (PID: 2996)
      • SetupVCD5520.exe (PID: 3836)
      • SetupVCD5520.exe (PID: 2560)
      • DevCon.exe (PID: 2680)
      • DevCon.exe (PID: 3884)
      • SetRegACL.exe (PID: 4084)
      • ExecuteWithUAC.exe (PID: 3196)
      • ExecuteWithUAC.exe (PID: 2628)
      • VCDDaemon.exe (PID: 1556)
      • VCDDaemon.exe (PID: 2052)
      • VCDPrefs.exe (PID: 4064)
      • VCDPrefs.exe (PID: 3268)
    • Creates a writable file the system directory

      • nstFDB8.tmp (PID: 2996)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 2472)
    • Loads dropped or rewritten executable

      • nstFDB8.tmp (PID: 2996)
      • VCDDaemon.exe (PID: 2052)
      • VCDPrefs.exe (PID: 4064)
      • VCDPrefs.exe (PID: 3268)
      • VCDDaemon.exe (PID: 1556)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • SetupVCD5520.exe (PID: 2560)
    • Starts itself from another location

      • SetupVCD5520.exe (PID: 2560)
    • The process creates files with name similar to system file names

      • nstFDB8.tmp (PID: 2996)
    • Creates files in the driver directory

      • nstFDB8.tmp (PID: 2996)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 2472)
    • Drops a system driver (possible attempt to evade defenses)

      • nstFDB8.tmp (PID: 2996)
      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3464)
    • Reads security settings of Internet Explorer

      • DevCon.exe (PID: 3884)
    • Checks Windows Trust Settings

      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 3472)
    • Reads settings of System Certificates

      • DevCon.exe (PID: 3884)
      • rundll32.exe (PID: 3176)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3824)
    • Image mount is detect

      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3472)
      • explorer.exe (PID: 1400)
    • The process executes via Task Scheduler

      • ExecuteWithUAC.exe (PID: 2628)
  • INFO

    • Checks supported languages

      • nstFDB8.tmp (PID: 2996)
      • SetupVCD5520.exe (PID: 2560)
      • DevCon.exe (PID: 2680)
      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 3472)
      • drvinst.exe (PID: 2472)
      • VCDDaemon.exe (PID: 2052)
      • ExecuteWithUAC.exe (PID: 3196)
      • ExecuteWithUAC.exe (PID: 2628)
      • SetRegACL.exe (PID: 4084)
      • VCDDaemon.exe (PID: 1556)
      • VCDPrefs.exe (PID: 3268)
      • VCDPrefs.exe (PID: 4064)
    • Create files in a temporary directory

      • SetupVCD5520.exe (PID: 2560)
      • nstFDB8.tmp (PID: 2996)
      • DevCon.exe (PID: 3884)
    • Reads the computer name

      • nstFDB8.tmp (PID: 2996)
      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 3472)
      • drvinst.exe (PID: 2472)
      • VCDDaemon.exe (PID: 2052)
      • ExecuteWithUAC.exe (PID: 3196)
      • VCDPrefs.exe (PID: 4064)
      • VCDPrefs.exe (PID: 3268)
      • VCDDaemon.exe (PID: 1556)
      • DevCon.exe (PID: 2680)
    • Creates files in the program directory

      • nstFDB8.tmp (PID: 2996)
    • Reads the machine GUID from the registry

      • drvinst.exe (PID: 3464)
      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3472)
      • VCDDaemon.exe (PID: 1556)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 3176)
    • Process checks computer location settings

      • drvinst.exe (PID: 3472)
    • Manual execution by a user

      • VCDPrefs.exe (PID: 4064)
      • VCDPrefs.exe (PID: 3268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (87.8)
.exe | InstallShield setup (4.4)
.exe | Win32 Executable MS Visual C++ (generic) (3.2)
.exe | Win64 Executable (generic) (2.8)
.dll | Win32 Dynamic Link Library (generic) (0.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:02:22 16:43:00+01:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 59392
InitializedDataSize: 23040
UninitializedDataSize: -
EntryPoint: 0x9723
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
65
Monitored processes
19
Malicious processes
14
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start setupvcd5520.exe nstfdb8.tmp no specs devcon.exe no specs devcon.exe no specs drvinst.exe no specs rundll32.exe no specs vssvc.exe no specs drvinst.exe no specs drvinst.exe no specs vcddaemon.exe no specs setregacl.exe no specs rundll32.exe no specs executewithuac.exe no specs executewithuac.exe no specs vcddaemon.exe no specs vcdprefs.exe no specs vcdprefs.exe no specs explorer.exe no specs setupvcd5520.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1400C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1556"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /sC:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exeExecuteWithUAC.exe
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
MEDIUM
Description:
Virtual CloneDrive Daemon
Exit code:
0
Version:
5.5.1.0
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\elbyvcd.dll
c:\windows\system32\elbycdio.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
2052"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /uC:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exenstFDB8.tmp
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
HIGH
Description:
Virtual CloneDrive Daemon
Exit code:
0
Version:
5.5.1.0
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\elbyvcd.dll
c:\windows\system32\elbycdio.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
2472DrvInst.exe "2" "211" "ROOT\SCSIADAPTER\0000" "C:\Windows\INF\oem2.inf" "vclone.inf:Models:miniport:5.4.7.0:root\vclone" "64f288aa3" "000002BC" "000005DC" "000005E0"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2560"C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe" C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\setupvcd5520.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\shell32.dll
2628"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exe" /eC:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exetaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Description:
ElbyCDIO install helper process
Exit code:
0
Version:
1, 0, 1, 1
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\executewithuac.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
2680"C:\Users\admin\AppData\Local\Temp\nstFE24.tmp\DevCon.exe" status "root\vclone"C:\Users\admin\AppData\Local\Temp\nstFE24.tmp\DevCon.exenstFDB8.tmp
User:
admin
Company:
Windows (R) Codename Longhorn DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.0.6001.18000 built by: WinDDK
Modules
Images
c:\users\admin\appdata\local\temp\nstfe24.tmp\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rpcrt4.dll
2996nstFDB8.tmp /DOITC:\Users\admin\AppData\Local\Temp\nstFDA7.tmp\nstFDB8.tmpSetupVCD5520.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nstfda7.tmp\nstfdb8.tmp
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\lpk.dll
3176rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{42117fd2-f306-56cd-b084-a1347fcbc534} Global\{25c5d455-e287-789f-aeea-2818ecd54b14} C:\Windows\System32\DriverStore\Temp\{1a670ef0-774b-28d0-2b81-6f70f3ce7659}\vclone.inf C:\Windows\System32\DriverStore\Temp\{1a670ef0-774b-28d0-2b81-6f70f3ce7659}\VClone.catC:\Windows\System32\rundll32.exedrvinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3196"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exe" /sC:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exenstFDB8.tmp
User:
admin
Integrity Level:
HIGH
Description:
ElbyCDIO install helper process
Exit code:
0
Version:
1, 0, 1, 1
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\elaborate bytes\virtualclonedrive\executewithuac.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
Total events
20 479
Read events
20 351
Write events
121
Delete events
7

Modification events

(PID) Process:(1400) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(1400) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\NewShortcuts
Operation:delete keyName:(default)
Value:
(PID) Process:(1400) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2996) nstFDB8.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
114
(PID) Process:(3884) DevCon.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3464) drvinst.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3176) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3464) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000F2B487BA16B0D901C80700002C0A0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3464) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4000000000000000F2B487BA16B0D901C80700002C0A0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3464) drvinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
72
Executable files
30
Suspicious files
66
Text files
93
Unknown types
0

Dropped files

PID
Process
Filename
Type
2996nstFDB8.tmpC:\Users\admin\AppData\Local\Temp\nstFE24.tmp\ExecuteWithUAC.exeexecutable
MD5:549E70189FA7B3034A8E58A48CB353C0
SHA256:BB23AC0440D9DE37D035E68895C53C559DF4F31C8D0905033AB40AD0A2910E77
2996nstFDB8.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Elaborate Bytes\VirtualCloneDrive\Uninstall.lnkbinary
MD5:C3A09E4A2D13B12388C0AD2B6A80354B
SHA256:27E55CDFB05AEFA6AC086F95A9989C505A0A352F636CDB08CE9F6EB03679E4DA
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\InstallHelp.dllexecutable
MD5:E7715D8590B80E295D9168B1CF168C34
SHA256:B7AA5E64BF55719817E08718D99D509014585A4336426D46F6BDC91957D836C2
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\DevCon.exeexecutable
MD5:DD1232788611EF3471281C702A2FE90A
SHA256:0B329EF478FE62CD4A52290D0D892DA1FBE322039CBF64D75C051C32CD4271C7
2560SetupVCD5520.exeC:\Users\admin\AppData\Local\Temp\nstFDA7.tmp\nstFDB8.tmpexecutable
MD5:DEC8EDA3A1AF6A8039987FE854A84A91
SHA256:B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F
2996nstFDB8.tmpC:\Users\admin\AppData\Local\Temp\nstFE24.tmp\InstallHelp.dllexecutable
MD5:E7715D8590B80E295D9168B1CF168C34
SHA256:B7AA5E64BF55719817E08718D99D509014585A4336426D46F6BDC91957D836C2
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\vcd-uninst.exeexecutable
MD5:689C34FDC60E7D2B3B50AE6528F2C218
SHA256:4137A357D55366746C5F6FC7ED186CA584E8DEB577F81CE81AFB2C3C50C19D02
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\ElbyDVD.exeexecutable
MD5:A9A1C572EBCF9D20705495FE114AFDD1
SHA256:D261721408B9B0FD9B3F34AC5AEA9C5A95B949FEFDBB5A99A3683B66E00D8A3E
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\vcd-uninst.initext
MD5:E9116970BF2F9F966A726F468EADFDF3
SHA256:ADB8F1E174CA9DE3D2EAF87515B2CB92AE45B061C5CBE16BC3889B32B2C88EB7
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\Daemon.exeexecutable
MD5:9AE3C40B59CF7DE2404B0A114F1E4EB2
SHA256:344CECB43C6124A30C19D199F694683729624710F8035AD289C9BF57BD659344
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info