File name:

SetupVCD5520.exe

Full analysis: https://app.any.run/tasks/7c67b371-5ea5-45d7-b06b-0144ba482204
Verdict: Malicious activity
Analysis date: October 30, 2023, 15:08:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

DEC8EDA3A1AF6A8039987FE854A84A91

SHA1:

B869A7C4F1F8E2CEEB9B248CCC41782F005B02A1

SHA256:

B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F

SSDEEP:

24576:wihLOEdf7GOApNkiGz7CyNjP6xs1pBeNORUvL4nOTgr4EWl8DXfX8aGko77ISC4F:wiBOEdvvz7CyhgNrMn34ElXf0kxh4EW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • SetupVCD5520.exe (PID: 2560)
      • DevCon.exe (PID: 3884)
      • nstFDB8.tmp (PID: 2996)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 2472)
    • Application was dropped or rewritten from another process

      • SetupVCD5520.exe (PID: 3836)
      • nstFDB8.tmp (PID: 2996)
      • SetupVCD5520.exe (PID: 2560)
      • DevCon.exe (PID: 3884)
      • SetRegACL.exe (PID: 4084)
      • VCDDaemon.exe (PID: 2052)
      • ExecuteWithUAC.exe (PID: 3196)
      • ExecuteWithUAC.exe (PID: 2628)
      • VCDDaemon.exe (PID: 1556)
      • VCDPrefs.exe (PID: 4064)
      • VCDPrefs.exe (PID: 3268)
      • DevCon.exe (PID: 2680)
    • Creates a writable file the system directory

      • nstFDB8.tmp (PID: 2996)
      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3464)
    • Loads dropped or rewritten executable

      • nstFDB8.tmp (PID: 2996)
      • VCDDaemon.exe (PID: 2052)
      • VCDDaemon.exe (PID: 1556)
      • VCDPrefs.exe (PID: 4064)
      • VCDPrefs.exe (PID: 3268)
  • SUSPICIOUS

    • Starts itself from another location

      • SetupVCD5520.exe (PID: 2560)
    • Starts application with an unusual extension

      • SetupVCD5520.exe (PID: 2560)
    • The process creates files with name similar to system file names

      • nstFDB8.tmp (PID: 2996)
    • Reads settings of System Certificates

      • DevCon.exe (PID: 3884)
      • rundll32.exe (PID: 3176)
    • Reads security settings of Internet Explorer

      • DevCon.exe (PID: 3884)
    • Checks Windows Trust Settings

      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3472)
    • Drops a system driver (possible attempt to evade defenses)

      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 2472)
      • nstFDB8.tmp (PID: 2996)
    • Creates files in the driver directory

      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 2472)
      • nstFDB8.tmp (PID: 2996)
    • Image mount is detect

      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3472)
      • explorer.exe (PID: 1400)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3824)
    • The process executes via Task Scheduler

      • ExecuteWithUAC.exe (PID: 2628)
  • INFO

    • Checks supported languages

      • SetupVCD5520.exe (PID: 2560)
      • nstFDB8.tmp (PID: 2996)
      • DevCon.exe (PID: 2680)
      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3472)
      • VCDDaemon.exe (PID: 2052)
      • SetRegACL.exe (PID: 4084)
      • ExecuteWithUAC.exe (PID: 3196)
      • ExecuteWithUAC.exe (PID: 2628)
      • VCDDaemon.exe (PID: 1556)
      • VCDPrefs.exe (PID: 3268)
      • VCDPrefs.exe (PID: 4064)
      • drvinst.exe (PID: 3464)
    • Create files in a temporary directory

      • SetupVCD5520.exe (PID: 2560)
      • nstFDB8.tmp (PID: 2996)
      • DevCon.exe (PID: 3884)
    • Reads the computer name

      • nstFDB8.tmp (PID: 2996)
      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 2472)
      • VCDDaemon.exe (PID: 2052)
      • drvinst.exe (PID: 3472)
      • ExecuteWithUAC.exe (PID: 3196)
      • VCDDaemon.exe (PID: 1556)
      • VCDPrefs.exe (PID: 3268)
      • VCDPrefs.exe (PID: 4064)
      • DevCon.exe (PID: 2680)
    • Creates files in the program directory

      • nstFDB8.tmp (PID: 2996)
    • Reads the machine GUID from the registry

      • DevCon.exe (PID: 3884)
      • drvinst.exe (PID: 3464)
      • drvinst.exe (PID: 2472)
      • drvinst.exe (PID: 3472)
      • VCDDaemon.exe (PID: 1556)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 3176)
    • Manual execution by a user

      • VCDPrefs.exe (PID: 4064)
      • VCDPrefs.exe (PID: 3268)
    • Process checks computer location settings

      • drvinst.exe (PID: 3472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (87.8)
.exe | InstallShield setup (4.4)
.exe | Win32 Executable MS Visual C++ (generic) (3.2)
.exe | Win64 Executable (generic) (2.8)
.dll | Win32 Dynamic Link Library (generic) (0.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:02:22 16:43:00+01:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 59392
InitializedDataSize: 23040
UninitializedDataSize: -
EntryPoint: 0x9723
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
65
Monitored processes
19
Malicious processes
14
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start setupvcd5520.exe nstfdb8.tmp no specs devcon.exe no specs devcon.exe no specs drvinst.exe no specs rundll32.exe no specs vssvc.exe no specs drvinst.exe no specs drvinst.exe no specs vcddaemon.exe no specs setregacl.exe no specs rundll32.exe no specs executewithuac.exe no specs executewithuac.exe no specs vcddaemon.exe no specs vcdprefs.exe no specs vcdprefs.exe no specs explorer.exe no specs setupvcd5520.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1400C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1556"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /sC:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exeExecuteWithUAC.exe
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
MEDIUM
Description:
Virtual CloneDrive Daemon
Exit code:
0
Version:
5.5.1.0
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\elbyvcd.dll
c:\windows\system32\elbycdio.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
2052"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /uC:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exenstFDB8.tmp
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
HIGH
Description:
Virtual CloneDrive Daemon
Exit code:
0
Version:
5.5.1.0
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\elbyvcd.dll
c:\windows\system32\elbycdio.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
2472DrvInst.exe "2" "211" "ROOT\SCSIADAPTER\0000" "C:\Windows\INF\oem2.inf" "vclone.inf:Models:miniport:5.4.7.0:root\vclone" "64f288aa3" "000002BC" "000005DC" "000005E0"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2560"C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe" C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\setupvcd5520.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\shell32.dll
2628"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exe" /eC:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exetaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Description:
ElbyCDIO install helper process
Exit code:
0
Version:
1, 0, 1, 1
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\executewithuac.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
2680"C:\Users\admin\AppData\Local\Temp\nstFE24.tmp\DevCon.exe" status "root\vclone"C:\Users\admin\AppData\Local\Temp\nstFE24.tmp\DevCon.exenstFDB8.tmp
User:
admin
Company:
Windows (R) Codename Longhorn DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.0.6001.18000 built by: WinDDK
Modules
Images
c:\users\admin\appdata\local\temp\nstfe24.tmp\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rpcrt4.dll
2996nstFDB8.tmp /DOITC:\Users\admin\AppData\Local\Temp\nstFDA7.tmp\nstFDB8.tmpSetupVCD5520.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nstfda7.tmp\nstfdb8.tmp
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\lpk.dll
3176rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{42117fd2-f306-56cd-b084-a1347fcbc534} Global\{25c5d455-e287-789f-aeea-2818ecd54b14} C:\Windows\System32\DriverStore\Temp\{1a670ef0-774b-28d0-2b81-6f70f3ce7659}\vclone.inf C:\Windows\System32\DriverStore\Temp\{1a670ef0-774b-28d0-2b81-6f70f3ce7659}\VClone.catC:\Windows\System32\rundll32.exedrvinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3196"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exe" /sC:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exenstFDB8.tmp
User:
admin
Integrity Level:
HIGH
Description:
ElbyCDIO install helper process
Exit code:
0
Version:
1, 0, 1, 1
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\elaborate bytes\virtualclonedrive\executewithuac.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
Total events
20 479
Read events
20 351
Write events
121
Delete events
7

Modification events

(PID) Process:(1400) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(1400) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\NewShortcuts
Operation:delete keyName:(default)
Value:
(PID) Process:(1400) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2996) nstFDB8.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
114
(PID) Process:(3884) DevCon.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3464) drvinst.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3176) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3464) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000F2B487BA16B0D901C80700002C0A0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3464) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4000000000000000F2B487BA16B0D901C80700002C0A0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3464) drvinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
72
Executable files
30
Suspicious files
66
Text files
93
Unknown types
0

Dropped files

PID
Process
Filename
Type
2560SetupVCD5520.exeC:\Users\admin\AppData\Local\Temp\nstFDA7.tmp\nstFDB8.tmpexecutable
MD5:DEC8EDA3A1AF6A8039987FE854A84A91
SHA256:B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F
2996nstFDB8.tmpC:\Users\admin\AppData\Local\Temp\nstFE24.tmp\ExecuteWithUAC.exeexecutable
MD5:549E70189FA7B3034A8E58A48CB353C0
SHA256:BB23AC0440D9DE37D035E68895C53C559DF4F31C8D0905033AB40AD0A2910E77
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exeexecutable
MD5:549E70189FA7B3034A8E58A48CB353C0
SHA256:BB23AC0440D9DE37D035E68895C53C559DF4F31C8D0905033AB40AD0A2910E77
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\DevCon.exeexecutable
MD5:DD1232788611EF3471281C702A2FE90A
SHA256:0B329EF478FE62CD4A52290D0D892DA1FBE322039CBF64D75C051C32CD4271C7
2996nstFDB8.tmpC:\Users\admin\AppData\Local\Temp\nstFE24.tmp\InstallHelp.dllexecutable
MD5:E7715D8590B80E295D9168B1CF168C34
SHA256:B7AA5E64BF55719817E08718D99D509014585A4336426D46F6BDC91957D836C2
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\images\drive_verify.gifimage
MD5:96D1362C40FCC24F59AC003D0313582A
SHA256:29CF712474D747FDDB059BD6794AF360A1EF38B9522A0CD962F520009D54A64B
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\images\drive_select.gifimage
MD5:F8477BFE5372BEB19302BE80275288E8
SHA256:6741EBD69674A1CA090A35D2B29127BEA1165666C47E39AA134DC6065C3272F3
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\images\drive_install.gifimage
MD5:8BB7C851F6DE7B6183E890C57F7BFF04
SHA256:7645AEEB29280B511C5343C2D8966CD95671A2C5FAF0C3F2C9AF78879A71CB53
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\changes_vcd.txttext
MD5:561BA6EE30C115343F3D1D6263B0C10D
SHA256:52544A14AB1B7548D6DCE7BAC7AA0877CA2E8DA005384EE7DAEC89B44C52CC8D
2996nstFDB8.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\HelpLauncher.exeexecutable
MD5:9881A7049383E3C402ACD33D33B6D8E7
SHA256:88ED5539A9F8D68A8557AEFD59DC2B03F174CEACDA0CB491CB6F79260B613D3F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info