| File name: | SetupVCD5520.exe |
| Full analysis: | https://app.any.run/tasks/a4d0479e-1378-4f13-ae26-60e8b6625264 |
| Verdict: | Malicious activity |
| Analysis date: | January 27, 2024, 18:14:25 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | DEC8EDA3A1AF6A8039987FE854A84A91 |
| SHA1: | B869A7C4F1F8E2CEEB9B248CCC41782F005B02A1 |
| SHA256: | B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F |
| SSDEEP: | 24576:wihLOEdf7GOApNkiGz7CyNjP6xs1pBeNORUvL4nOTgr4EWl8DXfX8aGko77ISC4F:wiBOEdvvz7CyhgNrMn34ElXf0kxh4EW |
| .exe | | | NSIS - Nullsoft Scriptable Install System (87.8) |
|---|---|---|
| .exe | | | InstallShield setup (4.4) |
| .exe | | | Win32 Executable MS Visual C++ (generic) (3.2) |
| .exe | | | Win64 Executable (generic) (2.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (0.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:02:22 16:43:00+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 59392 |
| InitializedDataSize: | 23040 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x9723 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1388 | nst9412.tmp /DOIT | C:\Users\admin\AppData\Local\Temp\nst9411.tmp\nst9412.tmp | SetupVCD5520.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1576 | rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{3d618dc8-e0f0-321c-81a3-cf31aa80667f} Global\{64d3408a-6da8-290d-5605-2d221f233e6e} C:\Windows\System32\DriverStore\Temp\{2437f065-f5b0-207e-6959-cf10aa35ed7e}\vclone.inf C:\Windows\System32\DriverStore\Temp\{2437f065-f5b0-207e-6959-cf10aa35ed7e}\VClone.cat | C:\Windows\System32\rundll32.exe | — | drvinst.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2256 | DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{21277cb4-d525-693e-defa-bf6357e21d38}\vclone.inf" "0" "64f288aa3" "000003EC" "WinSta0\Default" "000005D8" "208" "c:\users\admin\appdata\local\temp\nst945f.tmp" | C:\Windows\System32\drvinst.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2504 | "C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe" install VClone.inf "root\vclone" | C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe | nst9412.tmp | ||||||||||||
User: admin Company: Windows (R) Codename Longhorn DDK provider Integrity Level: HIGH Description: Windows Setup API Exit code: 0 Version: 6.0.6001.18000 built by: WinDDK Modules
| |||||||||||||||
| 2692 | "C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe" | C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2784 | DrvInst.exe "1" "200" "SCSI\CdRom&Ven_ELBY&Prod_CLONEDRIVE&Rev_1.4\1&2afd7d61&0&000000" "" "" "6bc255963" "00000000" "00000550" "000005F8" | C:\Windows\System32\drvinst.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2804 | "C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe" status "root\vclone" | C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe | — | nst9412.tmp | |||||||||||
User: admin Company: Windows (R) Codename Longhorn DDK provider Integrity Level: HIGH Description: Windows Setup API Exit code: 0 Version: 6.0.6001.18000 built by: WinDDK Modules
| |||||||||||||||
| 2824 | DrvInst.exe "2" "211" "ROOT\SCSIADAPTER\0000" "C:\Windows\INF\oem2.inf" "vclone.inf:Models:miniport:5.4.7.0:root\vclone" "64f288aa3" "000003EC" "000005E8" "000005F0" | C:\Windows\System32\drvinst.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3248 | "C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /u | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe | — | nst9412.tmp | |||||||||||
User: admin Company: Elaborate Bytes AG Integrity Level: HIGH Description: Virtual CloneDrive Daemon Exit code: 0 Version: 5.5.1.0 Modules
| |||||||||||||||
| 3452 | "C:\Program Files\Elaborate Bytes\VirtualCloneDrive\SetRegACL.exe" Software\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons 64 | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\SetRegACL.exe | — | nst9412.tmp | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1388) nst9412.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | GlobalAssocChangedCounter |
Value: 115 | |||
| (PID) Process: | (2504) DevCon.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2504) DevCon.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (2504) DevCon.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (2504) DevCon.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (2256) drvinst.exe | Key: | HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1576) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2256) drvinst.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore |
| Operation: | write | Name: | SrCreateRp (Enter) |
Value: 40000000000000003811FC442B2FDA01740A0000480C0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2256) drvinst.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP |
| Operation: | write | Name: | SppCreate (Enter) |
Value: 40000000000000003811FC442B2FDA01740A0000480C0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2256) drvinst.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP |
| Operation: | write | Name: | LastIndex |
Value: 74 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1388 | nst9412.tmp | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\vcd-uninst.exe | executable | |
MD5:689C34FDC60E7D2B3B50AE6528F2C218 | SHA256:4137A357D55366746C5F6FC7ED186CA584E8DEB577F81CE81AFB2C3C50C19D02 | |||
| 1388 | nst9412.tmp | C:\Users\admin\AppData\Local\Temp\nst945F.tmp\InstallHelp.dll | executable | |
MD5:E7715D8590B80E295D9168B1CF168C34 | SHA256:B7AA5E64BF55719817E08718D99D509014585A4336426D46F6BDC91957D836C2 | |||
| 1388 | nst9412.tmp | C:\Users\admin\AppData\Local\Temp\nst945F.tmp\ExecuteWithUAC.exe | executable | |
MD5:549E70189FA7B3034A8E58A48CB353C0 | SHA256:BB23AC0440D9DE37D035E68895C53C559DF4F31C8D0905033AB40AD0A2910E77 | |||
| 2692 | SetupVCD5520.exe | C:\Users\admin\AppData\Local\Temp\nst9411.tmp\nst9412.tmp | executable | |
MD5:DEC8EDA3A1AF6A8039987FE854A84A91 | SHA256:B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F | |||
| 1388 | nst9412.tmp | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exe | executable | |
MD5:549E70189FA7B3034A8E58A48CB353C0 | SHA256:BB23AC0440D9DE37D035E68895C53C559DF4F31C8D0905033AB40AD0A2910E77 | |||
| 1388 | nst9412.tmp | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\InstallHelp.dll | executable | |
MD5:E7715D8590B80E295D9168B1CF168C34 | SHA256:B7AA5E64BF55719817E08718D99D509014585A4336426D46F6BDC91957D836C2 | |||
| 1388 | nst9412.tmp | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\drive.html | html | |
MD5:5AC08AFD6BBE947C675CD326E474CF58 | SHA256:DDC841523DA9ADA30F56ABAE336699B968819FD2E23DE07812258823F66823BF | |||
| 1388 | nst9412.tmp | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\changes_vcd.txt | text | |
MD5:561BA6EE30C115343F3D1D6263B0C10D | SHA256:52544A14AB1B7548D6DCE7BAC7AA0877CA2E8DA005384EE7DAEC89B44C52CC8D | |||
| 1388 | nst9412.tmp | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\images\drive_shell.gif | image | |
MD5:9FF265B511E76F76B75522CEB1C0AC7B | SHA256:58313A6273C2EA5B333D6B170E0C534F88B14946C55D8B1E81DCEE0130BDFB2C | |||
| 1388 | nst9412.tmp | C:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\images\drive_select.gif | image | |
MD5:F8477BFE5372BEB19302BE80275288E8 | SHA256:6741EBD69674A1CA090A35D2B29127BEA1165666C47E39AA134DC6065C3272F3 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |