| File name: | moscow.msi |
| Full analysis: | https://app.any.run/tasks/fce32ea2-b285-4dce-bee1-33abcebef066 |
| Verdict: | Malicious activity |
| Analysis date: | April 29, 2025, 15:34:34 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-msi |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Blank Project Template, Author: InstallShield, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Tue Apr 29 11:30:32 2025, Create Time/Date: Tue Apr 29 11:30:32 2025, Last Printed: Tue Apr 29 11:30:32 2025, Revision Number: {5A084ED2-691D-4A04-B93C-2850E4B0C026}, Code page: 1252, Template: Intel;1033 |
| MD5: | 885FD8B5A32DD2FA8EC90922EADD4693 |
| SHA1: | 8E5A2DDA6C30D1C84AA8D0BD214F64C97917C033 |
| SHA256: | BA25A9AA28FDA73323BEB643CD4E9F638CEB6D5E1C61459E133D41763C8C57C9 |
| SSDEEP: | 98304:DzntBCaM15O+FBJV09+Z8jdOf1pwvusWI6ZD/Utk1ojWm3SRFcW0u891tI8ctDRx:/ca7hgUZuz |
| .mst | | | Windows SDK Setup Transform Script (60.2) |
|---|---|---|
| .msi | | | Microsoft Installer (100) |
| Characters: | - |
|---|---|
| LastModifiedBy: | InstallShield |
| Words: | - |
| Title: | Installation Database |
| Comments: | Contact: Your local administrator |
| Keywords: | Installer,MSI,Database |
| Subject: | Blank Project Template |
| Author: | InstallShield |
| Security: | Password protected |
| Pages: | 200 |
| Software: | InstallShield? 2021 - Premier Edition with Virtualization Pack 27 |
| ModifyDate: | 2025:04:29 11:30:32 |
| CreateDate: | 2025:04:29 11:30:32 |
| LastPrinted: | 2025:04:29 11:30:32 |
| RevisionNumber: | {5A084ED2-691D-4A04-B93C-2850E4B0C026} |
| CodePage: | Windows Latin 1 (Western European) |
| Template: | Intel;1033 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 664 | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{71ACA7E3-9A30-41D5-A934-F6D91D501FEA} | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1052 | C:\Windows\syswow64\MsiExec.exe -Embedding 413A6ED9ABBEAD2894EAA9C54AB0EA79 C | C:\Windows\SysWOW64\msiexec.exe | msiexec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Exit code: 0 Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1764 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2340 | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CE83291D-B1DD-4964-8E2F-174FEA72FA22} | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3240 | C:\WINDOWS\SysWOW64\cmd.exe | C:\Windows\SysWOW64\cmd.exe | — | S-Cobalt.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4428 | C:\ProgramData\powerlaunch_JYv3_x86\S-Cobalt.exe | C:\ProgramData\powerlaunch_JYv3_x86\S-Cobalt.exe | S-Cobalt.exe | ||||||||||||
User: admin Company: AOMEI International Network Limited Integrity Level: MEDIUM Description: Splash Window Version: 4.0.0.0 Modules
| |||||||||||||||
| 4724 | C:\WINDOWS\system32\msiexec.exe /V | C:\Windows\System32\msiexec.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Version: 5.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5064 | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1EEA0744-62D3-4BFB-97C9-D633B8B77139} | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 5124 | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7A01B604-E10D-418A-B2F8-DD477AE6AE39} | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 5124 | C:\Users\admin\AppData\Local\Temp\{1E389B03-2ACC-4A31-9641-3FF0F5031EF0}\S-Cobalt.exe | C:\Users\admin\AppData\Local\Temp\{1E389B03-2ACC-4A31-9641-3FF0F5031EF0}\S-Cobalt.exe | msiexec.exe | ||||||||||||
User: admin Company: AOMEI International Network Limited Integrity Level: MEDIUM Description: Splash Window Exit code: 0 Version: 4.0.0.0 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1052 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{1E389B03-2ACC-4A31-9641-3FF0F5031EF0}\Kres.ym | — | |
MD5:— | SHA256:— | |||
| 5124 | S-Cobalt.exe | C:\ProgramData\powerlaunch_JYv3_x86\Kres.ym | — | |
MD5:— | SHA256:— | |||
| 4428 | S-Cobalt.exe | C:\Users\admin\AppData\Local\Temp\ECEE0EC.tmp | — | |
MD5:— | SHA256:— | |||
| 5512 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSID330.tmp | executable | |
MD5:A0E940A3D3C1523416675125E3B0C07E | SHA256:B8FA7AA425E4084EA3721780A13D11E08B8D53D1C5414B73F22FAECA1BFD314F | |||
| 1052 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISRT.dll | executable | |
MD5:8AF02BF8E358E11CAEC4F2E7884B43CC | SHA256:58A724D23C63387A2DDA27CCFDBC8CA87FD4DB671BEA8BB636247667F6A5A11E | |||
| 1052 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\IsConfig.ini | text | |
MD5:0190E026BF516E9A38526A5D5534E4B6 | SHA256:4B31A19BA314BCE99E0A3A84A0B77B70FFEF3C831EEAD4084ABC3A76C53C0EAB | |||
| 5124 | S-Cobalt.exe | C:\ProgramData\powerlaunch_JYv3_x86\msvcp140.dll | executable | |
MD5:E9F00DD8746712610706CBEFFD8DF0BD | SHA256:4CB882621A3D1C6283570447F842801B396DB1B3DCD2E01C2F7002EFD66A0A97 | |||
| 1052 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{2876764B-D5F6-44AD-8427-115E46D17A9F}\ISBEW64.exe | executable | |
MD5:40F3A092744E46F3531A40B917CCA81E | SHA256:561F14CDECE85B38617403E1C525FF0B1B752303797894607A4615D0BD66F97F | |||
| 1052 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{1E389B03-2ACC-4A31-9641-3FF0F5031EF0}\Bam.ptg | binary | |
MD5:6E8CBD11367872043FDB2B35DD634514 | SHA256:62EA7B895CD79E5D3D3A67207F97B5D5DD1BA3052816ECA83D6CECDB950BCBF7 | |||
| 1052 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{1E389B03-2ACC-4A31-9641-3FF0F5031EF0}\msvcp140.dll | executable | |
MD5:E9F00DD8746712610706CBEFFD8DF0BD | SHA256:4CB882621A3D1C6283570447F842801B396DB1B3DCD2E01C2F7002EFD66A0A97 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1616 | RUXIMICS.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1616 | RUXIMICS.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 304 | 4.245.163.56:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
3100 | SIHClient.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
3100 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
3100 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
3100 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
3100 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
— | — | GET | 304 | 4.245.163.56:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
— | — | GET | 200 | 52.165.164.15:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1616 | RUXIMICS.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
— | — | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
1616 | RUXIMICS.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
1616 | RUXIMICS.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3100 | SIHClient.exe | 4.245.163.56:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
softserver.cfd |
| unknown |
activation-v2.sls.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | A Network Trojan was detected | ET MALWARE DeerStealer POST Request containing Base64 Encoded 64 Byte String |