File name:

Macabacus2016.exe

Full analysis: https://app.any.run/tasks/2aba8902-554c-40a9-828c-0caedd96dba7
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 11, 2019, 03:20:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C5107D5BA8AC0980F99EB10B4F69622A

SHA1:

D5A500DEE2CD8619E4B33EA333C323FD2AFA704C

SHA256:

C48AFFD046DD25C0F921D03F0B9D3FDBE9759C68B77285C6C5835AFE41EFE92F

SSDEEP:

393216:lENKyb6J8pc/5SBdlagZXD8rwi2Kjla8sDjAY8XXK:lENKg+rtgZXD8rwiO3ABK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Macabacus2016.exe (PID: 2260)
    • Loads dropped or rewritten executable

      • Setup.exe (PID: 2824)
      • install.exe (PID: 3072)
      • addinutil.exe (PID: 2404)
    • Application was dropped or rewritten from another process

      • Setup.exe (PID: 2824)
      • vstor40_x86.exe (PID: 2392)
      • install.exe (PID: 3072)
    • Downloads executable files from the Internet

      • Macabacus2016.exe (PID: 2260)
    • Loads the Task Scheduler COM API

      • ngen.exe (PID: 2456)
      • ngen.exe (PID: 3852)
      • ngen.exe (PID: 2964)
      • ngen.exe (PID: 4000)
      • ngen.exe (PID: 2904)
      • ngen.exe (PID: 2928)
      • ngen.exe (PID: 3980)
      • ngen.exe (PID: 4092)
      • ngen.exe (PID: 2076)
      • ngen.exe (PID: 4040)
      • ngen.exe (PID: 3004)
      • ngen.exe (PID: 3300)
      • ngen.exe (PID: 3108)
      • ngen.exe (PID: 2948)
      • ngen.exe (PID: 3040)
      • ngen.exe (PID: 856)
      • ngen.exe (PID: 588)
      • ngen.exe (PID: 184)
      • ngen.exe (PID: 3300)
      • ngen.exe (PID: 1316)
      • ngen.exe (PID: 2236)
      • ngen.exe (PID: 3900)
      • ngen.exe (PID: 4072)
      • ngen.exe (PID: 3056)
      • ngen.exe (PID: 2800)
      • ngen.exe (PID: 3208)
      • ngen.exe (PID: 1316)
      • ngen.exe (PID: 3036)
      • ngen.exe (PID: 3208)
      • ngen.exe (PID: 3480)
      • ngen.exe (PID: 3372)
      • ngen.exe (PID: 2128)
      • ngen.exe (PID: 2464)
      • ngen.exe (PID: 3020)
      • ngen.exe (PID: 3056)
      • ngen.exe (PID: 3556)
      • ngen.exe (PID: 3320)
      • ngen.exe (PID: 3420)
      • ngen.exe (PID: 1472)
      • ngen.exe (PID: 2316)
      • ngen.exe (PID: 3568)
      • ngen.exe (PID: 1920)
      • ngen.exe (PID: 1420)
      • ngen.exe (PID: 2204)
      • ngen.exe (PID: 560)
      • ngen.exe (PID: 3220)
      • ngen.exe (PID: 3276)
      • ngen.exe (PID: 2520)
      • ngen.exe (PID: 2756)
      • ngen.exe (PID: 3708)
      • ngen.exe (PID: 2752)
      • ngen.exe (PID: 1724)
      • ngen.exe (PID: 3804)
      • ngen.exe (PID: 2784)
      • ngen.exe (PID: 1140)
      • ngen.exe (PID: 3248)
      • ngen.exe (PID: 1620)
      • ngen.exe (PID: 2588)
      • ngen.exe (PID: 2656)
      • ngen.exe (PID: 2172)
      • ngen.exe (PID: 3524)
      • ngen.exe (PID: 2096)
      • ngen.exe (PID: 2840)
      • ngen.exe (PID: 2856)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • vstor_redist.exe (PID: 2360)
      • vstor40_x86.exe (PID: 2392)
      • msiexec.exe (PID: 2632)
    • Modifies the open verb of a shell class

      • msiexec.exe (PID: 2632)
    • Creates COM task schedule object

      • msiexec.exe (PID: 2632)
    • Creates files in the Windows directory

      • ngen.exe (PID: 2904)
      • ngen.exe (PID: 4000)
      • ngen.exe (PID: 2456)
      • ngen.exe (PID: 3852)
      • ngen.exe (PID: 2964)
      • msiexec.exe (PID: 2632)
      • ngen.exe (PID: 2928)
      • ngen.exe (PID: 4040)
      • ngen.exe (PID: 3300)
      • ngen.exe (PID: 3004)
      • ngen.exe (PID: 3108)
      • ngen.exe (PID: 2948)
      • ngen.exe (PID: 3040)
      • ngen.exe (PID: 856)
      • ngen.exe (PID: 4092)
      • ngen.exe (PID: 3980)
      • ngen.exe (PID: 2076)
      • ngen.exe (PID: 1316)
      • ngen.exe (PID: 588)
      • ngen.exe (PID: 2236)
      • ngen.exe (PID: 3300)
      • ngen.exe (PID: 184)
      • ngen.exe (PID: 3056)
      • ngen.exe (PID: 3900)
      • ngen.exe (PID: 4072)
      • ngen.exe (PID: 3020)
      • ngen.exe (PID: 3208)
      • ngen.exe (PID: 1316)
      • ngen.exe (PID: 3036)
      • ngen.exe (PID: 3208)
      • ngen.exe (PID: 2128)
      • ngen.exe (PID: 3480)
      • ngen.exe (PID: 3372)
      • ngen.exe (PID: 3056)
      • ngen.exe (PID: 2800)
      • ngen.exe (PID: 3556)
      • ngen.exe (PID: 3320)
      • ngen.exe (PID: 3420)
      • ngen.exe (PID: 1472)
      • ngen.exe (PID: 2464)
      • ngen.exe (PID: 3568)
      • ngen.exe (PID: 1420)
      • ngen.exe (PID: 2204)
      • ngen.exe (PID: 560)
      • ngen.exe (PID: 3220)
      • ngen.exe (PID: 2316)
      • ngen.exe (PID: 3276)
      • ngen.exe (PID: 1920)
      • ngen.exe (PID: 2520)
      • ngen.exe (PID: 2756)
      • ngen.exe (PID: 2588)
      • ngen.exe (PID: 3708)
      • ngen.exe (PID: 1724)
      • ngen.exe (PID: 3804)
      • ngen.exe (PID: 2752)
      • ngen.exe (PID: 1140)
      • ngen.exe (PID: 1620)
      • ngen.exe (PID: 3248)
      • ngen.exe (PID: 2784)
      • ngen.exe (PID: 2096)
      • ngen.exe (PID: 2172)
      • ngen.exe (PID: 2840)
      • ngen.exe (PID: 2856)
      • ngen.exe (PID: 2656)
      • ngen.exe (PID: 3524)
    • Removes files from Windows directory

      • msiexec.exe (PID: 2632)
    • Starts Microsoft Installer

      • Macabacus2016.exe (PID: 2260)
    • Creates files in the program directory

      • Macabacus2016.exe (PID: 2260)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • vstor_redist.exe (PID: 2360)
    • Loads dropped or rewritten executable

      • msiexec.exe (PID: 2632)
      • MsiExec.exe (PID: 3516)
      • MsiExec.exe (PID: 3560)
    • Reads settings of System Certificates

      • msiexec.exe (PID: 2632)
    • Application launched itself

      • msiexec.exe (PID: 2632)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2632)
    • Creates files in the program directory

      • msiexec.exe (PID: 2632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:09:09 08:00:09+02:00
PEType: PE32
LinkerVersion: 11
CodeSize: 968704
InitializedDataSize: 620544
UninitializedDataSize: -
EntryPoint: 0xa759c
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 8.11.3.0
ProductVersionNumber: 8.11.3.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Macabacus, LLC
FileDescription: Macabacus Pro 2016
FileVersion: 8.11.3
InternalName: Setup
LegalCopyright: (C)2012 Macabacus, LLC
OriginalFileName: InstallShield Setup.exe
ProductName: Macabacus 2016
ProductVersion: 8.11.3
InternalBuildNumber: 158438
ISInternalVersion: 22.0.347
ISInternalDescription: Setup Launcher Unicode

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 09-Sep-2015 06:00:09
Detected languages:
  • English - United States
Debug artifacts:
  • C:\CodeBases\isdev\redist\Language Independent\i386\setupPreReq.pdb
CompanyName: Macabacus, LLC
FileDescription: Macabacus Pro 2016
FileVersion: 8.11.3
InternalName: Setup
LegalCopyright: (C)2012 Macabacus, LLC
OriginalFilename: InstallShield Setup.exe
ProductName: Macabacus 2016
ProductVersion: 8.11.3
Internal Build Number: 158438
ISInternalVersion: 22.0.347
ISInternalDescription: Setup Launcher Unicode

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 09-Sep-2015 06:00:09
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000EC6E6
0x000EC800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.55533
.rdata
0x000EE000
0x00041146
0x00041200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.95232
.data
0x00130000
0x00009058
0x00002800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.55179
.rsrc
0x0013A000
0x00053C2C
0x00053E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.73153

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.91161
381
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.835
744
Latin 1 / Western European
UNKNOWN
RT_ICON
3
3.35696
296
Latin 1 / Western European
UNKNOWN
RT_ICON
4
6.14965
3752
Latin 1 / Western European
UNKNOWN
RT_ICON
5
6.18448
2216
Latin 1 / Western European
UNKNOWN
RT_ICON
6
4.85842
1384
Latin 1 / Western European
UNKNOWN
RT_ICON
7
5.57777
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
8
5.81004
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
9
6.06596
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
10
3.22977
744
Latin 1 / Western European
UNKNOWN
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
CRYPT32.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
RPCRT4.dll
SHELL32.dll
USER32.dll
VERSION.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
198
Monitored processes
77
Malicious processes
5
Suspicious processes
66

Behavior graph

Click at the process to see the details
start drop and start drop and start macabacus2016.exe vstor_redist.exe setup.exe msiexec.exe vstor40_x86.exe install.exe no specs msiexec.exe no specs msiexec.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs addinutil.exe addinutil.exe no specs msiexec.exe no specs msiexec.exe no specs macabacus2016.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
184c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "Microsoft.Office.Tools.Excel.v9.0, Version=9.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
560c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\HostSideAdapters\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.dll" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
588c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "Microsoft.VisualStudio.Tools.Applications.Hosting.v9.0, Version=9.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
856c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "Microsoft.VisualStudio.Tools.Applications.Hosting.v10.0, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
1140c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "Microsoft.Office.Tools.Outlook, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msctf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\conhost.exe
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
1316c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "Microsoft.VisualStudio.Tools.Applications.ServerDocument.v10.0, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
1316c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0, Version=9.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\system32\taskschd.dll
c:\windows\system32\cryptbase.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscorsvc.dll
c:\windows\microsoft.net\framework\v4.0.30319\clr.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msctf.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
1420c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\HostSideAdapters\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.dll" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
1472c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
1620c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "Microsoft.Office.Tools.Common.Implementation, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
Total events
6 041
Read events
1 687
Write events
4 217
Delete events
137

Modification events

(PID) Process:(2260) Macabacus2016.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
Operation:writeName:%IS_PREREQ%-Macabacus 2016
Value:
3
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName: ISSetupPrerequisistes
Value:
"C:\Users\admin\AppData\Local\Temp\Macabacus2016.exe"
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Macabacus2016_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Macabacus2016_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Macabacus2016_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Macabacus2016_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Macabacus2016_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Macabacus2016_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Macabacus2016_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2260) Macabacus2016.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Macabacus2016_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
346
Suspicious files
9
Text files
197
Unknown types
18

Dropped files

PID
Process
Filename
Type
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\~B5C9.tmp
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\~B5DA.tmp
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\_isB5FA..dll
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\vstor_redist[1].exe
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\{0CAE4D50-8700-4DF8-B93A-5FAAEA39039E}\vstor_redist.exe
MD5:
SHA256:
2360vstor_redist.exeC:\a2f4d00db231480995b469\SetupEngine.dllexecutable
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\Windows Imaging Component (x86).prqxml
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\Microsoft VSTO 2010 Runtime x64.prqxml
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\Setup.INItext
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\Microsoft .NET Framework 4.5 Full.prqxml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
3
DNS requests
1
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2260
Macabacus2016.exe
GET
68.168.98.61:80
http://macabacus.com/downloads/prereqs/VSTO%202010%20Runtime/x86/vstor_redist.exe
US
suspicious
2260
Macabacus2016.exe
GET
200
68.168.98.61:80
http://macabacus.com/downloads/prereqs/VSTO%202010%20Runtime/x86/vstor_redist.exe
US
executable
38.1 Mb
suspicious
2260
Macabacus2016.exe
GET
301
68.168.98.61:80
http://www.macabacus.com/downloads/prereqs/VSTO%202010%20Runtime/x86/vstor_redist.exe
US
html
356 b
suspicious
2260
Macabacus2016.exe
GET
301
68.168.98.61:80
http://www.macabacus.com/downloads/prereqs/VSTO%202010%20Runtime/x86/vstor_redist.exe
US
html
356 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2260
Macabacus2016.exe
68.168.98.61:80
www.macabacus.com
Codero
US
suspicious

DNS requests

Domain
IP
Reputation
www.macabacus.com
  • 68.168.98.61
suspicious

Threats

PID
Process
Class
Message
2260
Macabacus2016.exe
A Network Trojan was detected
ET POLICY Installshield One Click Install User-Agent Toys File
2260
Macabacus2016.exe
A Network Trojan was detected
ET POLICY Installshield One Click Install User-Agent Toys File
2260
Macabacus2016.exe
A Network Trojan was detected
ET POLICY Installshield One Click Install User-Agent Toys File
2260
Macabacus2016.exe
A Network Trojan was detected
ET POLICY Installshield One Click Install User-Agent Toys File
2260
Macabacus2016.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144