File name:

TortoiseSVN-1.14.8.29723-x64-svn-1.14.4.msi

Full analysis: https://app.any.run/tasks/5757a765-bed7-4ce4-93c3-61a95de7b1a7
Verdict: Malicious activity
Analysis date: October 21, 2024, 11:47:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
opendir
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Subversion Client, Author: Stefan Kueng, Keywords: Sourcecontrol;Subversion;TortoiseSVN;Shell, Comments: Windows Shell Integration For Subversion Source Control, v1.14.8.29723, Template: x64;1033, Revision Number: {D5F18CB7-6D83-4F8B-97D5-ED36C9E01CF9}, Create Time/Date: Sat Oct 5 07:09:38 2024, Last Saved Time/Date: Sat Oct 5 07:09:38 2024, Number of Pages: 405, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
MD5:

BC79CEC21A8ACC0FA0AA65DB2DC6A2EE

SHA1:

3C9D5D868E93AC9038AA8C40E4B66CAB5A5D27D0

SHA256:

CC4AEAE4CFE958F330A16AFC2967AB583A8FC63166DF508DBC6BDB198339DADF

SSDEEP:

393216:6nZk7Gu+6zGqpsC8TTHfv/1/c50EfPg19p:u4tzLpeTHX/y5Pg1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 6952)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 7100)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 7100)
  • INFO

    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 3104)
    • An automatically generated document

      • msiexec.exe (PID: 3104)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 3104)
    • Checks proxy server information

      • msiexec.exe (PID: 3104)
    • Checks supported languages

      • msiexec.exe (PID: 7100)
    • Reads the computer name

      • msiexec.exe (PID: 7100)
    • Reads the software policy settings

      • msiexec.exe (PID: 3104)
    • Manages system restore points

      • SrTasks.exe (PID: 612)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7100)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Subversion Client
Author: Stefan Kueng
Keywords: Sourcecontrol;Subversion;TortoiseSVN;Shell
Comments: Windows Shell Integration For Subversion Source Control, v1.14.8.29723
Template: x64;1033
RevisionNumber: {D5F18CB7-6D83-4F8B-97D5-ED36C9E01CF9}
CreateDate: 2024:10:05 07:09:38
ModifyDate: 2024:10:05 07:09:38
Pages: 405
Words: 2
Software: Windows Installer XML Toolset (3.14.1.8722)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
612C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3104"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\Desktop\TortoiseSVN-1.14.8.29723-x64-svn-1.14.4.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6332\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6340C:\Windows\syswow64\MsiExec.exe -Embedding DC02913B19CF0C9D3775AEBF2AD8F752C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6952C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7100C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
12 288
Read events
11 073
Write events
1 197
Delete events
18

Modification events

(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4800000000000000E2659E1BAF23DB01BC1B00001C180000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000003EC9A01BAF23DB01BC1B00001C180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000C101DA1BAF23DB01BC1B00001C180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000C101DA1BAF23DB01BC1B00001C180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
480000000000000022C9DE1BAF23DB01BC1B00001C180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4800000000000000312DE11BAF23DB01BC1B00001C180000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000E6F7421CAF23DB01BC1B00001C180000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7100) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000C05B451CAF23DB01BC1B0000BC150000E80300000100000000000000000000005774333A8AA14B4BA5080CAB7193A50400000000000000000000000000000000
(PID) Process:(6952) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000B0754C1CAF23DB01281B0000F8180000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
97
Suspicious files
32
Text files
182
Unknown types
3

Dropped files

PID
Process
Filename
Type
7100msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
7100msiexec.exeC:\Windows\Installer\9b4dd.msi
MD5:
SHA256:
7100msiexec.exeC:\Windows\Installer\MSIB79C.tmpexecutable
MD5:8EDC1557E9FC7F25F89AD384D01BCEC4
SHA256:78860E15E474CC2AF7AD6E499A8971B6B8197AFB8E49A1B9EAAA392E4378F3A5
3104msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\856FDBDDFEAC90A3D62D621EBF196637der
MD5:E4AF6DEBFB86571BCBFBCEE68DABA556
SHA256:13943EB10C5A474E425C87DF08683D23444349344F48F66D2AC12768D28C93B4
3104msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\68FAF71AF355126BCA00CE2E73CC7374_E5F521CA60C5ED8C2B4E2BF399FE2061binary
MD5:A7E827A2B26027E46B7FAE1A76C86857
SHA256:67F769378226EAC6E5AD004D175E7862265F4040C9B3BF3FEFE702D1CD7143F7
3104msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\68FAF71AF355126BCA00CE2E73CC7374_E5F521CA60C5ED8C2B4E2BF399FE2061der
MD5:81562A24E7DD131904AB69B75196B143
SHA256:B4692243C392FD65605F1DDF4E9BBFD49B132EB7EF4C43F194BD107369DC66CA
3104msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\30069012ED3CF5DB92F9F4FC78D55E2D_87238437CEFCADF00F1385E31A888EF4binary
MD5:1E8DB346C7A2268C1675B24446F5AF89
SHA256:72E136FC98F9E5886DAD34F3649D6F4B3696588CFEF5E3B07CB10DCDBB45FD6D
7100msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:9A6C11E4D4FD25136E29E994C72471E7
SHA256:F9961D6F1F8236B1A13DC13E037072139C171E55979FF6AA096782C381AD53A0
3104msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30069012ED3CF5DB92F9F4FC78D55E2D_87238437CEFCADF00F1385E31A888EF4der
MD5:45A6F17B04529A61F0ACD92557A7463B
SHA256:C8B74B7158CAE30F4274DB5D34188BFB378A26CAEAD435765126983086E52127
7100msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{3a337457-a18a-4b4b-a508-0cab7193a504}_OnDiskSnapshotPropbinary
MD5:9A6C11E4D4FD25136E29E994C72471E7
SHA256:F9961D6F1F8236B1A13DC13E037072139C171E55979FF6AA096782C381AD53A0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
25
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.51.49.221:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.51.49.221:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.51.49.221:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3104
msiexec.exe
GET
200
2.23.84.5:80
http://subca.ocsp-certum.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEBu1jyUq3yMASSjJrj1%2B7Sc%3D
unknown
whitelisted
3104
msiexec.exe
GET
200
173.222.105.28:80
http://crl.certum.pl/ctnca.crl
unknown
whitelisted
3104
msiexec.exe
GET
200
2.23.84.5:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRIH1V64SBkA%2BzJQVQ6VFBAcvLB3wQUtqFUOQLDoD%2BOirz61PgcptE6Dv0CEQCZo4AKJlU7ZavcboSms%2Bo5
unknown
whitelisted
6944
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3104
msiexec.exe
GET
200
2.23.84.5:80
http://subca.ocsp-certum.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEBu1jyUq3yMASSjJrj1%2B7Sc%3D
unknown
whitelisted
3104
msiexec.exe
GET
200
2.23.84.31:80
http://ccsca2021.ocsp-certum.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRxypYNH69rICCzQBIRXN0YAFa3AAQU3XRdTADbe5%2BgdMqxbvc8wDLAcM0CEC9HLyvaL3lkIY0RN3zihqE%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.209.189:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
23.51.49.221:80
www.microsoft.com
TM Net, Internet Service Provider
MY
whitelisted
23.51.49.221:80
www.microsoft.com
TM Net, Internet Service Provider
MY
whitelisted
5488
MoUsoCoreWorker.exe
23.51.49.221:80
www.microsoft.com
TM Net, Internet Service Provider
MY
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
www.bing.com
  • 2.23.209.189
  • 2.23.209.186
  • 2.23.209.131
  • 2.23.209.192
  • 2.23.209.193
  • 2.23.209.187
  • 2.23.209.191
  • 2.23.209.183
  • 2.23.209.182
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 23.51.49.221
whitelisted
subca.ocsp-certum.com
  • 2.23.84.5
  • 2.23.84.31
whitelisted
crl.certum.pl
  • 173.222.105.28
  • 173.222.105.39
  • 173.222.105.23
  • 173.222.105.59
whitelisted
ccsca2021.ocsp-certum.com
  • 2.23.84.31
  • 2.23.84.5
unknown
self.events.data.microsoft.com
  • 20.42.73.26
whitelisted

Threats

No threats detected
No debug info