File name:

OInstall.exe

Full analysis: https://app.any.run/tasks/d6f32fb0-4911-4206-a090-962cfe4b112f
Verdict: Malicious activity
Analysis date: January 14, 2024, 21:30:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

209635421416545CB239F7484909FCF8

SHA1:

850FB53685BC7E70FE267AAED72F45AE7589EE03

SHA256:

E71D9DAE0AE73CA4950FD14CC868DE8FFDC25985C93B033994631271C74C98E7

SSDEEP:

196608:O09sOIeV8WTmnAyv+T9hq6F7ZPXLmohRlQ:jsOIOTmnPv+xhqcZPXtlQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • OInstall.exe (PID: 2268)
      • files.dat (PID: 1632)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • OInstall.exe (PID: 2268)
    • Uses REG/REGEDIT.EXE to modify registry

      • OInstall.exe (PID: 2268)
    • Starts application with an unusual extension

      • cmd.exe (PID: 480)
    • Executable content was dropped or overwritten

      • OInstall.exe (PID: 2268)
      • files.dat (PID: 1632)
    • Drops 7-zip archiver for unpacking

      • OInstall.exe (PID: 2268)
    • The executable file from the user directory is run by the CMD process

      • files.dat (PID: 1632)
    • The process drops C-runtime libraries

      • files.dat (PID: 1632)
    • Process drops legitimate windows executable

      • OInstall.exe (PID: 2268)
      • files.dat (PID: 1632)
    • Reads the Internet Settings

      • powershell.exe (PID: 1584)
      • powershell.exe (PID: 2852)
      • powershell.exe (PID: 3128)
      • powershell.exe (PID: 1556)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 1584)
      • powershell.exe (PID: 1556)
      • powershell.exe (PID: 2852)
      • powershell.exe (PID: 3128)
    • Probably download files using WebClient

      • OInstall.exe (PID: 2268)
    • Starts POWERSHELL.EXE for commands execution

      • OInstall.exe (PID: 2268)
    • Unusual connection from system programs

      • powershell.exe (PID: 1584)
      • powershell.exe (PID: 1556)
      • powershell.exe (PID: 2852)
      • powershell.exe (PID: 3128)
  • INFO

    • Checks supported languages

      • OInstall.exe (PID: 2268)
      • files.dat (PID: 1632)
    • Reads the computer name

      • OInstall.exe (PID: 2268)
    • Reads Environment values

      • OInstall.exe (PID: 2268)
    • Create files in a temporary directory

      • OInstall.exe (PID: 2268)
      • files.dat (PID: 1632)
      • expand.exe (PID: 1784)
      • expand.exe (PID: 3016)
      • expand.exe (PID: 240)
    • Creates files in the program directory

      • OInstall.exe (PID: 2268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (76)
.exe | Win32 Executable (generic) (12.6)
.exe | Generic Win/DOS Executable (5.6)
.exe | DOS Executable Generic (5.6)

EXIF

EXE

FileDescription: Office 2013-2021 C2R Install
ProductName: Office 2013-2021 C2R Install
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Unknown
FileOS: Unknown (0)
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 7.7.2.0
FileVersionNumber: 7.7.2.0
Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: -
OSVersion: 4
EntryPoint: 0x1f1db90
UninitializedDataSize: 16822272
InitializedDataSize: 90112
CodeSize: 15802368
LinkerVersion: 2.5
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2023:09:15 06:09:08+02:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
68
Monitored processes
18
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start oinstall.exe no specs oinstall.exe reg.exe no specs cmd.exe no specs files.dat powershell.exe expand.exe no specs powershell.exe no specs powershell.exe expand.exe no specs powershell.exe no specs cmd.exe no specs regedit.exe no specs reg.exe no specs powershell.exe expand.exe no specs powershell.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
2044"C:\Users\admin\AppData\Local\Temp\OInstall.exe" C:\Users\admin\AppData\Local\Temp\OInstall.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Office 2013-2021 C2R Install
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\oinstall.exe
c:\windows\system32\ntdll.dll
2268"C:\Users\admin\AppData\Local\Temp\OInstall.exe" C:\Users\admin\AppData\Local\Temp\OInstall.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Office 2013-2021 C2R Install
Modules
Images
c:\users\admin\appdata\local\temp\oinstall.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
1380"C:\Windows\System32\reg.exe" add "HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings" /v Enabled /t REG_DWORD /d 1 /fC:\Windows\System32\reg.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
480"C:\Windows\System32\cmd.exe" /D /c files.dat -y -pkmsautoC:\Windows\System32\cmd.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1632files.dat -y -pkmsautoC:\Users\admin\AppData\Local\Temp\files\files.dat
cmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7z Console SFX
Exit code:
0
Version:
18.05
Modules
Images
c:\users\admin\appdata\local\temp\files\files.dat
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1584"powershell" -command "& { (New-Object Net.WebClient).DownloadFile('http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v32.cab', 'C:\Users\admin\AppData\Local\Temp\over6591861\v32.cab') }"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
OInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
1784"expand" v32.cab -F:VersionDescriptor.xml C:\Users\admin\AppData\Local\Temp\over6591861C:\Windows\System32\expand.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
LZ Expansion Utility
Exit code:
0
Version:
6.1.7601.24535 (win7sp1_ldr_escrow.191105-1059)
Modules
Images
c:\windows\system32\expand.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\cabinet.dll
1656"powershell" -command "& { Get-Content C:\Users\admin\AppData\Local\Temp\over6591861\VersionDescriptor.xml | Set-Content -Encoding ASCII v32.txt }C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
1556"powershell" -command "& { (New-Object Net.WebClient).DownloadFile('http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32.cab', 'C:\Users\admin\AppData\Local\Temp\over7247566\v32.cab') }"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
OInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
240"expand" v32.cab -F:VersionDescriptor.xml C:\Users\admin\AppData\Local\Temp\over7247566C:\Windows\System32\expand.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
LZ Expansion Utility
Exit code:
0
Version:
6.1.7601.24535 (win7sp1_ldr_escrow.191105-1059)
Modules
Images
c:\windows\system32\expand.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\cabinet.dll
Total events
5 318
Read events
5 315
Write events
3
Delete events
0

Modification events

(PID) Process:(2268) OInstall.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MediaResources\DirectSound\Speaker Configuration
Operation:writeName:Speaker Configuration
Value:
4
Executable files
7
Suspicious files
18
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
1632files.datC:\Users\admin\AppData\Local\Temp\files\x86\cleanospp.exeexecutable
MD5:98821A7A5737D656633D10A3AFB724BD
SHA256:04BA4487F95290E0B0557B44300C18F637FBAF0872EE96E3111013B8A1539F25
1656powershell.exeC:\Users\admin\AppData\Local\Temp\pjvbvdry.2x2.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
1556powershell.exeC:\Users\admin\AppData\Local\Temp\xtdgltk4.vcb.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
1632files.datC:\Users\admin\AppData\Local\Temp\files\Uninstall.xmltext
MD5:364F86F97324EA82FE0D142CD01CF6DD
SHA256:09D5B42140BAB13165BA97FBD0E77792304C3C93555BE02C3DCE21A7A69C66DD
1584powershell.exeC:\Users\admin\AppData\Local\Temp\eohqrm0x.r2a.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
2268OInstall.exeC:\Users\admin\AppData\Local\Temp\files\Configure.xmltext
MD5:F693E4FB8D3907E6CC44A34E1CC87296
SHA256:CDCD3FA3CB1EBFAFC98273AE52632F80B95CB9D25933EE1C7D2FDEC640B264D0
240expand.exeC:\Users\admin\AppData\Local\Temp\over7247566\VersionDescriptor.xmlxml
MD5:ADBB2C3F044C3ED52474E01515211C13
SHA256:BEE79DF988B8C342D79ABF57B77DCC301C5DA616D6019C60C70B8C2F52365DCF
1784expand.exeC:\Windows\Logs\DPX\setupact.logtext
MD5:882BD9FE8E2B96B78CF123F36517E6B2
SHA256:FBB5AB6D3F15B171926D3C49F4B9EAD421E4E7C0EC404238FBA1ED1D8DDF198E
1632files.datC:\Users\admin\AppData\Local\Temp\files\x64\cleanospp.exeexecutable
MD5:D3467CB7B83B654C2D05407DC7BA2360
SHA256:EDF85F4E2EF1A427B34265A22F261D664EC78DE90C3B5DA4174EF28558C8522A
1584powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
8
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1556
powershell.exe
GET
200
152.199.21.175:80
http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32.cab
unknown
compressed
11.2 Kb
2852
powershell.exe
GET
200
152.199.21.175:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v32.cab
unknown
compressed
10.9 Kb
1584
powershell.exe
GET
200
152.199.21.175:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v32.cab
unknown
compressed
10.9 Kb
3128
powershell.exe
GET
152.199.21.175:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/16.0.14332.20624/i320.cab
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
1584
powershell.exe
152.199.21.175:80
officecdn.microsoft.com
EDGECAST
DE
unknown
1556
powershell.exe
152.199.21.175:80
officecdn.microsoft.com
EDGECAST
DE
unknown
2852
powershell.exe
152.199.21.175:80
officecdn.microsoft.com
EDGECAST
DE
unknown
3128
powershell.exe
152.199.21.175:80
officecdn.microsoft.com
EDGECAST
DE
unknown

DNS requests

Domain
IP
Reputation
officecdn.microsoft.com
  • 152.199.21.175
unknown

Threats

No threats detected
No debug info