File name:

AutoInstaller.exe

Full analysis: https://app.any.run/tasks/33011c55-4f58-4b2d-a4a9-9175e6cee8b1
Verdict: Malicious activity
Threats:

SystemBC is a Remote Access Trojan (RAT) that can hide communication with the Command and Control server, and deposit other malware strains.

Analysis date: October 24, 2023, 23:50:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
systembc
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8F797543072BEB845A51F33EA12278AF

SHA1:

177981EF0454885F372EB53FA672A62702196E65

SHA256:

E8187F81F39C861D5BEF4E0A0905AB1AB257B05EEEF8AE5AE5C8E7A4ACEF71B0

SSDEEP:

49152:r7HecD4dnbibBl2kG7DC51AeTTJ34bZtV0o+kGJfzhLN24LLKJ8JN+UAb7EMZsga:X+cD4dnJ25ueTTd4tt2jzh84vTJNknEN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • AutoInstaller.exe (PID: 3416)
      • AutoInstaller.exe (PID: 3016)
      • AutoInstaller.exe (PID: 3136)
      • AutoInstaller.tmp (PID: 1240)
      • Mod_Installer.exe (PID: 3648)
      • Mod_Installer.tmp (PID: 2252)
    • Application was dropped or rewritten from another process

      • Mod_Installer.exe (PID: 3648)
    • Loads dropped or rewritten executable

      • Mod_Installer.tmp (PID: 2252)
    • SYSTEMBC has been detected (YARA)

      • Mod_Installer.tmp (PID: 2252)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • AutoInstaller.tmp (PID: 1412)
      • AutoInstaller.tmp (PID: 1240)
      • Mod_Installer.tmp (PID: 2252)
    • Reads the Internet Settings

      • AutoInstaller.tmp (PID: 1412)
      • AutoInstaller.tmp (PID: 1240)
    • Reads settings of System Certificates

      • AutoInstaller.tmp (PID: 1240)
    • Process drops legitimate windows executable

      • Mod_Installer.tmp (PID: 2252)
  • INFO

    • Reads the computer name

      • AutoInstaller.tmp (PID: 2120)
      • AutoInstaller.tmp (PID: 1412)
      • AutoInstaller.tmp (PID: 1240)
      • Mod_Installer.tmp (PID: 2252)
    • Create files in a temporary directory

      • AutoInstaller.exe (PID: 3416)
      • AutoInstaller.exe (PID: 3016)
      • AutoInstaller.exe (PID: 3136)
      • AutoInstaller.tmp (PID: 1240)
      • Mod_Installer.exe (PID: 3648)
      • Mod_Installer.tmp (PID: 2252)
    • Checks supported languages

      • AutoInstaller.exe (PID: 3416)
      • AutoInstaller.tmp (PID: 2120)
      • AutoInstaller.exe (PID: 3016)
      • AutoInstaller.tmp (PID: 1412)
      • AutoInstaller.exe (PID: 3136)
      • AutoInstaller.tmp (PID: 1240)
      • Mod_Installer.exe (PID: 3648)
      • Mod_Installer.tmp (PID: 2252)
    • Reads the machine GUID from the registry

      • AutoInstaller.tmp (PID: 1240)
    • Application was dropped or rewritten from another process

      • AutoInstaller.tmp (PID: 1412)
      • AutoInstaller.tmp (PID: 1240)
      • AutoInstaller.tmp (PID: 2120)
      • Mod_Installer.tmp (PID: 2252)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (65.1)
.exe | Win32 EXE PECompact compressed (generic) (24.6)
.dll | Win32 Dynamic Link Library (generic) (3.9)
.exe | Win32 Executable (generic) (2.6)
.exe | Win16/32 Executable Delphi generic (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 15:54:16+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 68096
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: ModsTech
FileDescription: Mod installer from the ModsTech community.
FileVersion: 1.0.0.0
LegalCopyright: Copyright © 2020-2023 ModsTech.
OriginalFileName:
ProductName: AutoInstaller 1.0.0.0
ProductVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
8
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start autoinstaller.exe no specs autoinstaller.tmp no specs autoinstaller.exe autoinstaller.tmp no specs autoinstaller.exe no specs autoinstaller.tmp mod_installer.exe no specs #SYSTEMBC mod_installer.tmp

Process information

PID
CMD
Path
Indicators
Parent process
1240"C:\Users\admin\AppData\Local\Temp\is-7FBFN.tmp\AutoInstaller.tmp" /SL5="$60300,811008,811008,C:\Users\admin\Desktop\AutoInstaller.exe" /VERYSILENTC:\Users\admin\AppData\Local\Temp\is-7FBFN.tmp\AutoInstaller.tmp
AutoInstaller.exe
User:
admin
Company:
ModsTech
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-7fbfn.tmp\autoinstaller.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1412"C:\Users\admin\AppData\Local\Temp\is-7SODI.tmp\AutoInstaller.tmp" /SL5="$30302,811008,811008,C:\Users\admin\Desktop\AutoInstaller.exe" /SPAWNWND=$140216 /NOTIFYWND=$50300 C:\Users\admin\AppData\Local\Temp\is-7SODI.tmp\AutoInstaller.tmpAutoInstaller.exe
User:
admin
Company:
ModsTech
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
1
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-7sodi.tmp\autoinstaller.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2120"C:\Users\admin\AppData\Local\Temp\is-23S4I.tmp\AutoInstaller.tmp" /SL5="$50300,811008,811008,C:\Users\admin\Desktop\AutoInstaller.exe" C:\Users\admin\AppData\Local\Temp\is-23S4I.tmp\AutoInstaller.tmpAutoInstaller.exe
User:
admin
Company:
ModsTech
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
1
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-23s4i.tmp\autoinstaller.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2252"C:\Users\admin\AppData\Local\Temp\is-69CH9.tmp\Mod_Installer.tmp" /SL5="$70300,2160366,171008,C:\Users\admin\AppData\Local\Temp\Mod_Installer.exe" C:\Users\admin\AppData\Local\Temp\is-69CH9.tmp\Mod_Installer.tmp
Mod_Installer.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-69ch9.tmp\mod_installer.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3016"C:\Users\admin\Desktop\AutoInstaller.exe" /SPAWNWND=$140216 /NOTIFYWND=$50300 C:\Users\admin\Desktop\AutoInstaller.exe
AutoInstaller.tmp
User:
admin
Company:
ModsTech
Integrity Level:
HIGH
Description:
Mod installer from the ModsTech community.
Exit code:
1
Version:
1.0.0.0
Modules
Images
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\autoinstaller.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
3136"C:\Users\admin\Desktop\AutoInstaller.exe" /VERYSILENTC:\Users\admin\Desktop\AutoInstaller.exeAutoInstaller.tmp
User:
admin
Company:
ModsTech
Integrity Level:
HIGH
Description:
Mod installer from the ModsTech community.
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\autoinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3416"C:\Users\admin\Desktop\AutoInstaller.exe" C:\Users\admin\Desktop\AutoInstaller.exeexplorer.exe
User:
admin
Company:
ModsTech
Integrity Level:
MEDIUM
Description:
Mod installer from the ModsTech community.
Exit code:
1
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\autoinstaller.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\comctl32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3648"C:\Users\admin\AppData\Local\Temp\Mod_Installer.exe"C:\Users\admin\AppData\Local\Temp\Mod_Installer.exeAutoInstaller.tmp
User:
admin
Company:
ModsTech
Integrity Level:
HIGH
Description:
Mod installer from the ModsTech community.
Exit code:
0
Version:
24.10.23.8
Modules
Images
c:\users\admin\appdata\local\temp\mod_installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
Total events
4 253
Read events
4 221
Write events
20
Delete events
12

Modification events

(PID) Process:(1412) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1412) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1412) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1412) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1412) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(1412) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
3C9B5239D2379B012CAE31442BCBBCB7A41AAAED8CBCA9F318B07ACE2E740BE4
(PID) Process:(1412) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
840500004C1FCBE9D406DA01
(PID) Process:(1412) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
(PID) Process:(1240) AutoInstaller.tmpKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1240) AutoInstaller.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
Executable files
16
Suspicious files
0
Text files
38
Unknown types
0

Dropped files

PID
Process
Filename
Type
3648Mod_Installer.exeC:\Users\admin\AppData\Local\Temp\is-69CH9.tmp\Mod_Installer.tmpexecutable
MD5:6F2357869B62A65609506FCE9A782C0D
SHA256:58302EE01FD9D1DF285555D5DE8F477FC16EC329483D704F4FCB2D64E63BA0F1
1240AutoInstaller.tmpC:\Users\admin\AppData\Local\Temp\is-IJNFM.tmp\is-DPAA2.tmpexecutable
MD5:AE08008756A1B19065182C2710A3961E
SHA256:2D70D84CD7B135E0903FF195EE9DCC526038573170C49510C2208F08DC5350A9
1240AutoInstaller.tmpC:\Users\admin\AppData\Local\Temp\is-IJNFM.tmp\Mod_Installer.exeexecutable
MD5:AE08008756A1B19065182C2710A3961E
SHA256:2D70D84CD7B135E0903FF195EE9DCC526038573170C49510C2208F08DC5350A9
2252Mod_Installer.tmpC:\Users\admin\AppData\Local\Temp\is-IE4QF.tmp\_isetup\_iscrypt.dllexecutable
MD5:A69559718AB506675E907FE49DEB71E9
SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
2252Mod_Installer.tmpC:\Users\admin\AppData\Local\Temp\is-IE4QF.tmp\isgsg.dllexecutable
MD5:09974EAFF6DEFADDE38B1328754DBE09
SHA256:9EEEF28D82FC4DB7D1269DFBC0EA282768CE5E2E4E4BDC867D80D6847468DCA7
3136AutoInstaller.exeC:\Users\admin\AppData\Local\Temp\is-7FBFN.tmp\AutoInstaller.tmpexecutable
MD5:27BE9CD516395BBE00C9DE447F243B5B
SHA256:DA00D3BA399333B5627EC8D8E5B2197108B3809856F1A7FDAA1AD4BBCE669E77
3016AutoInstaller.exeC:\Users\admin\AppData\Local\Temp\is-7SODI.tmp\AutoInstaller.tmpexecutable
MD5:27BE9CD516395BBE00C9DE447F243B5B
SHA256:DA00D3BA399333B5627EC8D8E5B2197108B3809856F1A7FDAA1AD4BBCE669E77
3416AutoInstaller.exeC:\Users\admin\AppData\Local\Temp\is-23S4I.tmp\AutoInstaller.tmpexecutable
MD5:27BE9CD516395BBE00C9DE447F243B5B
SHA256:DA00D3BA399333B5627EC8D8E5B2197108B3809856F1A7FDAA1AD4BBCE669E77
2252Mod_Installer.tmpC:\Users\admin\AppData\Local\Temp\is-IE4QF.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
2252Mod_Installer.tmpC:\Users\admin\AppData\Local\Temp\is-IE4QF.tmp\1_52-Flags-v2.bktext
MD5:B44095800E0F835536FD77CC2042F463
SHA256:2A951D5205E1CAF588CD5444BBBE6888C0D6EEA666A459289D2B1239B8B1C32A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1088
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1240
AutoInstaller.tmp
185.199.108.133:443
raw.githubusercontent.com
FASTLY
US
unknown
2656
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 185.199.108.133
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.111.133
shared

Threats

No threats detected
No debug info