download: | c555ccf.msi |
Full analysis: | https://app.any.run/tasks/00daff54-72b7-4dc4-8a2e-d2b0bff81556 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | February 18, 2019, 16:24:32 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-msi |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Last Printed: Fri Sep 21 10:56:09 2012, Create Time/Date: Fri Sep 21 10:56:09 2012, Name of Creating Application: Windows Installer, Title: Exe to msi converter free, Author: www.exetomsi.com, Template: ;0, Last Saved By: devuser, Revision Number: {C35CF0AA-9B3F-4903-9F05-EBF606D58D3E}, Last Saved Time/Date: Tue May 21 12:56:44 2013, Number of Pages: 100, Number of Words: 0, Security: 0 |
MD5: | 348CADC7C5DD07A0A0A24F7C14A3FAF9 |
SHA1: | A0BE50CF39F4A12574DCD4D23E76FBE2A6A5FCCC |
SHA256: | F1F467B90D79A977B63A7A8D733B5BC1835755BCE6AAAAC14770DDEC6D1B12D2 |
SSDEEP: | 6144:RELB3VIc7g7pE3B4M3ApN2wePrl51bYZTzMwbHmwtKpAWOyHI5+/4LK0aP9l5BBo:REL8cxRNrl51mZo/4xGBIgxOhKxO |
.msi | | | Microsoft Installer (100) |
---|
CodePage: | Windows Latin 1 (Western European) |
---|---|
LastPrinted: | 2012:09:21 09:56:09 |
CreateDate: | 2012:09:21 09:56:09 |
Software: | Windows Installer |
Title: | Exe to msi converter free |
Subject: | - |
Author: | www.exetomsi.com |
Keywords: | - |
Comments: | - |
Template: | ;0 |
LastModifiedBy: | devuser |
RevisionNumber: | {C35CF0AA-9B3F-4903-9F05-EBF606D58D3E} |
ModifyDate: | 2013:05:21 11:56:44 |
Pages: | 100 |
Words: | - |
Security: | None |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2984 | "C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\c555ccf.msi" | C:\Windows\System32\msiexec.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) | ||||
2360 | C:\Windows\system32\msiexec.exe /V | C:\Windows\system32\msiexec.exe | services.exe | |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Version: 5.0.7600.16385 (win7_rtm.090713-1255) | ||||
2224 | C:\Windows\system32\vssvc.exe | C:\Windows\system32\vssvc.exe | — | services.exe |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2656 | DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot18" "" "" "6792c44eb" "00000000" "00000538" "000005BC" | C:\Windows\system32\DrvInst.exe | — | svchost.exe |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3792 | "C:\Windows\Installer\MSI1927.tmp" | C:\Windows\Installer\MSI1927.tmp | — | msiexec.exe |
User: admin Company: asari Integrity Level: MEDIUM Description: Votafile Exit code: 0 Version: 1.00 | ||||
4020 | "C:\Windows\Installer\MSI1927.tmp" | C:\Windows\Installer\MSI1927.tmp | MSI1927.tmp | |
User: SYSTEM Company: asari Integrity Level: SYSTEM Description: Votafile Exit code: 3221225477 Version: 1.00 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2360 | msiexec.exe | C:\System Volume Information\SPP\metadata-2 | — | |
MD5:— | SHA256:— | |||
2656 | DrvInst.exe | C:\Windows\INF\setupapi.ev3 | binary | |
MD5:76DCC60F78B3DFF1AE3627619074F465 | SHA256:18541AC1875315C4F9EFF75050C574FAFF83717C029DAE6B366F9C6C3F0C19E0 | |||
2656 | DrvInst.exe | C:\Windows\INF\setupapi.dev.log | ini | |
MD5:A003D7727F6193C3BCF122AD0E55922B | SHA256:5BCF560B68A22DB2DB36B7CC8A1F140038AA13B466277240F7081D0DD9B5936D | |||
2360 | msiexec.exe | C:\System Volume Information\SPP\snapshot-2 | binary | |
MD5:3B8F99DABBA2440FB5186BEEC73AEC2A | SHA256:9210AA0DBB31AD73B8BA36C5B8CD6609453A52BB49CF351212335D829C38807D | |||
2360 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\~DFC9C40EAE33E5FB9C.TMP | — | |
MD5:— | SHA256:— | |||
2360 | msiexec.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{dcd789ac-0322-4333-aa15-ecfba19e6e83}_OnDiskSnapshotProp | binary | |
MD5:3B8F99DABBA2440FB5186BEEC73AEC2A | SHA256:9210AA0DBB31AD73B8BA36C5B8CD6609453A52BB49CF351212335D829C38807D | |||
2656 | DrvInst.exe | C:\Windows\INF\setupapi.ev1 | binary | |
MD5:5EA2CDAA8B584A87E7BE772FB4E9E2D5 | SHA256:7212D1598F6D238871C0BC9D626EAF09E84FEBAED9070D9777BFDF3663B54BE4 | |||
2224 | vssvc.exe | C: | — | |
MD5:— | SHA256:— | |||
2360 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\~DF48619178090C51AA.TMP | — | |
MD5:— | SHA256:— | |||
2360 | msiexec.exe | C:\Windows\Installer\21128d.msi | executable | |
MD5:348CADC7C5DD07A0A0A24F7C14A3FAF9 | SHA256:F1F467B90D79A977B63A7A8D733B5BC1835755BCE6AAAAC14770DDEC6D1B12D2 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4020 | MSI1927.tmp | POST | — | 66.96.149.17:80 | http://moradoor.com/five/fre.php | US | — | — | malicious |
4020 | MSI1927.tmp | POST | — | 66.96.149.17:80 | http://moradoor.com/five/fre.php | US | — | — | malicious |
4020 | MSI1927.tmp | POST | 200 | 66.96.149.17:80 | http://moradoor.com/five/fre.php | US | html | 11.5 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4020 | MSI1927.tmp | 66.96.149.17:80 | moradoor.com | The Endurance International Group, Inc. | US | malicious |
Domain | IP | Reputation |
---|---|---|
moradoor.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
4020 | MSI1927.tmp | A Network Trojan was detected | MALWARE [PTsecurity] Loki/Pony Bot Artifact Check-in |
4020 | MSI1927.tmp | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
4020 | MSI1927.tmp | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
4020 | MSI1927.tmp | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
4020 | MSI1927.tmp | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
4020 | MSI1927.tmp | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
4020 | MSI1927.tmp | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
4020 | MSI1927.tmp | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
4020 | MSI1927.tmp | A Network Trojan was detected | MALWARE [PTsecurity] Loki/Pony Bot Artifact Check-in |
4020 | MSI1927.tmp | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |