File name:

f5c3be9a1434d1861a5dfb7d11422361b50b9d65d2b501c35f31f43f32c4b007.msi

Full analysis: https://app.any.run/tasks/a840590c-49d5-4109-a3da-f1cde9c14b9f
Verdict: Malicious activity
Analysis date: March 24, 2025, 15:22:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
advancedinstaller
themida
delphi
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 14:06:51 2020, Security: 0, Code page: 1252, Revision Number: {35550E07-87F1-4430-A971-5A91C91C9B4F}, Number of Words: 10, Subject: TJPROC-e039867987560_TJPDF, Author: TJPROC-e039867987560_TJPDF, Name of Creating Application: Advanced Installer 18.3 build e2a0201b, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o TJPROC-e039867987560_TJPDF., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
MD5:

9AA1516A18A675CB1972F8FC12194F5A

SHA1:

62E941DE8BD0531EDC38E42EEF43A6789D1F0A35

SHA256:

F5C3BE9A1434D1861A5DFB7D11422361B50B9D65D2B501C35F31F43F32C4B007

SSDEEP:

98304:w211T/eCYI956FANGMfdeV9E+od2Y+6DGjUvNW/Fbuloi9yAfdABRu22iVMQPIOa:Hk+P

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • msiexec.exe (PID: 5064)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 4272)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 4272)
      • msiexec.exe (PID: 3132)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 4272)
    • Detects AdvancedInstaller (YARA)

      • msiexec.exe (PID: 3132)
      • msiexec.exe (PID: 4272)
    • Reads the BIOS version

      • bcmUshUpgr.adeSerIuvice%64.exe (PID: 5304)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 5064)
  • INFO

    • Create files in a temporary directory

      • msiexec.exe (PID: 3132)
    • Reads the computer name

      • msiexec.exe (PID: 4272)
      • msiexec.exe (PID: 5064)
      • bcmUshUpgr.adeSerIuvice%64.exe (PID: 5304)
    • The sample compiled with english language support

      • msiexec.exe (PID: 3132)
      • msiexec.exe (PID: 4272)
      • msiexec.exe (PID: 5064)
    • Checks supported languages

      • msiexec.exe (PID: 5064)
      • msiexec.exe (PID: 4272)
      • bcmUshUpgr.adeSerIuvice%64.exe (PID: 5304)
    • Reads Environment values

      • msiexec.exe (PID: 5064)
      • bcmUshUpgr.adeSerIuvice%64.exe (PID: 5304)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 4272)
      • msiexec.exe (PID: 5064)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 5064)
      • bcmUshUpgr.adeSerIuvice%64.exe (PID: 5304)
    • Checks proxy server information

      • msiexec.exe (PID: 5064)
      • slui.exe (PID: 632)
    • Process checks computer location settings

      • msiexec.exe (PID: 5064)
    • Reads the software policy settings

      • bcmUshUpgr.adeSerIuvice%64.exe (PID: 5304)
      • msiexec.exe (PID: 5064)
      • slui.exe (PID: 632)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 5064)
    • Compiled with Borland Delphi (YARA)

      • bcmUshUpgr.adeSerIuvice%64.exe (PID: 5304)
    • Themida protector has been detected

      • bcmUshUpgr.adeSerIuvice%64.exe (PID: 5304)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (81.9)
.mst | Windows SDK Setup Transform Script (9.2)
.msp | Windows Installer Patch (7.6)
.msi | Microsoft Installer (100)

EXIF

FlashPix

LastPrinted: 2009:12:11 11:47:44
CreateDate: 2009:12:11 11:47:44
ModifyDate: 2020:09:18 14:06:51
Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {35550E07-87F1-4430-A971-5A91C91C9B4F}
Words: 10
Subject: TJPROC-e039867987560_TJPDF
Author: TJPROC-e039867987560_TJPDF
LastModifiedBy: -
Software: Advanced Installer 18.3 build e2a0201b
Template: ;1046
Comments: A base dados do instalador contêm a lógica e os dados necessários para instalar o TJPROC-e039867987560_TJPDF.
Title: Installation Database
Keywords: Installer, MSI, Database
Pages: 200
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
5
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe msiexec.exe bcmushupgr.adeseriuvice%64.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
632C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3132"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\Desktop\f5c3be9a1434d1861a5dfb7d11422361b50b9d65d2b501c35f31f43f32c4b007.msiC:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4272C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5064C:\Windows\syswow64\MsiExec.exe -Embedding EF434ED580AD2F367DE3532489B05937C:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5304"C:\Users\admin\3F!1C34@7\bcmUshUpgr.adeSerIuvice%64.exe" C:\Users\admin\3F!1C34@7\bcmUshUpgr.adeSerIuvice%64.exe
msiexec.exe
User:
admin
Company:
Disc Soft Ltd
Integrity Level:
MEDIUM
Description:
DAEMON Tools Shell Extensions Helper
Version:
8.3.1.0811
Modules
Images
c:\users\admin\3f!1c34@7\bcmushupgr.adeseriuvice%64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
12 526
Read events
12 491
Write events
22
Delete events
13

Modification events

(PID) Process:(4272) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
B0100000FC1C059BD09CDB01
(PID) Process:(4272) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
786DA6B716BC8BFB7D156F3963DCBC82B7CF7D8A3791E21EDE0B52579AFD9B39
(PID) Process:(4272) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(5064) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings
Operation:writeName:JITDebug
Value:
0
(PID) Process:(5064) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5064) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5064) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5064) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Operation:writeName:Implementing
Value:
1C00000001000000E9070300010018000F00170018008C01010000001E768127E028094199FEB9D127C57AFE
(PID) Process:(5064) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000222E34AFD09CDB01
(PID) Process:(5064) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:OneDrive
Value:
"C:\Users\admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe" /background
Executable files
12
Suspicious files
20
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4272msiexec.exeC:\Windows\Installer\10caf3.msiexecutable
MD5:9AA1516A18A675CB1972F8FC12194F5A
SHA256:F5C3BE9A1434D1861A5DFB7D11422361B50B9D65D2B501C35F31F43F32C4B007
4272msiexec.exeC:\Windows\Installer\MSICC9B.tmpexecutable
MD5:20C782EB64C81AC14C83A853546A8924
SHA256:0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1
4272msiexec.exeC:\Windows\Installer\MSICC4C.tmpexecutable
MD5:20C782EB64C81AC14C83A853546A8924
SHA256:0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1
5064msiexec.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\bangaliu[1].jpgcompressed
MD5:B1D0A219F2CD923773D08D3E809E6703
SHA256:3B778C7177BBD47FC4A24B7F52AE37E8B5C56BF072BDDFE1068FCCFA70EB535C
4272msiexec.exeC:\Windows\Installer\MSICB8F.tmpexecutable
MD5:20C782EB64C81AC14C83A853546A8924
SHA256:0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1
4272msiexec.exeC:\Windows\Installer\MSICCCB.tmpexecutable
MD5:20C782EB64C81AC14C83A853546A8924
SHA256:0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1
4272msiexec.exeC:\Windows\Temp\~DF5A1F220011396DF9.TMPbinary
MD5:47CF0BDB24D7937BE67835B5505F19B0
SHA256:10FFEBBE56460545FD7EF661D75885D4A487ED8B7AFEB16294FEC7ABDE2C2392
4272msiexec.exeC:\Config.Msi\10caf5.rbsbinary
MD5:37F05599D7D3253E4071115DE5068EEE
SHA256:B06505E2A47F21AF88D40E056D1653BB63EC54CB13385B9EC5798864D7ACDA86
5064msiexec.exeC:\Users\admin\3F!1C34@7\1executable
MD5:8A242AEBA83C7DA62DFF095417CCCD31
SHA256:51915EE49701927A930A033AC2B84C3303B8CF7AC88869B0D2BA6AABC5FA66F8
4272msiexec.exeC:\Windows\Installer\MSICD49.tmpbinary
MD5:1ADC404B8EAFDC03ABC106AB73E24C0E
SHA256:5EA65418F8D22F77BCCBC4E604BDCCC46E5E1A19D7B538AD7DD6FC424E543971
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
22
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
80.85.153.240:443
https://departyboy.wectropront.com/newyork/
unknown
GET
200
207.180.192.39:443
https://othund.octabracessorioscom.com/bangaliu.jpg
unknown
compressed
10.0 Mb
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
5064
msiexec.exe
207.180.192.39:443
othund.octabracessorioscom.com
Contabo GmbH
DE
unknown
5304
bcmUshUpgr.adeSerIuvice%64.exe
80.85.153.240:443
departyboy.wectropront.com
Chelyabinsk-Signal LLC
RU
unknown
5404
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
632
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
unknown
google.com
  • 216.58.206.78
unknown
othund.octabracessorioscom.com
  • 207.180.192.39
unknown
departyboy.wectropront.com
  • 80.85.153.240
unknown
activation-v2.sls.microsoft.com
  • 20.83.72.98
  • 40.91.76.224
unknown

Threats

No threats detected
No debug info