IOC Report
ProSheets.msi

loading gif

Files

File Path
Type
Category
Malicious
ProSheets.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {F6295B92-0736-49E6-B20A-DDD980CE5611}, Number of Words: 2, Subject: ProSheets, Author: DiRoots Ltd., Name of Creating Application: ProSheets, Template: ;1033, Comments: This installer database contains the logic and data required to install ProSheets., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\MSI4f38f.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MSIBBF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\CustomAction.config
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\SetUpTrackerSelection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\SetUpTrackerSelection.pdb
MSVC program database ver 7.00, 512*91 bytes
dropped
C:\Users\user\AppData\Local\Temp\MSIF237.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIF2B5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIF2F4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIF315.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIF373.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBBF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5573593 24 SetUpTrackerSelection!SetUpTrackerSelection.CustomActions.SendInstallErrorMsg
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ProSheets.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding DE2667B8AFF59C1FD16112738283BE86 C

URLs

Name
IP
Malicious
https://api.diroots.com/api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationError&ParentApp=ProSheets&ParentAppVersion=1.2.10.0&App=ProSheets&AppVersion=1.2.10.0&Platform=Revit&PlatformVersion=2021&Description=
217.182.69.200
malicious
https://diroots.com/terms-and-conditions
unknown
http://wixtoolset.org/releases/
unknown
https://api.diroots.com/api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationErro
unknown
http://api.diroots.com
unknown
http://wixtoolset.org
unknown
https://www.thawte.com/cps0/
unknown
https://diroots.com/privacy-policy/
unknown
https://www.thawte.com/repository0W
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://www.advancedinstaller.com
unknown
https://api.diroot
unknown
http://wixtoolset.org/news/
unknown
https://api.diroots.com/api/v1/tracker
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.diroots.com
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.diroots.com
217.182.69.200
malicious

IPs

IP
Domain
Country
Malicious
217.182.69.200
api.diroots.com
France
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A80000
heap
page read and write
7F018000
trusted library allocation
page execute and read and write
A85000
heap
page read and write
46C0000
heap
page read and write
49E0000
trusted library allocation
page read and write
4714000
trusted library allocation
page read and write
6D00000
trusted library allocation
page execute and read and write
489C000
stack
page read and write
AEA000
heap
page read and write
7180000
heap
page read and write
72BE000
stack
page read and write
4810000
heap
page read and write
D2E000
stack
page read and write
4A1F000
trusted library allocation
page read and write
B0F000
heap
page read and write
4713000
trusted library allocation
page execute and read and write
4A10000
trusted library allocation
page read and write
7F000000
trusted library allocation
page execute and read and write
B2B000
heap
page read and write
6E90000
heap
page read and write
4720000
trusted library allocation
page read and write
B80000
heap
page read and write
6CE0000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6CC3000
trusted library allocation
page read and write
BAE000
heap
page read and write
6E90000
remote allocation
page read and write
6CC0000
trusted library allocation
page read and write
4A0A000
trusted library allocation
page read and write
B28000
heap
page read and write
4A2C000
trusted library allocation
page read and write
49EB000
trusted library allocation
page read and write
BA1000
heap
page read and write
49CD000
trusted library allocation
page read and write
D6E000
stack
page read and write
6E2D000
stack
page read and write
4700000
trusted library allocation
page read and write
496E000
stack
page read and write
6DEF000
stack
page read and write
4724000
trusted library allocation
page read and write
6CE6000
trusted library allocation
page execute and read and write
49DD000
trusted library allocation
page read and write
6E90000
remote allocation
page read and write
47EE000
stack
page read and write
48A0000
heap
page execute and read and write
B1D000
heap
page read and write
4981000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
474B000
trusted library allocation
page execute and read and write
492E000
stack
page read and write
49B4000
heap
page read and write
48EE000
stack
page read and write
4770000
heap
page readonly
72FE000
stack
page read and write
47E2000
heap
page read and write
B0C000
heap
page read and write
DE0000
heap
page read and write
49E5000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
5985000
trusted library allocation
page read and write
49B8000
trusted library allocation
page read and write
471D000
trusted library allocation
page execute and read and write
4740000
trusted library allocation
page read and write
49D1000
trusted library allocation
page read and write
6CEC000
trusted library allocation
page execute and read and write
6CE9000
trusted library allocation
page execute and read and write
4970000
heap
page read and write
4747000
trusted library allocation
page execute and read and write
A70000
heap
page read and write
6CE3000
trusted library allocation
page read and write
B0D000
heap
page read and write
A90000
heap
page read and write
B9A000
heap
page read and write
B6E000
heap
page read and write
AE0000
heap
page read and write
47A0000
heap
page read and write
49C0000
trusted library allocation
page read and write
6EA0000
heap
page execute and read and write
7CB000
stack
page read and write
47B4000
heap
page read and write
485E000
stack
page read and write
DAF000
stack
page read and write
B77000
heap
page read and write
47F0000
trusted library allocation
page execute and read and write
BAA000
heap
page read and write
BA4000
heap
page read and write
49EE000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
6E6E000
stack
page read and write
706F000
stack
page read and write
4760000
trusted library allocation
page read and write
6E90000
remote allocation
page read and write
6DAE000
stack
page read and write
B86000
heap
page read and write
B06000
heap
page read and write
712E000
stack
page read and write
A38000
stack
page read and write
4742000
trusted library allocation
page read and write
716F000
stack
page read and write
6CF0000
trusted library allocation
page read and write
4788000
trusted library allocation
page read and write
702E000
stack
page read and write
B8C000
heap
page read and write
B8A000
heap
page read and write
6CD0000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
CED000
stack
page read and write
There are 99 hidden memdumps, click here to show them.