Windows
Analysis Report
SmartPDFPro.msi
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Creates multiple autostart registry keys
Tries to harvest and steal browser information (history, passwords, etc)
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Stores large binary data to the registry
Tries to disable installed Antivirus / HIPS / PFW
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
msiexec.exe (PID: 3012 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ SmartPDFPr o.msi" MD5: E5DA170027542E25EDE42FC54C929077)
msiexec.exe (PID: 6776 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) msiexec.exe (PID: 4292 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 8C968C8 5912600B92 6D42177194 A8B8F C MD5: 9D09DC1EDA745A5F87553048E57620CF) msiexec.exe (PID: 1156 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 45E960F EC52E3EBC8 6A233C1042 8B081 MD5: 9D09DC1EDA745A5F87553048E57620CF) onestart_installer.exe (PID: 7912 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart Installer\ onestart_i nstaller.e xe" "INSTA LL" "15" " 2" "1" "1" MD5: 81BE91E0A7278B8F73554259B2290ECD) setup.exe (PID: 8048 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart Installer\ CR_861D9.t mp\setup.e xe" --inst all-archiv e="C:\User s\user\App Data\Local \OneStart. ai\OneStar t Installe r\CR_861D9 .tmp\ONEST ART.PACKED .7Z" "INST ALL" "15" "2" "1" "1 " MD5: 58AD915B20BEB605B2CBEA6543E9FB13) setup.exe (PID: 8064 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart Installer\ CR_861D9.t mp\setup.e xe" --type =crashpad- handler /p refetch:4 --monitor- self-annot ation=ptyp e=crashpad -handler " --database =C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ User Data\ Crashpad" --annotati on=plat=Wi n64 --anno tation=pro d=OneStart --annotat ion=ver=13 2.0.6834.1 16 --initi al-client- data=0x26c ,0x270,0x2 74,0x248,0 x278,0x7ff 6ef91e2f8, 0x7ff6ef91 e304,0x7ff 6ef91e310 MD5: 58AD915B20BEB605B2CBEA6543E9FB13) setup.exe (PID: 6004 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart Installer\ CR_861D9.t mp\setup.e xe" --verb ose-loggin g --create -shortcuts =0 --insta ll-level=0 MD5: 58AD915B20BEB605B2CBEA6543E9FB13) setup.exe (PID: 5608 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart Installer\ CR_861D9.t mp\setup.e xe" --type =crashpad- handler /p refetch:4 --monitor- self-annot ation=ptyp e=crashpad -handler " --database =C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ User Data\ Crashpad" --annotati on=plat=Wi n64 --anno tation=pro d=OneStart --annotat ion=ver=13 2.0.6834.1 16 --initi al-client- data=0x26c ,0x270,0x2 74,0x248,0 x278,0x7ff 6ef91e2f8, 0x7ff6ef91 e304,0x7ff 6ef91e310 MD5: 58AD915B20BEB605B2CBEA6543E9FB13) onestart.exe (PID: 6600 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --fr om-install er MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 6020 cmdline:
C:\Users\u ser\AppDat a\Local\On eStart.ai\ OneStart\A pplication \onestart. exe --type =crashpad- handler "- -user-data -dir=C:\Us ers\user\A ppData\Loc al\OneStar t.ai\OneSt art\User D ata" /pref etch:4 --m onitor-sel f --monito r-self-arg ument=--ty pe=crashpa d-handler "--monitor -self-argu ment=--use r-data-dir =C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ User Data" --monitor -self-argu ment=/pref etch:4 --m onitor-sel f-annotati on=ptype=c rashpad-ha ndler "--d atabase=C: \Users\use r\AppData\ Local\OneS tart.ai\On eStart\Use r Data\Cra shpad" --a nnotation= plat=Win64 --annotat ion=prod=O neStart -- annotation =ver=132.0 .6834.116 --initial- client-dat a=0x100,0x 104,0x108, 0xdc,0x10c ,0x7ffa201 0dcf8,0x7f fa2010dd04 ,0x7ffa201 0dd10 MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 1236 cmdline:
C:\Users\u ser\AppDat a\Local\On eStart.ai\ OneStart\A pplication \onestart. exe --type =crashpad- handler "- -user-data -dir=C:\Us ers\user\A ppData\Loc al\OneStar t.ai\OneSt art\User D ata" /pref etch:4 --n o-periodic -tasks --m onitor-sel f-annotati on=ptype=c rashpad-ha ndler "--d atabase=C: \Users\use r\AppData\ Local\OneS tart.ai\On eStart\Use r Data\Cra shpad" --a nnotation= plat=Win64 --annotat ion=prod=O neStart -- annotation =ver=132.0 .6834.116 --initial- client-dat a=0x14c,0x 150,0x154, 0x124,0x15 8,0x7ff76d e13840,0x7 ff76de1384 c,0x7ff76d e13858 MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 4548 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --ty pe=gpu-pro cess --str ing-annota tions --st art-stack- profiler - -gpu-prefe rences=UAA AAAAAAADgA AAEAAAAAAA AAAAAAAAAA ABgAAEAAAA AAAAAAAAAA AAAAAACAAA AAAAAAAAAA AAAAAAAAAA AABAAAAAAA AAAEAAAAAA AAAAIAAAAA AAAAAgAAAA AAAAA --fi eld-trial- handle=211 6,i,158730 8777219651 2968,16410 5408281847 82454,2621 44 --varia tions-seed -version - -mojo-plat form-chann el-handle= 2152 /pref etch:2 MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 2948 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-G B --servic e-sandbox- type=none --string-a nnotations --start-s tack-profi ler --fiel d-trial-ha ndle=1916, i,15873087 7721965129 68,1641054 0828184782 454,262144 --variati ons-seed-v ersion --m ojo-platfo rm-channel -handle=23 64 /prefet ch:3 MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 4800 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --ex isting-win dow MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 7608 cmdline:
C:\Users\u ser\AppDat a\Local\On eStart.ai\ OneStart\A pplication \onestart. exe --type =crashpad- handler "- -user-data -dir=C:\Us ers\user\A ppData\Loc al\OneStar t.ai\OneSt art\User D ata" /pref etch:4 --m onitor-sel f-annotati on=ptype=c rashpad-ha ndler "--d atabase=C: \Users\use r\AppData\ Local\OneS tart.ai\On eStart\Use r Data\Cra shpad" --a nnotation= plat=Win64 --annotat ion=prod=O neStart -- annotation =ver=132.0 .6834.116 --initial- client-dat a=0x100,0x 104,0x108, 0xdc,0x10c ,0x7ffa201 0dcf8,0x7f fa2010dd04 ,0x7ffa201 0dd10 MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 7612 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --ty pe=utility --utility -sub-type= storage.mo jom.Storag eService - -lang=en-G B --servic e-sandbox- type=servi ce --strin g-annotati ons --fiel d-trial-ha ndle=2408, i,15873087 7721965129 68,1641054 0828184782 454,262144 --variati ons-seed-v ersion --m ojo-platfo rm-channel -handle=23 64 /prefet ch:8 MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 5664 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --up date MD5: 7473ECF4A1CF4D271455034708DF09F1) explorer.exe (PID: 4040 cmdline:
C:\Windows \Explorer. EXE MD5: 662F4F92FDE3557E86D110526BB578D5) onestart.exe (PID: 6904 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --ex isting-win dow MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 7000 cmdline:
C:\Users\u ser\AppDat a\Local\On eStart.ai\ OneStart\A pplication \onestart. exe --type =crashpad- handler "- -user-data -dir=C:\Us ers\user\A ppData\Loc al\OneStar t.ai\OneSt art\User D ata" /pref etch:4 --m onitor-sel f-annotati on=ptype=c rashpad-ha ndler "--d atabase=C: \Users\use r\AppData\ Local\OneS tart.ai\On eStart\Use r Data\Cra shpad" --a nnotation= plat=Win64 --annotat ion=prod=O neStart -- annotation =ver=132.0 .6834.116 --initial- client-dat a=0x104,0x 108,0x10c, 0x94,0x110 ,0x7ffa201 0dcf8,0x7f fa2010dd04 ,0x7ffa201 0dd10 MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 2752 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --up date MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 5744 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --ty pe=rendere r --string -annotatio ns --video -capture-u se-gpu-mem ory-buffer --lang=en -GB --devi ce-scale-f actor=1 -- num-raster -threads=2 --enable- main-frame -before-ac tivation - -renderer- client-id= 6 --time-t icks-at-un ix-epoch=- 1741632187 510444 --l aunch-time -ticks=411 9886736 -- field-tria l-handle=4 108,i,1587 3087772196 512968,164 1054082818 4782454,26 2144 --var iations-se ed-version --mojo-pl atform-cha nnel-handl e=4120 /pr efetch:1 MD5: 7473ECF4A1CF4D271455034708DF09F1) onestart.exe (PID: 2644 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --ty pe=rendere r --string -annotatio ns --video -capture-u se-gpu-mem ory-buffer --lang=en -GB --devi ce-scale-f actor=1 -- num-raster -threads=2 --enable- main-frame -before-ac tivation - -renderer- client-id= 5 --time-t icks-at-un ix-epoch=- 1741632187 510444 --l aunch-time -ticks=412 1801537 -- field-tria l-handle=4 100,i,1587 3087772196 512968,164 1054082818 4782454,26 2144 --var iations-se ed-version --mojo-pl atform-cha nnel-handl e=4560 /pr efetch:1 MD5: 7473ECF4A1CF4D271455034708DF09F1) dwm.exe (PID: 980 cmdline:
"dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C) onestart.exe (PID: 7756 cmdline:
"C:\Users\ user\AppDa ta\Local\O neStart.ai \OneStart\ Applicatio n\onestart .exe" --ty pe=rendere r --string -annotatio ns --video -capture-u se-gpu-mem ory-buffer --lang=en -GB --devi ce-scale-f actor=1 -- num-raster -threads=2 --enable- main-frame -before-ac tivation - -renderer- client-id= 7 --time-t icks-at-un ix-epoch=- 1741632187 510444 --l aunch-time -ticks=413 5163248 -- field-tria l-handle=5 128,i,1587 3087772196 512968,164 1054082818 4782454,26 2144 --var iations-se ed-version --mojo-pl atform-cha nnel-handl e=5184 /pr efetch:1 MD5: 7473ECF4A1CF4D271455034708DF09F1)
notification_helper.exe (PID: 1336 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\134.0. 6998.36\no tification _helper.ex e" -Embedd ing MD5: E39038A27BF9951CBB1C6B37752C9B81) chrome.exe (PID: 1740 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=crashpa d-handler "--user-da ta-dir=C:\ Users\user \AppData\L ocal\Googl e\Chrome\U ser Data" /prefetch: 4 --monito r-self-ann otation=pt ype=crashp ad-handler "--databa se=C:\User s\user\App Data\Local \Google\Ch rome\User Data\Crash pad" "--me trics-dir= C:\Users\u ser\AppDat a\Local\Go ogle\Chrom e\User Dat a" --url=h ttps://cli ents2.goog le.com/cr/ report --a nnotation= channel= - -annotatio n=plat=Win 64 --annot ation=prod =Chrome -- annotation =ver=134.0 .6998.36 - -initial-c lient-data =0x1d0,0x1 d4,0x1d8,0 x1b0,0x1dc ,0x7ff6edb 2b8d8,0x7f f6edb2b8e4 ,0x7ff6edb 2b8f0 MD5: E81F54E6C1129887AEA47E7D092680BF)
cmd.exe (PID: 1640 cmdline:
"C:\Window s\SysWOW64 \cmd.exe" /c "rmdir /s /q "C:\ Users\user \AppData\L ocal\OneSt art.ai\One Start Inst aller\"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 3936 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | Binary or memory string: | memstr_9bf2a3d4-c |
Source: | Registry value created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | |||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | String found in binary or memory: |