Analysis Report CID_x64.msi

Overview

General Information

Sample Name: CID_x64.msi
Analysis ID: 324348
MD5: 8c6536b9cb8544f82f24010596e59eeb
SHA1: 5a550a562ca964a8d29bdf0256f08276d9f65d6e
SHA256: 4faf7350538d1c24997871634ecc9b99b51ad69341af0710f6eeeb2796ec2529

Most interesting Screenshot:

Detection

Score: 3
Range: 0 - 100
Whitelisted: false
Confidence: 40%

Signatures

Checks for available system drives (often done to infect USB drives)
Drops PE files
Found dropped PE file which has not been started or loaded
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs

Classification

Spreading:

barindex
Checks for available system drives (often done to infect USB drives)
Source: C:\Windows\System32\msiexec.exe File opened: z: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: x: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: v: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: t: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: r: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: p: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: n: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: l: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: j: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: h: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: f: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: b: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: y: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: w: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: u: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: s: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: q: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: o: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: m: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: k: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: i: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: g: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: e: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: c: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: a: Jump to behavior
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp String found in binary or memory: http://crl.globals
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp, CID_x64.msi String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp, CID_x64.msi String found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp, CID_x64.msi String found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: msiexec.exe, 00000000.00000002.469784631.0000023764110000.00000004.00000001.sdmp, CID_x64.msi String found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp String found in binary or memory: http://ocsp2.globalsign.com/g
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp, CID_x64.msi String found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp, CID_x64.msi String found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: CID_x64.msi String found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp String found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3oc
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp, CID_x64.msi String found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
Source: msiexec.exe, 00000000.00000002.467504090.0000023761AD0000.00000004.00000020.sdmp, CID_x64.msi String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: CID_x64.msi String found in binary or memory: https://www.globalsign.com/repository/0
Source: msiexec.exe, 00000000.00000002.469784631.0000023764110000.00000004.00000001.sdmp, CID_x64.msi String found in binary or memory: https://www.globalsign.com/repository/06

System Summary:

barindex
Sample file is different than original file name gathered from version info
Source: CID_x64.msi Binary or memory string: OriginalFilenameDPCA.DLL^ vs CID_x64.msi
Tries to load missing DLLs
Source: C:\Windows\System32\msiexec.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: tsappcmp.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: sfc.dll Jump to behavior
Source: classification engine Classification label: clean3.winMSI@3/4@0/0
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSI5735.tmp Jump to behavior
Source: C:\Windows\System32\msiexec.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: msiexec.exe, 00000000.00000002.470111091.0000023764710000.00000002.00000001.sdmp Binary or memory string: SELECT `Directory`, `DefaultDir` FROM `Directory` WHERE `Directory_Parent` = '%s'Software\Microsoft\NET Framework Setup\NDP\v3.%lu%sSOFTWARE\Microsoft\NET Framework Setup\DotNetClient\v3.5Software\Microsoft\NET Framework Setup\NDPSELECT * FROM `%s`Custom action not implemented.ToggleNearestAppRoot.kernel32IsWow64ProcessProcess call was successful.The error indicates that IIS is in 64 bit mode, while this application is a 32 bit application and thus not compatible.The error indicates that IIS is in 32 bit mode, while this application is a 64 bit application and thus not compatible.The error indicates that this version of ASP.NET must first be registered on the machine.Unknown Error.The call to aspnet_regiis.exe was failed. Path: '%s'Process Call Result Code: '%ld'Process Exit Code: '%ld'.Create Process failed.Running process '%s' with parameters '%s' silently...Access denied.CoInitializeEx - COM initialization Free Threaded.FAILED:%ldCoInitializeEx - COM initialization Apartment Threaded...Attach Debugger To MeVSCADEBUGATTACHSetTARGETSITETargetVersion%s\v%d\%sGatherWebSitesGatherAppPoolsSetTARGETAPPPOOLTARGETIISPATHRoot//LM/TARGETVDIRTARGETSITESetTARGETIISPATHaspnet_regiis.exeRESULTPath = PathUsing 64 bit registry key...Reading registry value Path from key 'HKLM\%s'...Software\Microsoft\ASP.NET\%sProductNameRunning show message with fUseMessageBox = %sFALSETRUEVSDINVALIDURLMSGHideFatalErrorFormopenExecuting URL '%s' with source directory '%s'...SourceDirRESULT:Condition is false.RESULT:Condition is true. Nothing more to do.Evaluating condition '%s'...Getting the condition to evaluate...A launch condition has already fired. My work is done here.Checking a launch condition..."/><supportedRuntime version=";VSDFxConfigFile
Source: CID_x64.msi Static file information: TRID: Microsoft Windows Installer (77509/1) 90.64%
Source: unknown Process created: C:\Windows\System32\msiexec.exe 'C:\Windows\System32\msiexec.exe' /i 'C:\Users\user\Desktop\CID_x64.msi'
Source: unknown Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 7C2160B8C719111621BBF907BA5D9B1C C
Source: unknown Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 67B6CF52D8EDBBB744EA0BA0249B0181
Source: C:\Windows\SysWOW64\msiexec.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{000C103E-0000-0000-C000-000000000046}\InProcServer32 Jump to behavior
Source: CID_x64.msi Static PE information: certificate valid
Source: CID_x64.msi Static file information: File size 2429952 > 1048576
Source: Binary string: DPCA.pdb source: msiexec.exe, 00000000.00000002.470111091.0000023764710000.00000002.00000001.sdmp, CID_x64.msi
Source: Binary string: DPCA.pdb<0 source: msiexec.exe, 00000000.00000002.470111091.0000023764710000.00000002.00000001.sdmp, CID_x64.msi

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSI5735.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSI58FB.tmp Jump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\System32\msiexec.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Windows\System32\msiexec.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Found dropped PE file which has not been started or loaded
Source: C:\Windows\System32\msiexec.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI58FB.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: msiexec.exe, 00000000.00000002.468247204.0000023761FD0000.00000002.00000001.sdmp, msiexec.exe, 00000001.00000002.468238994.0000000002D80000.00000002.00000001.sdmp Binary or memory string: Program Manager
Source: msiexec.exe, 00000000.00000002.468247204.0000023761FD0000.00000002.00000001.sdmp, msiexec.exe, 00000001.00000002.468238994.0000000002D80000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: msiexec.exe, 00000000.00000002.468247204.0000023761FD0000.00000002.00000001.sdmp, msiexec.exe, 00000001.00000002.468238994.0000000002D80000.00000002.00000001.sdmp Binary or memory string: Progman
Source: msiexec.exe, 00000000.00000002.468247204.0000023761FD0000.00000002.00000001.sdmp, msiexec.exe, 00000001.00000002.468238994.0000000002D80000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\System32\msiexec.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 324348 Sample: CID_x64.msi Startdate: 29/11/2020 Architecture: WINDOWS Score: 3 4 msiexec.exe 5 2->4         started        7 msiexec.exe 1 2->7         started        9 msiexec.exe 1 2->9         started        file3 11 C:\Users\user\AppData\Local\...\MSI58FB.tmp, PE32 4->11 dropped 13 C:\Users\user\AppData\Local\...\MSI5735.tmp, PE32 4->13 dropped
No contacted IP infos