Windows
Analysis Report
KnowBe4_AD_Sync.msi
Overview
General Information
Detection
Score: | 4 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice
Sample is looking for USB drives. Launch the sample with the USB Fake Disk cookbook |
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior |
- System is w10x64
msiexec.exe (PID: 2696 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ KnowBe4_AD _Sync.msi" MD5: E5DA170027542E25EDE42FC54C929077)
msiexec.exe (PID: 5812 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) msiexec.exe (PID: 3876 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 8DF2F7B 5F0B77EE2A D9B7AB1EAE 7019B C MD5: 9D09DC1EDA745A5F87553048E57620CF) ADIsync.exe (PID: 6576 cmdline:
"C:\Progra m Files (x 86)\KnowBe 4\ADIsync\ ADIsync.ex e" config MD5: AA39AA4EAC334DC94B1D6EE6B637B362) conhost.exe (PID: 6768 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
svchost.exe (PID: 4764 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
- • Compliance
- • Spreading
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Static file information: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 Replication Through Removable Media | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 11 Masquerading | OS Credential Dumping | 11 Security Software Discovery | 1 Replication Through Removable Media | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 2 Virtualization/Sandbox Evasion | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Disable or Modify Tools | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Software Packing | NTDS | 11 Peripheral Device Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 Process Injection | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 1 DLL Side-Loading | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | 1 File Deletion | DCSync | Network Sniffing | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| low | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|
IP |
---|
127.0.0.1 |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1327893 |
Start date and time: | 2023-10-18 11:07:43 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | KnowBe4_AD_Sync.msi |
Detection: | CLEAN |
Classification: | clean4.winMSI@8/26@0/1 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, Ba ckgroundTransferHost.exe, WMIA DAP.exe, SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 23.36.118.84 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , e16604.g.akamaiedge.net, ctl dl.windowsupdate.com, prod.fs. microsoft.com.akadns.net, fs-w ildcard.microsoft.com.edgekey. net, fs-wildcard.microsoft.com .edgekey.net.globalredir.akadn s.net, fe3cr.delivery.mp.micro soft.com - Execution Graph export aborted
for target ADIsync.exe, PID 6 576 because there are no execu ted function - Not all processes where analyz
ed, report is missing behavior information
Time | Type | Description |
---|---|---|
11:10:25 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\MSI3CC4.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | modified |
Size (bytes): | 7774 |
Entropy (8bit): | 5.5531389244197 |
Encrypted: | false |
SSDEEP: | 96:zxNw/eUXB0UWSLCsThqUUWSLC6jbWdkfwclThqgHsR5hTEmbefgBiACs+pljbWdw:zc/eITJ2ImJ21dEIjEmpins+pcdw |
MD5: | 233021E87FDF0AC9721935CB9799E9A3 |
SHA1: | 23C035D766018D81DE0944554D616FDD9CE99B1D |
SHA-256: | C1568BC9599280AF52F4C5D635666A550CE5254B0F729AB91C9FC414F8311D10 |
SHA-512: | 01E0C5EC84C85BC0343008B6EF3944DB310459FD8F4199784FBCE9A24AB30031921DFC843233BFA818C55C3EB772CD02E599F6DC1927471A535BF340BD380072 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11200312 |
Entropy (8bit): | 6.883936115420887 |
Encrypted: | false |
SSDEEP: | 98304:87mjxhmoYd7Y+lEjCeStlgdRk8avW7WOBOuGa3XxoJkP:82moYA2e6l8/npG6XxoSP |
MD5: | AA39AA4EAC334DC94B1D6EE6B637B362 |
SHA1: | BCC28C768403ECB5DCEEADE05D4BC51C86CEBBD7 |
SHA-256: | 8DDD9D5E9546BB9068D0783A0DF13835AD7F8C23AB824508F8D91DA9664E162A |
SHA-512: | A83189D0ACC4D523D3CF9A49768D8B6C556DBA9875D40839580E9145ACADA85E8F0E46DD067C5A6E6D151A73833615704844D2358871942967CD2805146BDF61 |
Malicious: | false |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1310720 |
Entropy (8bit): | 0.829646359952823 |
Encrypted: | false |
SSDEEP: | 1536:gJhkM9gB0CnCm0CQ0CESJPB9JbJQfvcso0l1T4MfzzTi1FjIIXYvjbglQdmHDugj:gJjJGtpTq2yv1AuNZRY3diu8iBVqFp |
MD5: | C920BC60E758BA9929E76DB4EA5BEB1E |
SHA1: | 1FF3EE988ED3327E7EC0706619B69CF2D12F5226 |
SHA-256: | 82B1804374707C7738CDBBB013EA8DF1E0CE467C1C834166506C915850C1104C |
SHA-512: | AF92DAD3D2DF857FEE917E15D3ACAA7ED22BAE574F5407BCE706E97F4FD43CBF92D2C957904E01CBA9EE7A0BEF261C8216D2AEFB92857863FFA65832F0296F0A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1310720 |
Entropy (8bit): | 0.6586000596625573 |
Encrypted: | false |
SSDEEP: | 1536:5SB2ESB2SSjlK/rv5rO1T1B0CZSJRYkr3g16P92UPkLk+kAwI/0uzn10M1Dn/di6:5aza9v5hYe92UOHDnAPZ4PZf9h/9h |
MD5: | A7ADA266F7032CCAC9579E4A0D5B463D |
SHA1: | C18FA0B6ECE2CA1969DCB50DC16FD06F8B8704D1 |
SHA-256: | 69F4F08FDCF50A03931ABAF7472FBB30753A021E32C1B1DF5755113F1A5965A6 |
SHA-512: | 59B2D3A893D18449A6C6004A2C07A39A9FCFF940D9DB270C54B65FFAAF8090CE4CEDCDB0109CAEEDD70154FDDFA409C8FF10B11222D46C6E76412262BE7EC6D3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.08079367702135108 |
Encrypted: | false |
SSDEEP: | 3:aPilEYeLAREkGuAJkhvekl11NOGOblallrekGltll/SPj:8zLMrxl9OGEAJe3l |
MD5: | 897B5BBC33E71A39B2FE36BF7110ED73 |
SHA1: | 174918643287F38579F860FF160A5BBC7DAD3033 |
SHA-256: | 43937BD3E5A50F01883A0421290E306D02E681A2B4B1DDF21125204494484CB8 |
SHA-512: | 621143661089FC2ACCB18D8EC72D8D0E54658C3ED7C003BE9D98FCF23C11EE60D8BA3351E72F45B0BAB81E3DE5196ADCFF09FB74B9D54C1A7E9ABDBB08CECD51 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 116144 |
Entropy (8bit): | 6.633672738599962 |
Encrypted: | false |
SSDEEP: | 1536:YImZwomOndvrhsgz56GoiFmntw1ebC0fsWk0FlcdOJKJpPpxyNokVbY4:jewOdvregz5L/mxb7FUOsrPpxyN7/ |
MD5: | 4FDD16752561CF585FED1506914D73E0 |
SHA1: | F00023B9AE3C8CE5B7BB92F25011EAEBE6F9D424 |
SHA-256: | AECD2D2FE766F6D439ACC2BBF1346930ECC535012CF5AD7B3273D2875237B7E7 |
SHA-512: | 3695E7EB1E35EC959243A91AB5B4454EB59AEEF0F2699AA5DE8E03DE8FBB89F756A89130526DA5C08815408CB700284A17936522AD2CAD594C3E6E9D18A3F600 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6856704 |
Entropy (8bit): | 7.820300998470788 |
Encrypted: | false |
SSDEEP: | 98304:/50k19Yexa6sVlF07NlTqTKCMHlQv34CY6cocabULzay4+7GWlExPIet:GkbYe5TjTWkjP7abULnG3 |
MD5: | DFB169EDC95FDB0E8B7CE2986A2640AE |
SHA1: | F6FB83513B167786B9E191F7422D48E21586BC64 |
SHA-256: | 8F05C6952E160422EA8168A3154D35648DAB80A703C0D531653ACDC713196B9E |
SHA-512: | 689FF002348FB530D679FF46A9BEB8ACBC47E66808A392E7698314AEF3E6C0E85221633760F551C1FC99E8831CC4D92871FC8A49673A82C5D336E8B2B412D293 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6856704 |
Entropy (8bit): | 7.820300998470788 |
Encrypted: | false |
SSDEEP: | 98304:/50k19Yexa6sVlF07NlTqTKCMHlQv34CY6cocabULzay4+7GWlExPIet:GkbYe5TjTWkjP7abULnG3 |
MD5: | DFB169EDC95FDB0E8B7CE2986A2640AE |
SHA1: | F6FB83513B167786B9E191F7422D48E21586BC64 |
SHA-256: | 8F05C6952E160422EA8168A3154D35648DAB80A703C0D531653ACDC713196B9E |
SHA-512: | 689FF002348FB530D679FF46A9BEB8ACBC47E66808A392E7698314AEF3E6C0E85221633760F551C1FC99E8831CC4D92871FC8A49673A82C5D336E8B2B412D293 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19815 |
Entropy (8bit): | 2.7695768147043336 |
Encrypted: | false |
SSDEEP: | 192:uph+77K72e6JZvXJIpl5HxAfncjWsRhp2lMTjq:u+77K2JIFHEcjTRhXS |
MD5: | DA60B9BDC73BE11C01BFBD765D098C42 |
SHA1: | 4A2580221D6FFB08FABB72E40AC85464EC3F4C51 |
SHA-256: | 5E171EA1CD051B0F8CBAC4837E8B0176034087E3C0FB9CDC34C140536A49B6A2 |
SHA-512: | 88098568E56CD73C608F37DE5EFEA9DA2403349DC1111811CA459AC72BEC6C38A00331807B9C5AADF9444E6208FB9D63F6AE616034A61ADBFBFCC2BAC3E18481 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.1664843243246237 |
Encrypted: | false |
SSDEEP: | 12:JSbX72Fj7liAGiLIlHVRp+h/7777777777777777777777777vDHFfDwDJ11l0i5:JmQI5WF6J6F |
MD5: | A6DEB88A50D062CFE369866599FF2D76 |
SHA1: | DAEB4C7FF8E4E002B521B5791441958FE0700B13 |
SHA-256: | 4ED5AA588E33D77153ED1EB230D2B379939D930F3E6A022C1BCB85E745F2DF42 |
SHA-512: | 045C27723249B818F93BDA24B8525AB7ACBBB9936E30AB4A678EE2D92C917B2916049F709EA92DDC72D0FE84CA6AC6F4F6E5D320E55691915EB7FD994020F117 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5814310007129997 |
Encrypted: | false |
SSDEEP: | 48:qm8PhTuRc06WXJIFT5xedxd3d7S55P9Bdxd3d7SI:ahT1rFTvsMz |
MD5: | B48F3FF2FC6C8F3CE849C48D96E435C5 |
SHA1: | BA0BF902A16724F5CC9A3E7F0BF8ADE1678F7DCB |
SHA-256: | A6EF475B494764B23304B90BC3162EAE4291F9D3CA520FA9A122130A778FEA96 |
SHA-512: | 5D6557806F66ABDA9B574530F071A75DE3B902EA766DC926E4096F5B272774013875C5684407C88F4F262B1BD3FF86CA1DD1360B45CB72229586CBA7B148C1F2 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17542 |
Entropy (8bit): | 2.0337447016593106 |
Encrypted: | false |
SSDEEP: | 96:7pplOGQpl5H3h78f1VcjWDTERZDRIC2lA99QpaSZ777o67G5xQXG:jIpl5HxAfncjWsRhp2lMTR |
MD5: | 5FECFD8B9A4A48E065253A3C560903CF |
SHA1: | CD399776B16E8D7A5FAA8B2F3821F9A510CE92FA |
SHA-256: | B276673596952DD68D22645D4BB0E25D97D15919630F3A2D3D2F5EA875B85D24 |
SHA-512: | 3FF8ADB4CBEED9BF4AD384334BD990F0CBAC9B5FBFE233B4E408B031444A26CED277EFD20055E7F541F81815B0991FA0FFA3F17BB60BA868B689E724DC816C8A |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 364484 |
Entropy (8bit): | 5.365495236699449 |
Encrypted: | false |
SSDEEP: | 1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaud:zTtbmkExhMJCIpEe |
MD5: | 663E34EF0B5CAB524E0BA516C3F38998 |
SHA1: | 58814E28CD85AC1999FF64739424C3411125DC13 |
SHA-256: | E51287C40D14B7DA9361413C6E12033327E20CBB9905B687C836ED55779C6D14 |
SHA-512: | EE94015E1F6AC7A699EE369507474C9D438BDF4C29CFF209DD711AF0C9CBD58F38C03BBADE75B4D959DA1B227F4578428F461FD2DE008449810074DF859EE0FE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55 |
Entropy (8bit): | 4.306461250274409 |
Encrypted: | false |
SSDEEP: | 3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y |
MD5: | DCA83F08D448911A14C22EBCACC5AD57 |
SHA1: | 91270525521B7FE0D986DB19747F47D34B6318AD |
SHA-256: | 2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9 |
SHA-512: | 96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2641200078072752 |
Encrypted: | false |
SSDEEP: | 48:lkLugPveFXJNT5+edxd3d7S55P9Bdxd3d7SI:aLwlTQsMz |
MD5: | BC8286DB310E7C9ED31D6F2C18063800 |
SHA1: | 747A03E57923BAC4BFD0B295D7DC5A76503946BF |
SHA-256: | B5C8895D3251897851A1125D45AA2A61DE6CE10944F7A8D1228E3C7F188658B6 |
SHA-512: | 6DF670188B04D3C5B59FDCB92C17C9CDDCC4E84D6CE51B70C736D210C27FE1D7F56715277E588DA9A53EF58C2B0D25053F90979A35BA16D342F4A7186411394A |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.07374048304737556 |
Encrypted: | false |
SSDEEP: | 6:2/9LG7iVCnLG7iVrKOzPLHKOqMDwDLuL67VtKVky6l1:2F0i8n0itFzDHFfDwDJ11 |
MD5: | 397EED8A21FB68D4CA71D26D76554C9C |
SHA1: | 278BB68963C46E74A56036FCDD4465FEDE14241D |
SHA-256: | 60EE669482E5D96FE74190E6FDED86045FD26DFD6DE0E5EB6C9D3FCC201868E3 |
SHA-512: | 7420930EF285D9C1D7BC183142D68165F5A8368594E76054DF5F6E7FA09183FD3DC2FD43A6D943851CEB94C0D7EC40977F69AEDE9475A9DE910309C46E840F3C |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5814310007129997 |
Encrypted: | false |
SSDEEP: | 48:qm8PhTuRc06WXJIFT5xedxd3d7S55P9Bdxd3d7SI:ahT1rFTvsMz |
MD5: | B48F3FF2FC6C8F3CE849C48D96E435C5 |
SHA1: | BA0BF902A16724F5CC9A3E7F0BF8ADE1678F7DCB |
SHA-256: | A6EF475B494764B23304B90BC3162EAE4291F9D3CA520FA9A122130A778FEA96 |
SHA-512: | 5D6557806F66ABDA9B574530F071A75DE3B902EA766DC926E4096F5B272774013875C5684407C88F4F262B1BD3FF86CA1DD1360B45CB72229586CBA7B148C1F2 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5814310007129997 |
Encrypted: | false |
SSDEEP: | 48:qm8PhTuRc06WXJIFT5xedxd3d7S55P9Bdxd3d7SI:ahT1rFTvsMz |
MD5: | B48F3FF2FC6C8F3CE849C48D96E435C5 |
SHA1: | BA0BF902A16724F5CC9A3E7F0BF8ADE1678F7DCB |
SHA-256: | A6EF475B494764B23304B90BC3162EAE4291F9D3CA520FA9A122130A778FEA96 |
SHA-512: | 5D6557806F66ABDA9B574530F071A75DE3B902EA766DC926E4096F5B272774013875C5684407C88F4F262B1BD3FF86CA1DD1360B45CB72229586CBA7B148C1F2 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 0.1492254594948768 |
Encrypted: | false |
SSDEEP: | 24:zDHSpudcZ+dc2dcIipV0udcZ+dc2dcIipV7VQwGRKZkW+wE+NlXD:CQdxd3d7SPdxd3d7S55P9E |
MD5: | E884ED763192BB00A328B1C30D886893 |
SHA1: | 379D03D649CC79AC31C1323FDA46B7A309616498 |
SHA-256: | 3606C118EE9423B98DFF22DB65EC98CDE0D784A0BCB32776E503A0244789352E |
SHA-512: | C0AFAEB82972E3DF38C879D7B8849B89EC2E1257BD49D8133E93E66AA655C45272AF1E84AFB3249B5B95CD3EA9070A36221CC626A7D39B27BB5ADFD6CDD508F6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2641200078072752 |
Encrypted: | false |
SSDEEP: | 48:lkLugPveFXJNT5+edxd3d7S55P9Bdxd3d7SI:aLwlTQsMz |
MD5: | BC8286DB310E7C9ED31D6F2C18063800 |
SHA1: | 747A03E57923BAC4BFD0B295D7DC5A76503946BF |
SHA-256: | B5C8895D3251897851A1125D45AA2A61DE6CE10944F7A8D1228E3C7F188658B6 |
SHA-512: | 6DF670188B04D3C5B59FDCB92C17C9CDDCC4E84D6CE51B70C736D210C27FE1D7F56715277E588DA9A53EF58C2B0D25053F90979A35BA16D342F4A7186411394A |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2641200078072752 |
Encrypted: | false |
SSDEEP: | 48:lkLugPveFXJNT5+edxd3d7S55P9Bdxd3d7SI:aLwlTQsMz |
MD5: | BC8286DB310E7C9ED31D6F2C18063800 |
SHA1: | 747A03E57923BAC4BFD0B295D7DC5A76503946BF |
SHA-256: | B5C8895D3251897851A1125D45AA2A61DE6CE10944F7A8D1228E3C7F188658B6 |
SHA-512: | 6DF670188B04D3C5B59FDCB92C17C9CDDCC4E84D6CE51B70C736D210C27FE1D7F56715277E588DA9A53EF58C2B0D25053F90979A35BA16D342F4A7186411394A |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.820300998470788 |
TrID: |
|
File name: | KnowBe4_AD_Sync.msi |
File size: | 6'856'704 bytes |
MD5: | dfb169edc95fdb0e8b7ce2986a2640ae |
SHA1: | f6fb83513b167786b9e191f7422d48e21586bc64 |
SHA256: | 8f05c6952e160422ea8168a3154d35648dab80a703c0d531653acdc713196b9e |
SHA512: | 689ff002348fb530d679ff46a9beb8acbc47e66808a392e7698314aef3e6c0e85221633760f551c1fc99e8831cc4d92871fc8a49673a82c5d336e8b2b412d293 |
SSDEEP: | 98304:/50k19Yexa6sVlF07NlTqTKCMHlQv34CY6cocabULzay4+7GWlExPIet:GkbYe5TjTWkjP7abULnG3 |
TLSH: | 0D6633457AC1AE11D8DD1536D15785AC072BFC1F7A11CE27E500B928DEB02CD8AF2EAB |
File Content Preview: | ........................>...................................................................................................................................................................................................................................... |
Icon Hash: | 2d2e3797b32b2b99 |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 11:08:36 |
Start date: | 18/10/2023 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6681b0000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 2 |
Start time: | 11:08:36 |
Start date: | 18/10/2023 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6681b0000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |
Target ID: | 3 |
Start time: | 11:08:48 |
Start date: | 18/10/2023 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xae0000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 11:08:54 |
Start date: | 18/10/2023 |
Path: | C:\Program Files (x86)\KnowBe4\ADIsync\ADIsync.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xa10000 |
File size: | 11'200'312 bytes |
MD5 hash: | AA39AA4EAC334DC94B1D6EE6B637B362 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Go lang |
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 6 |
Start time: | 11:08:54 |
Start date: | 18/10/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 9 |
Start time: | 11:10:25 |
Start date: | 18/10/2023 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7e52b0000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |