Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
56ff7c.msi

Overview

General Information

Sample name:56ff7c.msi
Analysis ID:1573628
MD5:dc1dacc4a53407aebffc38ef512f52e7
SHA1:737e0c4312552da152f009bdce0f9048e368fee1
SHA256:60f172403738997a3e49ba5b7b247854bc45b42db5895c47d43b0b0ed86588c1
Tags:aikmouciiqgecoqi-xyzmsiuser-JAMESWT_MHT
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious MsiExec Embedding Parent
Uses cacls to modify the permissions of files

Classification

  • System is w7x64
  • msiexec.exe (PID: 3404 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\56ff7c.msi" MD5: AC2E7152124CEED36846BD1B6592A00F)
  • msiexec.exe (PID: 3432 cmdline: C:\Windows\system32\msiexec.exe /V MD5: AC2E7152124CEED36846BD1B6592A00F)
    • msiexec.exe (PID: 3768 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6 MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
      • icacls.exe (PID: 3804 cmdline: "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGH MD5: 1542A92D5C6F7E1E80613F3466C9CE7F)
      • expand.exe (PID: 3836 cmdline: "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files MD5: 659CED6D7BDA047BCC6048384231DB9F)
      • cmd.exe (PID: 3936 cmdline: "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf MD5: AD7B9C14083B52BC532FBA5948342B98)
      • cmd.exe (PID: 3972 cmdline: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files" MD5: AD7B9C14083B52BC532FBA5948342B98)
      • icacls.exe (PID: 3996 cmdline: "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)LOW MD5: 1542A92D5C6F7E1E80613F3466C9CE7F)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf, CommandLine: "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 3768, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf, ProcessId: 3936, ProcessName: cmd.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\$dpx$.tmp\82ea3633dcdfab4682fadb28c07af4a4.tmpReversingLabs: Detection: 31%
Source: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\install86.exe (copy)ReversingLabs: Detection: 31%
Source: 56ff7c.msiReversingLabs: Detection: 25%
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setupact.logJump to behavior
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setuperr.logJump to behavior
Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: 56ff7c.msi, MSIEFBD.tmp.1.dr, 72dbb0.msi.1.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517808175.000000000043B000.00000004.00000010.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517906718.00000000009E0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmp, msiwrapper.ini.5.drString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf
Source: cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517828418.00000000005A0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfC:
Source: cmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfD
Source: cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfQ
Source: cmd.exe, 0000000A.00000002.517906718.00000000009E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfROCESSOR_ARCHITECT
Source: cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfrT
Source: C:\Windows\SysWOW64\icacls.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\expand.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\72dbb0.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{740864D8-D5D4-4230-8D1D-1C2E0E22C8A6}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\72dbb1.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\72dbb1.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEFBD.tmpJump to behavior
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setupact.logJump to behavior
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setuperr.logJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\72dbb1.ipiJump to behavior
Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSIEFBD.tmp FD622CF73EA951A6DE631063ABA856487D77745DD1500ADCA61902B8DDE56FE1
Source: classification engineClassification label: mal56.winMSI@14/11@0/0
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\~DF04903486C83D392A.TMPJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: .. ................... ......... 46.....(.P..............................x......................0................. .............................Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: .. ................... ......... 46.....(.P..............................x......................0................. .....v................. .....Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeConsole Write: ................................................................_B.s.......................s....n..s....................R.................C.....Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ........................................(.P.....................P.......z.......................(...............................N..s............Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................................:. .....(.P.....................P...............................(...............................................Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ....................L........... 4$.....(.P.....................P...............................0...0...................X.......................Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ....................L........... 4$.....(.P.....................P...............................0...0...................v.......................Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\msiwrapper.iniJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 56ff7c.msiReversingLabs: Detection: 25%
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\56ff7c.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files"
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)LOW
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGHJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* filesJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files"Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)LOWJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: dpx.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: wdscore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wdi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\msiwrapper.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: 56ff7c.msiStatic file information: File size 2002944 > 1048576
Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: 56ff7c.msi, MSIEFBD.tmp.1.dr, 72dbb0.msi.1.dr
Source: 82ea3633dcdfab4682fadb28c07af4a4.tmp.8.drStatic PE information: section name: .00cfg
Source: 82ea3633dcdfab4682fadb28c07af4a4.tmp.8.drStatic PE information: section name: .voltbl
Source: 82ea3633dcdfab4682fadb28c07af4a4.tmp.8.drStatic PE information: section name: .text entropy: 7.00022260588102
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\$dpx$.tmp\82ea3633dcdfab4682fadb28c07af4a4.tmpJump to dropped file
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\install86.exe (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEFBD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEFBD.tmpJump to dropped file
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setupact.logJump to behavior
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setuperr.logJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisherJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestoreJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\expand.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\$dpx$.tmp\82ea3633dcdfab4682fadb28c07af4a4.tmpJump to dropped file
Source: C:\Windows\SysWOW64\expand.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\install86.exe (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIEFBD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exe TID: 3428Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\msiexec.exe TID: 4048Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\msiexec.exe TID: 3468Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3792Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3932Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\cmd.exe TID: 3968Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGHJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* filesJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files"Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)LOWJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
1
Command and Scripting Interpreter
2
Windows Service
2
Windows Service
2
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Services File Permissions Weakness
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
Services File Permissions Weakness
11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Obfuscated Files or Information
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Services File Permissions Weakness
LSA Secrets3
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
File Deletion
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1573628 Sample: 56ff7c.msi Startdate: 12/12/2024 Architecture: WINDOWS Score: 56 29 Multi AV Scanner detection for dropped file 2->29 31 Multi AV Scanner detection for submitted file 2->31 7 msiexec.exe 10 17 2->7         started        10 msiexec.exe 5 2->10         started        process3 file4 23 C:\Windows\Installer\MSIEFBD.tmp, PE32 7->23 dropped 12 msiexec.exe 5 7->12         started        process5 process6 14 expand.exe 4 12->14         started        17 cmd.exe 12->17         started        19 cmd.exe 12->19         started        21 2 other processes 12->21 file7 25 C:\Users\user\...\install86.exe (copy), PE32 14->25 dropped 27 C:\...\82ea3633dcdfab4682fadb28c07af4a4.tmp, PE32 14->27 dropped

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
56ff7c.msi25%ReversingLabsWin32.Trojan.Generic
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\$dpx$.tmp\82ea3633dcdfab4682fadb28c07af4a4.tmp32%ReversingLabsWin32.Trojan.Generic
C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files\install86.exe (copy)32%ReversingLabsWin32.Trojan.Generic
C:\Windows\Installer\MSIEFBD.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfcmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517808175.000000000043B000.00000004.00000010.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517906718.00000000009E0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmp, msiwrapper.ini.5.drfalse
    high
    https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfC:cmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517828418.00000000005A0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfQcmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfROCESSOR_ARCHITECTcmd.exe, 0000000A.00000002.517906718.00000000009E0000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfDcmd.exe, 0000000A.00000002.517836897.0000000000770000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfrTcmd.exe, 0000000A.00000002.517836897.0000000000794000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1573628
              Start date and time:2024-12-12 12:30:46 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 11s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:18
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:56ff7c.msi
              Detection:MAL
              Classification:mal56.winMSI@14/11@0/0
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .msi
              • Close Viewer
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, VSSVC.exe, svchost.exe
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtFsControlFile calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • VT rate limit hit for: 56ff7c.msi
              TimeTypeDescription
              06:31:41API Interceptor2600x Sleep call for process: msiexec.exe modified
              06:32:13API Interceptor2x Sleep call for process: icacls.exe modified
              06:32:53API Interceptor12x Sleep call for process: cmd.exe modified
              No context
              No context
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Windows\Installer\MSIEFBD.tmpsetup (2).msiGet hashmaliciousUnknownBrowse
                5c322c.msiGet hashmaliciousUnknownBrowse
                  57ff67.msiGet hashmaliciousUnknownBrowse
                    293944637.dllGet hashmaliciousUnknownBrowse
                      setup (2).msiGet hashmaliciousUnknownBrowse
                        setup.msiGet hashmaliciousUnknownBrowse
                          Document.lnk.download.lnkGet hashmaliciousUnknownBrowse
                            2Wr5r2e9vo.msiGet hashmaliciousUnknownBrowse
                              2Wr5r2e9vo.msiGet hashmaliciousUnknownBrowse
                                wE1inOhJA5.msiGet hashmaliciousRemcos, RHADAMANTHYSBrowse
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 1693708 bytes, 1 file, at 0x2c +A "install86.exe", ID 4848, number 1, 20944 datablocks, 0x1503 compression
                                  Category:dropped
                                  Size (bytes):1693708
                                  Entropy (8bit):5.526206300906094
                                  Encrypted:false
                                  SSDEEP:12288:MC0st3iH4Vk173mKFJ8MqvRdT+cG5GxHdt3FXJIHdyrd+SIRxHV/HkULBjm:MCw4o72KP8MgRhG52dt3JJCyrdEnlBjm
                                  MD5:32AE8557D0880ECF9D0120578C3D4262
                                  SHA1:06B7E7C8FFDBBBDA50982135C5966B248D882535
                                  SHA-256:6F8CC33CB74CF753413E56B40ACA479B6AA5A88EDC02C8AA26A2B902F448F862
                                  SHA-512:181EBFA32F8906A9B7032B0417262B13240310E40EDD76F6B45DDEB6BF3C02A083105256D0AA7B028C9C32D87B92C1ADD298B5E01AA38D756F2CDD386E41FA39
                                  Malicious:false
                                  Reputation:low
                                  Preview:MSCF............,...................J....Q.....(......{Y.E .install86.exe...b..A..[...5 f.q.....4..`...]..i.h..Ci.E.W.....HB.B=...\B....!.....[y.....J.R..[.mmU..U......{?......>..aIs.-..MR...G..b.<H....]....|.BX.}xJ..<.o....O.2X'.....<m..."....H.@.GG.HP..T.....R7.#IJK.p$.K.>.%....Q......*...#.....}..y....{..........Y.K..*#....J...... .( ....".C.G.p....8&89.........&......_N].a.O..|d.?.....gp.T\..../.....X....#p.+....#+..........!&.xr.q.D7.........b`{.J#....s........._.V....".]...w.../........p.8...|/..6...)_..ML.p...S.....m...|qS.....@.Q....`....x......9.W.hw......}d....F*ivxW.?(..q?EE$.-X..o..B.{`..q.s...]00..W$...!9...;80........Y.n..x...;q.l..5..D.H.............9b..aWA'....EpPC......"...F.!%mL-f....%.........9.K1..K..g..H.I$.\..Y%..U3}..S.D~WH;2.o.o....N>N...2^Q.Em.o....-.(...S.bJ6.\_..:w.F.}z........@m..c.. z.3s.b..zq........S.!.r.[..."T0...,"wp...V...@!JyJ0..y.....P..]...(.|..'...%..D...!.vG.o..U.5..*p'..Q.oq..%X.}.*WI.......X{Y\FN'<.y.....aq...
                                  Process:C:\Windows\SysWOW64\expand.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):686285824
                                  Entropy (8bit):0.04711303228045161
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:07638426F75532B5D8E82A85D7DA7716
                                  SHA1:1254980C7A77BD2D6C0D42086A74B7CC9F7DB573
                                  SHA-256:860E5A00578D060F9138E606D87DCF4EF1FFD3AD79FCB6C7C61556B5CDDCF97B
                                  SHA-512:F059ACB0066BF8438339AB70EEFF8F4AD263E8BC5DB37C424D303DB385824E4FE4761FDC4D10D75565FFEFAC205221A26439C7DD08B66119314020492E9BB160
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 32%
                                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....LGg.................h.......................@..........................`".....N..(..@.................................tB..x.............................!......................................................D...............................text....f.......h.................. ..`.rdata........... ...l..............@..@.data...(........>..................@....00cfg..............................@..@.tls................................@....voltbl.,................................rsrc...............................@..@.reloc........!....... .............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\expand.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):686285824
                                  Entropy (8bit):0.04711303228045161
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:07638426F75532B5D8E82A85D7DA7716
                                  SHA1:1254980C7A77BD2D6C0D42086A74B7CC9F7DB573
                                  SHA-256:860E5A00578D060F9138E606D87DCF4EF1FFD3AD79FCB6C7C61556B5CDDCF97B
                                  SHA-512:F059ACB0066BF8438339AB70EEFF8F4AD263E8BC5DB37C424D303DB385824E4FE4761FDC4D10D75565FFEFAC205221A26439C7DD08B66119314020492E9BB160
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 32%
                                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....LGg.................h.......................@..........................`".....N..(..@.................................tB..x.............................!......................................................D...............................text....f.......h.................. ..`.rdata........... ...l..............@..@.data...(........>..................@....00cfg..............................@..@.tls................................@....voltbl.,................................rsrc...............................@..@.reloc........!....... .............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):1818
                                  Entropy (8bit):3.7362607350817534
                                  Encrypted:false
                                  SSDEEP:48:LKAggy9bOlpZJFx0Cj0CO6byFvtxf5S70COf:uh9alpQBr6bOtpoQrf
                                  MD5:A7614DE6B21D3E3ACB98B90953902908
                                  SHA1:42186FD2C6ECCDF0646A645A6688691DA99F1690
                                  SHA-256:446A393C85A0FD75399D4B87803D2FF0B9E221742FA634FE166C8867CA5B0D13
                                  SHA-512:AAC3FCD9F916091C4EF73A2E0A57A94430221A6A5EFCAB46A701BD0BCCA5EDB845718AAE8BEE425DDF1EE8E945DA3DFA75D0CF68EB08FE10B571D961213A2625
                                  Malicious:false
                                  Preview:W.r.a.p.p.e.d.A.p.p.l.i.c.a.t.i.o.n.I.d.=.G.o.o.g.l.e. .C.h.r.o.m.e...W.r.a.p.p.e.d.R.e.g.i.s.t.r.a.t.i.o.n.=.N.o.n.e...I.n.s.t.a.l.l.S.u.c.c.e.s.s.C.o.d.e.s.=.0...E.l.e.v.a.t.i.o.n.M.o.d.e.=.n.e.v.e.r...B.a.s.e.N.a.m.e.=.i.n.s.t.a.l.l.8.6...e.x.e...C.a.b.H.a.s.h.=.6.f.8.c.c.3.3.c.b.7.4.c.f.7.5.3.4.1.3.e.5.6.b.4.0.a.c.a.4.7.9.b.6.a.a.5.a.8.8.e.d.c.0.2.c.8.a.a.2.6.a.2.b.9.0.2.f.4.4.8.f.8.6.2...S.e.t.u.p.P.a.r.a.m.e.t.e.r.s.=./.V.E.R.Y.S.I.L.E.N.T. . ./.V.E.R.Y.S.I.L.E.N.T. ...W.o.r.k.i.n.g.D.i.r.=...C.u.r.r.e.n.t.D.i.r.=.*.S.O.U.R.C.E.D.I.R.*...U.I.L.e.v.e.l.=.5...F.o.c.u.s.=.y.e.s...S.e.s.s.i.o.n.D.i.r.=.C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.f.f.1.5.c.4.0.d.-.2.1.b.1.-.4.2.e.d.-.8.4.5.7.-.0.b.c.9.7.2.b.7.0.5.b.c.\...F.i.l.e.s.D.i.r.=.C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.f.f.1.5.c.4.0.d.-.2.1.b.1.-.4.2.e.d.-.8.4.5.7.-.0.b.c.9.7.2.b.7.0.5.b.c.\.f.i.l.e.s.\...R.u.n.B.e.f.o.r.e.I.n.s.t.a.l.l.F.i.l.e.=.c.m.d...e.x.e...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):0.06945803457925166
                                  Encrypted:false
                                  SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOnF5VJVUzvqCZtQVky6lS:2F0i8n0itFzDHFnF5b4S
                                  MD5:BFED7F358179D3C693901B249409AD3F
                                  SHA1:94BF252030368A70FF79225066C2D82FC1186239
                                  SHA-256:3EC4E7D718481D957032C46C398F5AFBB8636DB3626657BD51451A95E38BA84E
                                  SHA-512:1A3632A0DCC91FC1808CAF45D4DEDF76BB08638A78E2C41233F1FF2FAC0D92BD7BE3F1A03144E0E9311949ABDCF3584A4AE3828B03B141F419B9F86FE6D5176D
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):69632
                                  Entropy (8bit):0.12071816959244595
                                  Encrypted:false
                                  SSDEEP:24:iN0ZJfAebfddipV7sddipVlVIwGilrkg9SQ8+z:+orfddSBsddSHHrR8
                                  MD5:A55A68BE18D014E44F684E2401C470E4
                                  SHA1:38E8FD4030B4F4F42DFFBE9CFA0673F8136FD357
                                  SHA-256:1E4A45320AB5B8531F18536641592E8AA91DC42C7D04A56207D855BA7F9A853A
                                  SHA-512:32341D473D11E3F21D22F7E1BF3A4318AB237B383189083263CAE11C9FA681DA4573D2B25F03AB3EEE2652ED202EEC4C772C63907BB0E76E7B4B3DE136646197
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Google Chrome 131.0.6778.86, Subject: Google Chrome, Author: Google LLC, Keywords: Installer, Template: Intel;1033, Revision Number: {37285955-014E-4DC5-AA76-A72CE0CD6FF4}, Create Time/Date: Thu Jan 11 14:59:44 2024, Last Saved Time/Date: Thu Jan 11 14:59:44 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
                                  Category:dropped
                                  Size (bytes):2002944
                                  Entropy (8bit):5.7921504076764405
                                  Encrypted:false
                                  SSDEEP:24576:vt9cpVDhol4Cw4o72KP8MgRhG52dt3JJCyrdEnlBj:4pRho2XN2Q8xhGQP6QdE
                                  MD5:DC1DACC4A53407AEBFFC38EF512F52E7
                                  SHA1:737E0C4312552DA152F009BDCE0F9048E368FEE1
                                  SHA-256:60F172403738997A3E49BA5B7B247854BC45B42DB5895C47D43B0B0ED86588C1
                                  SHA-512:9685D5C2A48D334814599FC0F8F05DCC9AF441A30D09F034030F01158648A2FFD25FEBFAD1E4237457B1DE8ADB9765F005C3549624DD588F73CC738A2ED62CBA
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.5251164796515777
                                  Encrypted:false
                                  SSDEEP:24:J8FC/lym6cpmUHCAjbuSBO+O8ddipVlVIwGilrkg9SCddipV7eJfAebN05:60+cDHBburJ8ddSHHrbddSBerN
                                  MD5:983ECAA4BA3B10065F0A45F349D757F2
                                  SHA1:0A7D118478ED9869E1DACED9DB3CE4247F97886D
                                  SHA-256:28DD7B27D10332D73B48A2CD6D2A52A9DFC03BD175CA2D8AE938DD6BFB5DC155
                                  SHA-512:6EE822843C0DB23771FF0EC2EF5795EA9328890B16C75CC222492C40C221533EBF994875A5E93AFC84570C5E3AE42A248B9471816ADE8EE52072C6F501482CA9
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):212992
                                  Entropy (8bit):6.513409725320959
                                  Encrypted:false
                                  SSDEEP:3072:xspAtOdmXwCGjtYNKbYO2gjpcm8rRuqpjCL42loHUvU0yGxr5GqM2a8:jtOdiRQYpgjpjew5DHyGxcqo8
                                  MD5:0C8921BBCC37C6EFD34FAF44CF3B0CB5
                                  SHA1:DCFA71246157EDCD09EECAF9D4C5E360B24B3E49
                                  SHA-256:FD622CF73EA951A6DE631063ABA856487D77745DD1500ADCA61902B8DDE56FE1
                                  SHA-512:ED55443E20D40CCA90596F0A0542FA5AB83FE0270399ADFAAFD172987FB813DFD44EC0DA0A58C096AF3641003F830341FE259AD5BCE9823F238AE63B7E11E108
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Joe Sandbox View:
                                  • Filename: setup (2).msi, Detection: malicious, Browse
                                  • Filename: 5c322c.msi, Detection: malicious, Browse
                                  • Filename: 57ff67.msi, Detection: malicious, Browse
                                  • Filename: 293944637.dll, Detection: malicious, Browse
                                  • Filename: setup (2).msi, Detection: malicious, Browse
                                  • Filename: setup.msi, Detection: malicious, Browse
                                  • Filename: Document.lnk.download.lnk, Detection: malicious, Browse
                                  • Filename: 2Wr5r2e9vo.msi, Detection: malicious, Browse
                                  • Filename: 2Wr5r2e9vo.msi, Detection: malicious, Browse
                                  • Filename: wE1inOhJA5.msi, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............p...p...p.......p.....p..../.p.......p...q.%.p.......p.....p.....p.Rich..p.........................PE..L...Y..e...........!.....h..........K................................................]....@.........................P...]............P.......................`.....................................p...@...............t............................text....f.......h.................. ..`.rdata...............l..............@..@.data....5..........................@....rsrc........P......................@..@.reloc...)...`...*..................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.1624504903944881
                                  Encrypted:false
                                  SSDEEP:12:JSbX72FjzQaAGiLIlHVRpth/7777777777777777777777777vDHFnF5bZpSl0i5:JpQaQI5p1F
                                  MD5:D7D201ED51A262AA9AE1D446D881AF18
                                  SHA1:2E0A755AF2759CA48FB2702BBF0E10CD86A577D5
                                  SHA-256:B3437BE715833BE8BFB7E0B8A255B80B2FC6D070E7D3352C0E6477750F754249
                                  SHA-512:1479369072D4C80FF51350140125CC187CDE08A2B718A8743F882E060670A5D1F6258AD415ACF9FCCDB33D3C4932747F10B1CB124EC7A5652C6FF7AD4B20452A
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Google Chrome 131.0.6778.86, Subject: Google Chrome, Author: Google LLC, Keywords: Installer, Template: Intel;1033, Revision Number: {37285955-014E-4DC5-AA76-A72CE0CD6FF4}, Create Time/Date: Thu Jan 11 14:59:44 2024, Last Saved Time/Date: Thu Jan 11 14:59:44 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
                                  Entropy (8bit):5.7921504076764405
                                  TrID:
                                  • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                  File name:56ff7c.msi
                                  File size:2'002'944 bytes
                                  MD5:dc1dacc4a53407aebffc38ef512f52e7
                                  SHA1:737e0c4312552da152f009bdce0f9048e368fee1
                                  SHA256:60f172403738997a3e49ba5b7b247854bc45b42db5895c47d43b0b0ed86588c1
                                  SHA512:9685d5c2a48d334814599fc0f8f05dcc9af441a30d09f034030f01158648a2ffd25febfad1e4237457b1de8adb9765f005c3549624dd588f73cc738a2ed62cba
                                  SSDEEP:24576:vt9cpVDhol4Cw4o72KP8MgRhG52dt3JJCyrdEnlBj:4pRho2XN2Q8xhGQP6QdE
                                  TLSH:AD9578C13784C127E95B1D324E67C799A729FDA0AE30B0877360BB5E5B3AAD35E64301
                                  File Content Preview:........................>......................................................................................................................................................................................................................................
                                  Icon Hash:2d2e3797b32b2b99
                                  No network behavior found

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:06:31:40
                                  Start date:12/12/2024
                                  Path:C:\Windows\System32\msiexec.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\56ff7c.msi"
                                  Imagebase:0xff660000
                                  File size:128'512 bytes
                                  MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:1
                                  Start time:06:31:41
                                  Start date:12/12/2024
                                  Path:C:\Windows\System32\msiexec.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\msiexec.exe /V
                                  Imagebase:0xff660000
                                  File size:128'512 bytes
                                  MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:false

                                  Target ID:5
                                  Start time:06:32:11
                                  Start date:12/12/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 86A4058CE95E31C1969F20B2B91CC2D6
                                  Imagebase:0xbc0000
                                  File size:73'216 bytes
                                  MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:6
                                  Start time:06:32:13
                                  Start date:12/12/2024
                                  Path:C:\Windows\SysWOW64\icacls.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
                                  Imagebase:0xb0000
                                  File size:27'136 bytes
                                  MD5 hash:1542A92D5C6F7E1E80613F3466C9CE7F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:8
                                  Start time:06:32:13
                                  Start date:12/12/2024
                                  Path:C:\Windows\SysWOW64\expand.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
                                  Imagebase:0x460000
                                  File size:53'248 bytes
                                  MD5 hash:659CED6D7BDA047BCC6048384231DB9F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:10
                                  Start time:06:32:53
                                  Start date:12/12/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf
                                  Imagebase:0x4a040000
                                  File size:302'592 bytes
                                  MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:12
                                  Start time:06:32:55
                                  Start date:12/12/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\files"
                                  Imagebase:0x4a8f0000
                                  File size:302'592 bytes
                                  MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:14
                                  Start time:06:32:55
                                  Start date:12/12/2024
                                  Path:C:\Windows\SysWOW64\icacls.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-ff15c40d-21b1-42ed-8457-0bc972b705bc\." /SETINTEGRITYLEVEL (CI)(OI)LOW
                                  Imagebase:0x1a0000
                                  File size:27'136 bytes
                                  MD5 hash:1542A92D5C6F7E1E80613F3466C9CE7F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  No disassembly