Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
33abb.msi

Overview

General Information

Sample name:33abb.msi
Analysis ID:1573632
MD5:0d4245b805741f0d90e4a964971b0527
SHA1:0828f6cbe30fc369eb62d9e992162870767489f5
SHA256:b6c37e3d6c1e61c71f42e005774cae3f722a3273a91d6e29d27e9f76ab4ab934
Tags:aikmouciiqgecoqi-xyzmsiuser-JAMESWT_MHT
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious MsiExec Embedding Parent
Uses cacls to modify the permissions of files

Classification

  • System is w7x64
  • msiexec.exe (PID: 3388 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\33abb.msi" MD5: AC2E7152124CEED36846BD1B6592A00F)
  • msiexec.exe (PID: 3416 cmdline: C:\Windows\system32\msiexec.exe /V MD5: AC2E7152124CEED36846BD1B6592A00F)
    • msiexec.exe (PID: 3744 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BB MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
      • icacls.exe (PID: 3788 cmdline: "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGH MD5: 1542A92D5C6F7E1E80613F3466C9CE7F)
      • expand.exe (PID: 3820 cmdline: "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files MD5: 659CED6D7BDA047BCC6048384231DB9F)
      • cmd.exe (PID: 3908 cmdline: "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf MD5: AD7B9C14083B52BC532FBA5948342B98)
      • cmd.exe (PID: 4012 cmdline: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files" MD5: AD7B9C14083B52BC532FBA5948342B98)
      • icacls.exe (PID: 4040 cmdline: "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)LOW MD5: 1542A92D5C6F7E1E80613F3466C9CE7F)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf, CommandLine: "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BB, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 3744, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf, ProcessId: 3908, ProcessName: cmd.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\$dpx$.tmp\8f876ac57673f1439e1ebba93c31a9f1.tmpReversingLabs: Detection: 26%
Source: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\setup.exe (copy)ReversingLabs: Detection: 26%
Source: 33abb.msiReversingLabs: Detection: 21%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.6% probability
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setupact.logJump to behavior
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setuperr.logJump to behavior
Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: 33abb.msi, MSI93A8.tmp.1.dr, 45aee5.msi.1.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\Jump to behavior
Source: cmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499490988.000000000041B000.00000004.00000010.00020000.00000000.sdmp, msiwrapper.ini.5.drString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf
Source: cmd.exe, 0000000A.00000002.499548798.00000000007B0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499525523.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfC:
Source: cmd.exe, 0000000A.00000002.499405583.0000000000150000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfROCESSOR_ARCHITECT
Source: cmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfr
Source: C:\Windows\SysWOW64\icacls.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\expand.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\45aee5.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{837A37B6-C086-4887-960B-B6BB04303EFC}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\45aee6.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\45aee6.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI93A8.tmpJump to behavior
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setupact.logJump to behavior
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setuperr.logJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\45aee6.ipiJump to behavior
Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI93A8.tmp FD622CF73EA951A6DE631063ABA856487D77745DD1500ADCA61902B8DDE56FE1
Source: classification engineClassification label: mal60.winMSI@14/11@0/0
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\~DFE9DDFB3758736173.TMPJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................................ 42.....(.P.....................p........e......................................................`...............Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................................ 42.....(.P..............................e..............................................v.......................Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeConsole Write: ................................................................_B.s.......................s....n..s....................R.................A.....Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................\...............0.'.....(.P.......................................................'.............................N..s............Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................\...............:. .....(.P.......................................................'...............'.............................Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................................ 4A.....(.P.............................%.......................0...0...................X.......0.'.......'.....Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................................ 4A.....(.P.............................,.......................0...0...................v.......................Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\msiwrapper.iniJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 33abb.msiReversingLabs: Detection: 21%
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\33abb.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BB
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files"
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)LOW
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BBJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGHJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* filesJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files"Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)LOWJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: dpx.dllJump to behavior
Source: C:\Windows\SysWOW64\expand.exeSection loaded: wdscore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wdi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\msiwrapper.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: 33abb.msiStatic file information: File size 1855488 > 1048576
Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: 33abb.msi, MSI93A8.tmp.1.dr, 45aee5.msi.1.dr
Source: 8f876ac57673f1439e1ebba93c31a9f1.tmp.8.drStatic PE information: section name: .00cfg
Source: 8f876ac57673f1439e1ebba93c31a9f1.tmp.8.drStatic PE information: section name: .voltbl
Source: 8f876ac57673f1439e1ebba93c31a9f1.tmp.8.drStatic PE information: section name: .text entropy: 6.997970207672927
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\setup.exe (copy)Jump to dropped file
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\$dpx$.tmp\8f876ac57673f1439e1ebba93c31a9f1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI93A8.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI93A8.tmpJump to dropped file
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setupact.logJump to behavior
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setuperr.logJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisherJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestoreJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\expand.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\setup.exe (copy)Jump to dropped file
Source: C:\Windows\SysWOW64\expand.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\$dpx$.tmp\8f876ac57673f1439e1ebba93c31a9f1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI93A8.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exe TID: 3412Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\msiexec.exe TID: 4080Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\msiexec.exe TID: 3444Thread sleep time: -360000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3764Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3904Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\cmd.exe TID: 4004Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BBJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGHJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* filesJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files"Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)LOWJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
1
Command and Scripting Interpreter
2
Windows Service
2
Windows Service
2
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Services File Permissions Weakness
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
Services File Permissions Weakness
11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Obfuscated Files or Information
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Services File Permissions Weakness
LSA Secrets3
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
File Deletion
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1573632 Sample: 33abb.msi Startdate: 12/12/2024 Architecture: WINDOWS Score: 60 29 Multi AV Scanner detection for dropped file 2->29 31 Multi AV Scanner detection for submitted file 2->31 33 AI detected suspicious sample 2->33 7 msiexec.exe 8 17 2->7         started        10 msiexec.exe 5 2->10         started        process3 file4 23 C:\Windows\Installer\MSI93A8.tmp, PE32 7->23 dropped 12 msiexec.exe 5 7->12         started        process5 process6 14 expand.exe 4 12->14         started        17 cmd.exe 12->17         started        19 cmd.exe 12->19         started        21 2 other processes 12->21 file7 25 C:\Users\user\AppData\...\setup.exe (copy), PE32 14->25 dropped 27 C:\...\8f876ac57673f1439e1ebba93c31a9f1.tmp, PE32 14->27 dropped

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
33abb.msi21%ReversingLabsWin32.Trojan.Generic
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\$dpx$.tmp\8f876ac57673f1439e1ebba93c31a9f1.tmp26%ReversingLabs
C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files\setup.exe (copy)26%ReversingLabs
C:\Windows\Installer\MSI93A8.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfcmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499490988.000000000041B000.00000004.00000010.00020000.00000000.sdmp, msiwrapper.ini.5.drfalse
    high
    https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfC:cmd.exe, 0000000A.00000002.499548798.00000000007B0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499525523.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfrcmd.exe, 0000000A.00000002.499548798.00000000007D4000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdfROCESSOR_ARCHITECTcmd.exe, 0000000A.00000002.499405583.0000000000150000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1573632
          Start date and time:2024-12-12 12:33:54 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 12s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsofficecookbook.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:18
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:33abb.msi
          Detection:MAL
          Classification:mal60.winMSI@14/11@0/0
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .msi
          • Close Viewer
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, VSSVC.exe, svchost.exe
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtCreateFile calls found.
          • Report size getting too big, too many NtFsControlFile calls found.
          • Report size getting too big, too many NtOpenFile calls found.
          • VT rate limit hit for: 33abb.msi
          TimeTypeDescription
          06:34:54API Interceptor1988x Sleep call for process: msiexec.exe modified
          06:35:21API Interceptor2x Sleep call for process: icacls.exe modified
          06:36:01API Interceptor5x Sleep call for process: cmd.exe modified
          No context
          No context
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Windows\Installer\MSI93A8.tmp57ff67.msiGet hashmaliciousUnknownBrowse
            56ff7c.msiGet hashmaliciousUnknownBrowse
              setup (2).msiGet hashmaliciousUnknownBrowse
                5c322c.msiGet hashmaliciousUnknownBrowse
                  57ff67.msiGet hashmaliciousUnknownBrowse
                    293944637.dllGet hashmaliciousUnknownBrowse
                      setup (2).msiGet hashmaliciousUnknownBrowse
                        setup.msiGet hashmaliciousUnknownBrowse
                          Document.lnk.download.lnkGet hashmaliciousUnknownBrowse
                            2Wr5r2e9vo.msiGet hashmaliciousUnknownBrowse
                              Process:C:\Windows\SysWOW64\msiexec.exe
                              File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 1545736 bytes, 1 file, at 0x2c +A "setup.exe", ID 49166, number 1, 21013 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):1545736
                              Entropy (8bit):5.151566053093365
                              Encrypted:false
                              SSDEEP:12288:COGe7gvi5l2d2ZXpZ0pg3Clk6ih9CtJWwa/2QbQ7eUCWajFrpDs5JXQot+:COG6gviWd2ZXY3kJh8b1sd7ptsn5t+
                              MD5:0EB1DAB24D3DA5ED8B7C5EA63F6BA5A5
                              SHA1:13384E702C3DD018D5E553676639167F6F351174
                              SHA-256:D88F05A410A655E23D498BDFA307084F5D3771E29A51417AA5CE42044EF4FB56
                              SHA-512:6C07AA50CC944AC3BE3A74C0BB3AA57B57DF3E15BA3BF2A74EB4A5D7D4E3A2D4B055B0C5DEC51E174C164B75465824037D1230B9E4375F54C18DA568E3F94680
                              Malicious:false
                              Reputation:low
                              Preview:MSCF............,...................F....R...P.).......Ym2 .setup.exe.(....A..[...4 F.m.....5!.P..lN.0..U..V..B`...nTB...J+...Sai...r.o.p{t.n...[..6.u53DW#..x......K..I.p..K.y.$Kb..]..EPWnz.s..=0n57..1....r..=...v....X..=.)b..p..E.u..7..P...l.A@...F.R*.6.....F..\.....@....h.........}.........{W..|.[.Q.TJ.-.TUd.b..1...(....p.... . ..........$.......Wp....v..r....bN>.'99.ID'O..|..q.?<.!"r8Q).....q"....h...%#..[tI..Hc..o..S......_./g/..y..3S''....@L;.u/..(....`../1+......A....0..K...;*.......2H...(....Gu_.....R.!.{u&.aWm.._........AnN....0.2.#S..z.S.n......&..w.dt&n.L..........Tr.....Z.v.r...O.(..8.....X...ON....ns\..n#..R.F3.(..)...6...?....n..?.ga.A.(..u.iq.h.G.c.V.&.....Zj.U*mr..g.."...@@.?..6C..n..U......3..>..?...R..v..(9......xD....bc/.e,L&..&..J.&;.../.aA..J...Z...*S2*.......Z.f..K.....6pU.. ..k.....K....#...Pb`..c....Y..7...!.."&"......(.#I.....#.x.&.y6.C....U.G...............h.....@..'....'.e...4...#...SG(.$Ug..&..l...i.......T...2
                              Process:C:\Windows\SysWOW64\expand.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):688541696
                              Entropy (8bit):0.048461089697694165
                              Encrypted:false
                              SSDEEP:
                              MD5:C474153CAFE60A41858493469CB85EDE
                              SHA1:C4B76DFB84CD144CB310E226AA78A08DCAEFBB36
                              SHA-256:374DDFD3DFADFC83BC4647A576F2DBA942F2E0BB3B265707E5A15799737F7CC9
                              SHA-512:14CFE559A92A6D9C9C8BE6F409A5CBD0F6A696F9D5D89767AF7B0BA4446F5856390E6428628A4D2349BBE70DDF3197FC870DB20295C933DF5F4C56C31384857B
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 26%
                              Reputation:low
                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...;.Yg.................J...r.......q............@...........................$...........@.................................@#..x........P....................$.H...........................H.......`................%...............................text....I.......J.................. ..`.rdata...#...`...$...N..............@..@.data...(........>...r..............@....00cfg.......p......................@..@.tls................................@....voltbl.,................................rsrc....P.......R..................@..@.reloc..H.....$.......#.............@..B........................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\expand.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):688541696
                              Entropy (8bit):0.048461089697694165
                              Encrypted:false
                              SSDEEP:
                              MD5:C474153CAFE60A41858493469CB85EDE
                              SHA1:C4B76DFB84CD144CB310E226AA78A08DCAEFBB36
                              SHA-256:374DDFD3DFADFC83BC4647A576F2DBA942F2E0BB3B265707E5A15799737F7CC9
                              SHA-512:14CFE559A92A6D9C9C8BE6F409A5CBD0F6A696F9D5D89767AF7B0BA4446F5856390E6428628A4D2349BBE70DDF3197FC870DB20295C933DF5F4C56C31384857B
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 26%
                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...;.Yg.................J...r.......q............@...........................$...........@.................................@#..x........P....................$.H...........................H.......`................%...............................text....I.......J.................. ..`.rdata...#...`...$...N..............@..@.data...(........>...r..............@....00cfg.......p......................@..@.tls................................@....voltbl.,................................rsrc....P.......R..................@..@.reloc..H.....$.......#.............@..B........................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\msiexec.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1802
                              Entropy (8bit):3.7254415646579213
                              Encrypted:false
                              SSDEEP:24:L0Vdv8DW8Xj+7hJZppvZpZESrFEqwcqwLVbyFJxPVxtVEQSyDqwIhQYyun:LKAe/npvZpZJFxEqbyFvtxf5S7tLl
                              MD5:58878CB51195A002F9A5BDDFE83BE3D4
                              SHA1:DFD73EF2884B7F600F2E834E20900F371787B7B0
                              SHA-256:06F3D541CCD1D32020A8925C9852D3875A0F04E9A444FECCA1E8950AC3D4164F
                              SHA-512:D0D1686939EC0BC07782C5E71108D9F1A27157D9176C026CF2B10BA0EE69BE8229EB68449B5D1A914303E4DFDC5A2B5F223E23AF6316AC8324345C41DDE6A3BC
                              Malicious:false
                              Preview:W.r.a.p.p.e.d.A.p.p.l.i.c.a.t.i.o.n.I.d.=.G.o.o.g.l.e. .C.h.r.o.m.e...W.r.a.p.p.e.d.R.e.g.i.s.t.r.a.t.i.o.n.=.N.o.n.e...I.n.s.t.a.l.l.S.u.c.c.e.s.s.C.o.d.e.s.=.0...E.l.e.v.a.t.i.o.n.M.o.d.e.=.n.e.v.e.r...B.a.s.e.N.a.m.e.=.s.e.t.u.p...e.x.e...C.a.b.H.a.s.h.=.d.8.8.f.0.5.a.4.1.0.a.6.5.5.e.2.3.d.4.9.8.b.d.f.a.3.0.7.0.8.4.f.5.d.3.7.7.1.e.2.9.a.5.1.4.1.7.a.a.5.c.e.4.2.0.4.4.e.f.4.f.b.5.6...S.e.t.u.p.P.a.r.a.m.e.t.e.r.s.=./.V.E.R.Y.S.I.L.E.N.T. . ./.V.E.R.Y.S.I.L.E.N.T. ...W.o.r.k.i.n.g.D.i.r.=...C.u.r.r.e.n.t.D.i.r.=.*.S.O.U.R.C.E.D.I.R.*...U.I.L.e.v.e.l.=.5...F.o.c.u.s.=.y.e.s...S.e.s.s.i.o.n.D.i.r.=.C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.9.3.2.6.3.5.5.e.-.8.c.b.6.-.4.d.3.4.-.8.9.0.2.-.6.4.3.2.7.6.e.e.8.3.4.1.\...F.i.l.e.s.D.i.r.=.C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.9.3.2.6.3.5.5.e.-.8.c.b.6.-.4.d.3.4.-.8.9.0.2.-.6.4.3.2.7.6.e.e.8.3.4.1.\.f.i.l.e.s.\...R.u.n.B.e.f.o.r.e.I.n.s.t.a.l.l.F.i.l.e.=.c.m.d...e.x.e...R.u.n.B.
                              Process:C:\Windows\System32\msiexec.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):512
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3::
                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                              Malicious:false
                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\msiexec.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):69632
                              Entropy (8bit):0.11986886695353145
                              Encrypted:false
                              SSDEEP:24:VJKMyj0ZJfAebfddipV7sddipVlVIwG1zlrkg9Su+HuqS:7KRjorfddSBsddSHmtrXgO
                              MD5:DC03956829ABBFBFF434D23CE83E0FA8
                              SHA1:67C46FA8C0CDAA2DEBDCDDF6E52FEAA52990F620
                              SHA-256:51043E6F893541EF1892C0CFED5D4A33A3DC07F8C16BB3CC7C378962D43437B3
                              SHA-512:1FDBEA982F4A0986CC144BF059724BEFA00E95AC7317625468E4AE1863F8A02BA0938F0D6817A6F26D73C921F16843E73BD4832C989DA70BE4B5B31CCB9825DC
                              Malicious:false
                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\msiexec.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):32768
                              Entropy (8bit):0.06925452767188116
                              Encrypted:false
                              SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOwNTtx9N4He/bkyVky6l3X:2F0i8n0itFzDHF0Hxi3X
                              MD5:59129D8DA65640255BA372C78BCCB457
                              SHA1:4327A5E82A0D410AEBFAD7C7ED195B72A15559BE
                              SHA-256:501E4CFC259514ABCD12865ED54E07B12AE456375243EDDE3377F549926328D8
                              SHA-512:C543104AA4FC4DBD2D54EC48B103ECE7995F4329BE1A89472942DED94398F05FAF8DE39FED8367E3E93D383124F3E685FBC25FF7871C78866D316FB51D9EB1F1
                              Malicious:false
                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\msiexec.exe
                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Google Chrome 131.0.6778.109, Subject: Google Chrome, Author: Google LLC, Keywords: Installer, Template: Intel;1033, Revision Number: {63DB0411-523F-42CB-B58A-AC5ACE0863C7}, Create Time/Date: Thu Jan 11 14:59:44 2024, Last Saved Time/Date: Thu Jan 11 14:59:44 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
                              Category:dropped
                              Size (bytes):1855488
                              Entropy (8bit):5.507699487116634
                              Encrypted:false
                              SSDEEP:24576:at9cpVDh1i+OG6gviWd2ZXY3kJh8b1sd7ptsn5t:tpRh1agVYtAkJSbCpyT
                              MD5:0D4245B805741F0D90E4A964971B0527
                              SHA1:0828F6CBE30FC369EB62D9E992162870767489F5
                              SHA-256:B6C37E3D6C1E61C71F42E005774CAE3F722A3273A91D6E29D27E9F76AB4AB934
                              SHA-512:BE3C036F37BE183201C4FADC3C1111B8EA0C2ACF9D6F2EB1CE4E1DC4FFE4664ED91504E8FD83346257F10352F84CB701FB39057EB948FFF038BE3E3328E68371
                              Malicious:false
                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\msiexec.exe
                              File Type:Composite Document File V2 Document, Cannot read section info
                              Category:dropped
                              Size (bytes):20480
                              Entropy (8bit):1.5224615966893702
                              Encrypted:false
                              SSDEEP:24:J3FC/llm6cpmUHCpNvuq0Hk+Hu7ddipVlVIwG1zlrkg9SCddipV7eJfAebN0gJKR:V0pcDHAvuFEgMddSHmtrbddSBerNvKR
                              MD5:E67CD5E83C39E0B3BF250FB5DCED690E
                              SHA1:09622856A480EB753B8A7934E0FF41BB94CDAD29
                              SHA-256:A3129E7A217E1EF3F8C672125786F3CC6C7BF9BE261A42FEF73B68BFD86CD9DC
                              SHA-512:05FCE9BFFCB3DFEC60383A7873862BB7547C1AD4482C48CB4C929EBF388A7659F0595DE93C53097679916EE7AEB858D814D10D141FBE52265E2250243AC0216A
                              Malicious:false
                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\msiexec.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):212992
                              Entropy (8bit):6.513409725320959
                              Encrypted:false
                              SSDEEP:3072:xspAtOdmXwCGjtYNKbYO2gjpcm8rRuqpjCL42loHUvU0yGxr5GqM2a8:jtOdiRQYpgjpjew5DHyGxcqo8
                              MD5:0C8921BBCC37C6EFD34FAF44CF3B0CB5
                              SHA1:DCFA71246157EDCD09EECAF9D4C5E360B24B3E49
                              SHA-256:FD622CF73EA951A6DE631063ABA856487D77745DD1500ADCA61902B8DDE56FE1
                              SHA-512:ED55443E20D40CCA90596F0A0542FA5AB83FE0270399ADFAAFD172987FB813DFD44EC0DA0A58C096AF3641003F830341FE259AD5BCE9823F238AE63B7E11E108
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: 57ff67.msi, Detection: malicious, Browse
                              • Filename: 56ff7c.msi, Detection: malicious, Browse
                              • Filename: setup (2).msi, Detection: malicious, Browse
                              • Filename: 5c322c.msi, Detection: malicious, Browse
                              • Filename: 57ff67.msi, Detection: malicious, Browse
                              • Filename: 293944637.dll, Detection: malicious, Browse
                              • Filename: setup (2).msi, Detection: malicious, Browse
                              • Filename: setup.msi, Detection: malicious, Browse
                              • Filename: Document.lnk.download.lnk, Detection: malicious, Browse
                              • Filename: 2Wr5r2e9vo.msi, Detection: malicious, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............p...p...p.......p.....p..../.p.......p...q.%.p.......p.....p.....p.Rich..p.........................PE..L...Y..e...........!.....h..........K................................................]....@.........................P...]............P.......................`.....................................p...@...............t............................text....f.......h.................. ..`.rdata...............l..............@..@.data....5..........................@....rsrc........P......................@..@.reloc...)...`...*..................@..B........................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\msiexec.exe
                              File Type:Composite Document File V2 Document, Cannot read section info
                              Category:dropped
                              Size (bytes):20480
                              Entropy (8bit):1.1629196697540876
                              Encrypted:false
                              SSDEEP:12:JSbX72FjpSAGiLIlHVRpMh/7777777777777777777777777vDHF0Hx3p3Xl0i8Q:JjSQI5ceP6F
                              MD5:7310E45B9DEA84F8240E3CC72EFB9BA1
                              SHA1:F0C9FBF35EFA998B8B5DC3BA54350534652BC3C6
                              SHA-256:CC4B38B8F77886831A790740B19F12D8048D7E36F1E842AD90B5F09EFE11A296
                              SHA-512:FFB997301817AE37F106AF8D70168E902AB039AC4F34F5DDEEBD3E6E5578CBE8F50CC8D0791542A3C8553285DF50F48DA0FA4B39D64E4A65407E9BF36BA32891
                              Malicious:false
                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Google Chrome 131.0.6778.109, Subject: Google Chrome, Author: Google LLC, Keywords: Installer, Template: Intel;1033, Revision Number: {63DB0411-523F-42CB-B58A-AC5ACE0863C7}, Create Time/Date: Thu Jan 11 14:59:44 2024, Last Saved Time/Date: Thu Jan 11 14:59:44 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
                              Entropy (8bit):5.507699487116634
                              TrID:
                              • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                              File name:33abb.msi
                              File size:1'855'488 bytes
                              MD5:0d4245b805741f0d90e4a964971b0527
                              SHA1:0828f6cbe30fc369eb62d9e992162870767489f5
                              SHA256:b6c37e3d6c1e61c71f42e005774cae3f722a3273a91d6e29d27e9f76ab4ab934
                              SHA512:be3c036f37be183201c4fadc3c1111b8ea0c2acf9d6f2eb1ce4e1dc4ffe4664ed91504e8fd83346257f10352f84cb701fb39057eb948fff038be3e3328e68371
                              SSDEEP:24576:at9cpVDh1i+OG6gviWd2ZXY3kJh8b1sd7ptsn5t:tpRh1agVYtAkJSbCpyT
                              TLSH:C98524D13784C127EA4709314E67D39A6729FCA0AE31B08777A0FB6E5B39AD35E25301
                              File Content Preview:........................>......................................................................................................................................................................................................................................
                              Icon Hash:2d2e3797b32b2b99
                              No network behavior found

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:06:34:54
                              Start date:12/12/2024
                              Path:C:\Windows\System32\msiexec.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\33abb.msi"
                              Imagebase:0xff560000
                              File size:128'512 bytes
                              MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:1
                              Start time:06:34:54
                              Start date:12/12/2024
                              Path:C:\Windows\System32\msiexec.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\msiexec.exe /V
                              Imagebase:0xff560000
                              File size:128'512 bytes
                              MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:false

                              Target ID:5
                              Start time:06:35:17
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\msiexec.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding CF0F714D5438F11C1B89F4CED9AAF9BB
                              Imagebase:0x7f0000
                              File size:73'216 bytes
                              MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:6
                              Start time:06:35:18
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\icacls.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
                              Imagebase:0x760000
                              File size:27'136 bytes
                              MD5 hash:1542A92D5C6F7E1E80613F3466C9CE7F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:8
                              Start time:06:35:21
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\expand.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
                              Imagebase:0x920000
                              File size:53'248 bytes
                              MD5 hash:659CED6D7BDA047BCC6048384231DB9F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:10
                              Start time:06:35:58
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf
                              Imagebase:0x4a100000
                              File size:302'592 bytes
                              MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:13
                              Start time:06:36:03
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\files"
                              Imagebase:0x4aa90000
                              File size:302'592 bytes
                              MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:15
                              Start time:06:36:04
                              Start date:12/12/2024
                              Path:C:\Windows\SysWOW64\icacls.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-9326355e-8cb6-4d34-8902-643276ee8341\." /SETINTEGRITYLEVEL (CI)(OI)LOW
                              Imagebase:0x4e0000
                              File size:27'136 bytes
                              MD5 hash:1542A92D5C6F7E1E80613F3466C9CE7F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              No disassembly