Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
caonimayinhu.msi

Overview

General Information

Sample name:caonimayinhu.msi
Analysis ID:1581838
MD5:74ad98ef2cec876cdbec70b7f8fcbb13
SHA1:7eff9f21a582f2642668b55699b13ec8ea2d923d
SHA256:057d59743964393e73da2ef35f619a53add6605b37f97d912e559939764a764b
Tags:backdoormsisilverfoxwinosuser-zhuzhu0009
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Hides threads from debuggers
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Creates files inside the system directory
Deletes files inside the Windows folder
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • msiexec.exe (PID: 6720 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\caonimayinhu.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 1368 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 4504 cmdline: C:\Windows\System32\MsiExec.exe -Embedding 05122082A45F1CC606BED446BF1D9C7A E Global\MSI0000 MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Program Files (x86)\Windows NT\hrsv.tacReversingLabs: Detection: 18%
Source: C:\Program Files (x86)\Windows NT\hrsv.tacVirustotal: Detection: 25%Perma Link
Source: C:\Windows\Installer\MSIE27D.tmpReversingLabs: Detection: 18%
Source: C:\Windows\Installer\MSIE27D.tmpVirustotal: Detection: 25%Perma Link
Source: caonimayinhu.msiVirustotal: Detection: 20%Perma Link
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

System Summary

barindex
Source: MSIE27D.tmp.1.drStatic PE information: section name: .cE%
Source: hrsv.tac.2.drStatic PE information: section name: .cE%
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3cda7d.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{DD195A3E-F1E1-4747-B330-A0AD9E24708A}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIDC33.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3cda7f.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3cda7f.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE27D.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\3cda7f.msiJump to behavior
Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\Windows NT\hrsv.tac C719EC19E1E00A334D48760CB39609C69FDD0AC7458700A6255DDF41FEB43BEE
Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSIE27D.tmp C719EC19E1E00A334D48760CB39609C69FDD0AC7458700A6255DDF41FEB43BEE
Source: caonimayinhu.msiBinary or memory string: OriginalFilenameReachFramework.resources.dll4 vs caonimayinhu.msi
Source: classification engineClassification label: mal68.evad.winMSI@4/22@0/0
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Windows NT\file.datJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF823D0BB681D95552.TMPJump to behavior
Source: caonimayinhu.msiStatic file information: TRID: Microsoft Windows Installer (60509/1) 88.31%
Source: caonimayinhu.msiVirustotal: Detection: 20%
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\caonimayinhu.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 05122082A45F1CC606BED446BF1D9C7A E Global\MSI0000
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 05122082A45F1CC606BED446BF1D9C7A E Global\MSI0000Jump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: caonimayinhu.msiStatic file information: File size 7589888 > 1048576
Source: MSIE27D.tmp.1.drStatic PE information: section name: .00cfg
Source: MSIE27D.tmp.1.drStatic PE information: section name: _RDATA
Source: MSIE27D.tmp.1.drStatic PE information: section name: .cE%
Source: hrsv.tac.2.drStatic PE information: section name: .00cfg
Source: hrsv.tac.2.drStatic PE information: section name: _RDATA
Source: hrsv.tac.2.drStatic PE information: section name: .cE%
Source: MSIE27D.tmp.1.drStatic PE information: section name: .text entropy: 7.08800768947479
Source: hrsv.tac.2.drStatic PE information: section name: .text entropy: 7.08800768947479
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE27D.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Windows NT\hrsv.tacJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE27D.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Windows NT\hrsv.tacJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\msiexec.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE27D.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Windows NT\hrsv.tacJump to dropped file
Source: C:\Windows\System32\msiexec.exeLast function: Thread delayed
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\msiexec.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
1
Process Injection
31
Masquerading
OS Credential Dumping31
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
File Deletion
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
caonimayinhu.msi20%VirustotalBrowse
caonimayinhu.msi11%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Windows NT\hrsv.tac18%ReversingLabs
C:\Program Files (x86)\Windows NT\hrsv.tac25%VirustotalBrowse
C:\Windows\Installer\MSIE27D.tmp18%ReversingLabs
C:\Windows\Installer\MSIE27D.tmp25%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1581838
Start date and time:2024-12-29 04:20:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 18s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:caonimayinhu.msi
Detection:MAL
Classification:mal68.evad.winMSI@4/22@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .msi
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Program Files (x86)\Windows NT\hrsv.tacinstaller64v6.2.4.msiGet hashmaliciousUnknownBrowse
    C:\Windows\Installer\MSIE27D.tmpinstaller64v6.2.4.msiGet hashmaliciousUnknownBrowse
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6078168
      Entropy (8bit):7.391087433272537
      Encrypted:false
      SSDEEP:98304:HguaE99X1NNBNUpVzglP/szL6lD6E97b1ScJFhs9kwfgdvC3OiXpNmF:AA5ZvUp5g+KQE9319vExJXpNmF
      MD5:7C118D6F54561FE26DD4F27379E886FF
      SHA1:0625FC5E1518E7E7609A0F8D8DCD1B8E4069CF59
      SHA-256:BBC6C1CD9BBB04E645B206E2BD7C1E2AEC555892012EBD019AFC36F09711D613
      SHA-512:E16A872CE3C388BD436296CE199EDBD6467A77AEA99389BA4472EACC7A733B293B873750EBCCEE71C1D18D37E7AD64B14DA1036B5DB72A9D3FDB588843337A16
      Malicious:false
      Reputation:low
      Preview:...@IXOS.@.....@...Y.@.....@.....@.....@.....@.....@......&.{DD195A3E-F1E1-4747-B330-A0AD9E24708A}..Setup..caonimayinhu.msi.@.....@.....@.....@........&.{27CEE494-4803-43C6-88D2-0A60C0CEC690}.....@.....@.....@.....@.......@.....@.....@.......@......Setup......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{125CBCBA-000D-4311-82CD-4ABABCD734C4}&.{DD195A3E-F1E1-4747-B330-A0AD9E24708A}.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..".C:\Program Files (x86)\Windows NT\....*.C:\Program Files (x86)\Windows NT\file.dat...._K..._.@A.......\.MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....og.........." ........................................................0]......]...`.............................................`...0...(.....].......\.,7........... ].x............................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1475920
      Entropy (8bit):7.999856085050733
      Encrypted:true
      SSDEEP:24576:m/uukgWYOPcx6sEjDugwrrtjaFTyT10cMgJdUo8IS6s0+bHyPhRC4:mW/cx653uXrto20l/56s/bS5Q4
      MD5:D61AD1C480045D17AB62260901F58B72
      SHA1:C98017530B714399980FF82688B5272851C974B1
      SHA-256:1A6428BCC35E37AEEB154C9083F33CE971BC32A1AE4B76D3CCB06B05A64E5544
      SHA-512:BF40798AAE33B67F0323ACFE0644C8B7F390650600610E2B227737C477ABC6E597280CF09F5361EA503E9FD8664128553A42CEA94A7D3EC943C9421B38C3C219
      Malicious:false
      Reputation:low
      Preview:.@S....*.B..x...................)..~.L..>.;..Y..6....K.\x...j.^(....+.~sS?.`7..:V.]..:...V..F.|8....}..].x.N.....@.....b.b.|."...(V.hO.+#.t>Z.... Q(..oj..~..M>....Q.z.y.........>...p..E.k..?.^.1m.^H..9.....|.>M.e..CU.&.8.c...v..|f.DZ...*.jp].....y .0~..KcXQ....u..x .Ib%..:Y9....:o.F_.(.-r...4.NZPfkG./..#K...oe2..e.&.Jg...%.5{...7 ;.2...V.....Z.E>E.FI.G.L......d'.J..a.........q.....L..;x~...]...L#..T...o...2........>.r.8...(..L.}.V".z..I.{.c.6Z...-NDFTm.E..'B...#w .`..$..Ba.>..h..R..k....#&.{B.F..?....j.BL...j=...K.K.B...~.o&...x..7...;......*.u.i\....z"z.Gc{._..x.^...ln< ..x]..uf....].}y.s.4.G.#.....Y...e..(L..|.e..F..eS....[. ......k.[n.X.!.8.bMi.2D...f...G6..}.....1.d./.0o..z.."'=a\.ZR..#[.)y..H....{G....?}/.z..=^...Ni0..>....r..b..eQ<z.$q..V.gU.zR..]I.[5.j...t.).pF.X...{.P$.3._8...X..}..0cU....._.... .y.2......S.....n..f..)........@dWp...G..<..dK...hA......vZ...Bkd.....c6.Hc4.D.m.....8U.A<&.! ]y.|nu.Z g..'...f..!5`....$...b.K9;.%.+.d..w...
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
      Category:dropped
      Size (bytes):6070784
      Entropy (8bit):7.391209406124013
      Encrypted:false
      SSDEEP:98304:KguaE99X1NNBNUpVzglP/szL6lD6E97b1ScJFhs9kwfgdvC3OiXpNm:jA5ZvUp5g+KQE9319vExJXpNm
      MD5:F2667D49F895F5A458B245725B8B8E06
      SHA1:0B9B0375BBDDD7A8049C69AC8894350FA742D374
      SHA-256:C719EC19E1E00A334D48760CB39609C69FDD0AC7458700A6255DDF41FEB43BEE
      SHA-512:89126FCED8A2E49DE22ACD27D5D29BB1A0ED726120813D0179094CAA90BAC5725A7978606BB68EDA25A8E1ECDB1D86730AB87069957144A1C8B1D8525B00167D
      Malicious:true
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 18%
      • Antivirus: Virustotal, Detection: 25%, Browse
      Joe Sandbox View:
      • Filename: installer64v6.2.4.msi, Detection: malicious, Browse
      Reputation:low
      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....og.........." ........................................................0]......]...`.............................................`...0...(.....].......\.,7........... ].x...............................(....)..@...............0............................text...n........................... ..`.rdata...k.......l..................@..@.data...Tg...`...F...B..............@....pdata...6....2..8....2.............@..@.00cfg..8.....3.......2.............@..@.tls......... 3.......2.............@..._RDATA.......03.......2.............@..@.cE%......)..@3...)...2............. ..h.rsrc.........].......\.............@..@.reloc..x.... ].......\.............@..B........................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Setup, Author: Netease, Keywords: Installer, Comments: wafrwgdv, Template: Intel;1033, Revision Number: {27CEE494-4803-43C6-88D2-0A60C0CEC690}, Create Time/Date: Sun Dec 29 01:44:26 2024, Last Saved Time/Date: Sun Dec 29 01:44:26 2024, Number of Pages: 300, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
      Category:dropped
      Size (bytes):7589888
      Entropy (8bit):7.567336393030409
      Encrypted:false
      SSDEEP:98304:Mrx6SBPSyGBIWxguaE99X1NNBNUpVzgKP/szL6lD6E97b1ScJFhs9kwfgdvC3OiW:MVLSRSA5ZvUp5gXKQE9319vExJXpNm
      MD5:74AD98EF2CEC876CDBEC70B7F8FCBB13
      SHA1:7EFF9F21A582F2642668B55699B13EC8EA2D923D
      SHA-256:057D59743964393E73DA2EF35F619A53ADD6605B37F97D912E559939764A764B
      SHA-512:922B2DABD3274F92F4ED50CD9F8B492C0843285BC62B07796657F80B091DB2A7BCF44918E2D66390538AE9BAAF0039F28274CDC79C653384F3BF58932A73B83F
      Malicious:false
      Reputation:low
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Setup, Author: Netease, Keywords: Installer, Comments: wafrwgdv, Template: Intel;1033, Revision Number: {27CEE494-4803-43C6-88D2-0A60C0CEC690}, Create Time/Date: Sun Dec 29 01:44:26 2024, Last Saved Time/Date: Sun Dec 29 01:44:26 2024, Number of Pages: 300, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
      Category:dropped
      Size (bytes):7589888
      Entropy (8bit):7.567336393030409
      Encrypted:false
      SSDEEP:98304:Mrx6SBPSyGBIWxguaE99X1NNBNUpVzgKP/szL6lD6E97b1ScJFhs9kwfgdvC3OiW:MVLSRSA5ZvUp5gXKQE9319vExJXpNm
      MD5:74AD98EF2CEC876CDBEC70B7F8FCBB13
      SHA1:7EFF9F21A582F2642668B55699B13EC8EA2D923D
      SHA-256:057D59743964393E73DA2EF35F619A53ADD6605B37F97D912E559939764A764B
      SHA-512:922B2DABD3274F92F4ED50CD9F8B492C0843285BC62B07796657F80B091DB2A7BCF44918E2D66390538AE9BAAF0039F28274CDC79C653384F3BF58932A73B83F
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6072476
      Entropy (8bit):7.391227706981859
      Encrypted:false
      SSDEEP:98304:rguaE99X1NNBNUpVzglP/szL6lD6E97b1ScJFhs9kwfgdvC3OiXpNm2:UA5ZvUp5g+KQE9319vExJXpNm2
      MD5:3DB1246388ADFBA6BF846F497A41663D
      SHA1:F84C13FCA32F46F186E7E7BC6B2D274851CD2A71
      SHA-256:E2B780A8E15DEE459595879D7B3CFECFA0BF4758F8437E9ABC7A1BC5D9D40BA9
      SHA-512:385A596CBBB83010DAE254C3B7EDCEFEC01B779EB3D27EDCA64DC8D453C407A0DC547BBB16A1B0B065BCF7F861E37C0C6C2532F9725E49DB5D4AE788469E5240
      Malicious:false
      Preview:...@IXOS.@.....@...Y.@.....@.....@.....@.....@.....@......&.{DD195A3E-F1E1-4747-B330-A0AD9E24708A}..Setup..caonimayinhu.msi.@.....@.....@.....@........&.{27CEE494-4803-43C6-88D2-0A60C0CEC690}.....@.....@.....@.....@.......@.....@.....@.......@......Setup......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{125CBCBA-000D-4311-82CD-4ABABCD734C4}*.C:\Program Files (x86)\Windows NT\file.dat.@.......@.....@.....@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@P....@.....@......".C:\Program Files (x86)\Windows NT\....1\gujfn150\|Windows NT\......Please insert the disk: ..cab1.cab.@.....@......C:\Windows\Installer\3cda7d.msi.........@........file.dat..l4d..file.dat.@.....@P....@.......@.............@.........@.....@.....@.....@..]..@.b&..@...r......_....J..._.@A.......\.MZx.....................@...............................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
      Category:dropped
      Size (bytes):6070784
      Entropy (8bit):7.391209406124013
      Encrypted:false
      SSDEEP:98304:KguaE99X1NNBNUpVzglP/szL6lD6E97b1ScJFhs9kwfgdvC3OiXpNm:jA5ZvUp5g+KQE9319vExJXpNm
      MD5:F2667D49F895F5A458B245725B8B8E06
      SHA1:0B9B0375BBDDD7A8049C69AC8894350FA742D374
      SHA-256:C719EC19E1E00A334D48760CB39609C69FDD0AC7458700A6255DDF41FEB43BEE
      SHA-512:89126FCED8A2E49DE22ACD27D5D29BB1A0ED726120813D0179094CAA90BAC5725A7978606BB68EDA25A8E1ECDB1D86730AB87069957144A1C8B1D8525B00167D
      Malicious:true
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 18%
      • Antivirus: Virustotal, Detection: 25%, Browse
      Joe Sandbox View:
      • Filename: installer64v6.2.4.msi, Detection: malicious, Browse
      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....og.........." ........................................................0]......]...`.............................................`...0...(.....].......\.,7........... ].x...............................(....)..@...............0............................text...n........................... ..`.rdata...k.......l..................@..@.data...Tg...`...F...B..............@....pdata...6....2..8....2.............@..@.00cfg..8.....3.......2.............@..@.tls......... 3.......2.............@..._RDATA.......03.......2.............@..@.cE%......)..@3...)...2............. ..h.rsrc.........].......\.............@..@.reloc..x.... ].......\.............@..B........................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):20480
      Entropy (8bit):1.1646617936162253
      Encrypted:false
      SSDEEP:12:JSbX72Fj8AGiLIlHVRpLh/7777777777777777777777777vDHFV5+Cu0l0i8Q:J2QI5PH5DIF
      MD5:35F16412EA5BAE4A3EBD9B65CDF3121E
      SHA1:FCF5B86AB8606E058F06E3F22250888995073BB0
      SHA-256:75EBD18F7F4563D911296857A7E1AC5DBAAB2B6EAB90523E93C37A6D30331621
      SHA-512:90E5B7147CD24BB2CECD27C82A91E936FABF2B4780BF7EDD0CA7766FC404D93E4F35B428C0EDEDBE1609922710AFC93FCA32F34CF08A7C57B84C3A6B42460ABF
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):20480
      Entropy (8bit):1.4618647150510804
      Encrypted:false
      SSDEEP:48:w8Ph2uRc06WXJwFT50YGdeS5o+rydeSIyy:fh21zFTXTqG
      MD5:612CC48CB302D308440BF58C7F34C743
      SHA1:D796E17320E0C8BD9035D2B5272FE8451A332196
      SHA-256:986D10AAEB548FA6BEC3ED163B4420F9C136F9A8A9FEF1A16AE70D24C8B6F2C7
      SHA-512:5D201B6339B64ED4B81F3EB28890511B51E10B9FE8395990BF7ED66484371DA08462D7F6199F165244EA7B20E75050203F232A6483AC7784A2E3688562D0444B
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):432221
      Entropy (8bit):5.375174668353549
      Encrypted:false
      SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauS:zTtbmkExhMJCIpErb
      MD5:697F2F939106CA62E5F7D2F6174AE664
      SHA1:F6C9A0C4E3A9D24C0BC50564700479B68790FAF7
      SHA-256:60EE26B47B1390413F6C4DA83BABFF360D1E0C5CB0B7B37C3C7292655FF0EF0F
      SHA-512:7D037A61D7D5767713F63188527BCC16A8445CF60E952FB7827B2C72927ECE26B024403C784B772B80CF907A16EA89F1C907EBC7425722E991B4B8FBDB316D05
      Malicious:false
      Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):20480
      Entropy (8bit):1.4618647150510804
      Encrypted:false
      SSDEEP:48:w8Ph2uRc06WXJwFT50YGdeS5o+rydeSIyy:fh21zFTXTqG
      MD5:612CC48CB302D308440BF58C7F34C743
      SHA1:D796E17320E0C8BD9035D2B5272FE8451A332196
      SHA-256:986D10AAEB548FA6BEC3ED163B4420F9C136F9A8A9FEF1A16AE70D24C8B6F2C7
      SHA-512:5D201B6339B64ED4B81F3EB28890511B51E10B9FE8395990BF7ED66484371DA08462D7F6199F165244EA7B20E75050203F232A6483AC7784A2E3688562D0444B
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):32768
      Entropy (8bit):1.1786052980762016
      Encrypted:false
      SSDEEP:48:g5neuxPveFXJ1T5SYGdeS5o+rydeSIyy:OeHdTlTqG
      MD5:DF897BBF8B2C289F86D0CBF9C2B76693
      SHA1:42BF1C66BD17D6AAACCFB79E79E00D4CDDAD28EB
      SHA-256:B5D4F285B12D08CD486F9735AEE1C470276E5BD6BEF058A70386F1B47DDB070B
      SHA-512:2BE0AFED1ADE97ADD95FD4825179281D47452B09233EBF6568D4960F62C629FCF2088A7949B85E93C506F6A298E9D24C57934161B2D139602B65BF398E373E06
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):32768
      Entropy (8bit):1.1786052980762016
      Encrypted:false
      SSDEEP:48:g5neuxPveFXJ1T5SYGdeS5o+rydeSIyy:OeHdTlTqG
      MD5:DF897BBF8B2C289F86D0CBF9C2B76693
      SHA1:42BF1C66BD17D6AAACCFB79E79E00D4CDDAD28EB
      SHA-256:B5D4F285B12D08CD486F9735AEE1C470276E5BD6BEF058A70386F1B47DDB070B
      SHA-512:2BE0AFED1ADE97ADD95FD4825179281D47452B09233EBF6568D4960F62C629FCF2088A7949B85E93C506F6A298E9D24C57934161B2D139602B65BF398E373E06
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):69632
      Entropy (8bit):0.10243762102431059
      Encrypted:false
      SSDEEP:24:ddmzZLdB5GipVGdB5GipV7V2BwGklrkgI+k7J:PmzldeScdeS5o+rIr
      MD5:0B677312398D9D507762F60EDCC27918
      SHA1:F0C0061DE410720F6AE48561FF93C0857AE42F3F
      SHA-256:242257174E937FC11F7D0038BE3DE3DF782047E6C5B11C9089DBCA166E93A352
      SHA-512:6B5CAB341380A99D76EB8FB7A333C99A82933DF0A6D8DEAC4B66226CAF8CFE8639B59FA90B5085A5CEF770B51B4258565A46E2BE97BBCD08AD73E5869D33B819
      Malicious:false
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:modified
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):20480
      Entropy (8bit):1.4618647150510804
      Encrypted:false
      SSDEEP:48:w8Ph2uRc06WXJwFT50YGdeS5o+rydeSIyy:fh21zFTXTqG
      MD5:612CC48CB302D308440BF58C7F34C743
      SHA1:D796E17320E0C8BD9035D2B5272FE8451A332196
      SHA-256:986D10AAEB548FA6BEC3ED163B4420F9C136F9A8A9FEF1A16AE70D24C8B6F2C7
      SHA-512:5D201B6339B64ED4B81F3EB28890511B51E10B9FE8395990BF7ED66484371DA08462D7F6199F165244EA7B20E75050203F232A6483AC7784A2E3688562D0444B
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):32768
      Entropy (8bit):0.0721934435503696
      Encrypted:false
      SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOshEX2G+CEXIVky6l0:2F0i8n0itFzDHFV5+Cu0
      MD5:2B082615584F0923AF2458351923D44A
      SHA1:72757A3DC7F276085EA2C628A4D92DD683DAE579
      SHA-256:69E369783F846FFD958F289B77E22D3CECC887958C1C41403D6DED0D62662A2B
      SHA-512:3FD468C9554D7CDB65B613D94082911E5448B0CAB05AA27001508E2DE990CFEE8F85985B2233B3FBA503E1FEF1727C66C4930383F05342BE70FA0839BFD02ECC
      Malicious:false
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):32768
      Entropy (8bit):1.1786052980762016
      Encrypted:false
      SSDEEP:48:g5neuxPveFXJ1T5SYGdeS5o+rydeSIyy:OeHdTlTqG
      MD5:DF897BBF8B2C289F86D0CBF9C2B76693
      SHA1:42BF1C66BD17D6AAACCFB79E79E00D4CDDAD28EB
      SHA-256:B5D4F285B12D08CD486F9735AEE1C470276E5BD6BEF058A70386F1B47DDB070B
      SHA-512:2BE0AFED1ADE97ADD95FD4825179281D47452B09233EBF6568D4960F62C629FCF2088A7949B85E93C506F6A298E9D24C57934161B2D139602B65BF398E373E06
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Setup, Author: Netease, Keywords: Installer, Comments: wafrwgdv, Template: Intel;1033, Revision Number: {27CEE494-4803-43C6-88D2-0A60C0CEC690}, Create Time/Date: Sun Dec 29 01:44:26 2024, Last Saved Time/Date: Sun Dec 29 01:44:26 2024, Number of Pages: 300, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
      Entropy (8bit):7.567336393030409
      TrID:
      • Microsoft Windows Installer (60509/1) 88.31%
      • Generic OLE2 / Multistream Compound File (8008/1) 11.69%
      File name:caonimayinhu.msi
      File size:7'589'888 bytes
      MD5:74ad98ef2cec876cdbec70b7f8fcbb13
      SHA1:7eff9f21a582f2642668b55699b13ec8ea2d923d
      SHA256:057d59743964393e73da2ef35f619a53add6605b37f97d912e559939764a764b
      SHA512:922b2dabd3274f92f4ed50cd9f8b492c0843285bc62b07796657f80b091db2a7bcf44918e2d66390538ae9baaf0039f28274cdc79c653384f3bf58932a73b83f
      SSDEEP:98304:Mrx6SBPSyGBIWxguaE99X1NNBNUpVzgKP/szL6lD6E97b1ScJFhs9kwfgdvC3OiW:MVLSRSA5ZvUp5gXKQE9319vExJXpNm
      TLSH:7D7601365AB7B0BCF693D6B58AB78777A037379117265CBF00A5E3301632A014B46B72
      File Content Preview:........................>......................................................................................................................................................................................................................................
      Icon Hash:2d2e3797b32b2b99
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:22:21:01
      Start date:28/12/2024
      Path:C:\Windows\System32\msiexec.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\caonimayinhu.msi"
      Imagebase:0x7ff725b70000
      File size:69'632 bytes
      MD5 hash:E5DA170027542E25EDE42FC54C929077
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:22:21:02
      Start date:28/12/2024
      Path:C:\Windows\System32\msiexec.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\msiexec.exe /V
      Imagebase:0x7ff725b70000
      File size:69'632 bytes
      MD5 hash:E5DA170027542E25EDE42FC54C929077
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:2
      Start time:22:21:04
      Start date:28/12/2024
      Path:C:\Windows\System32\msiexec.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\MsiExec.exe -Embedding 05122082A45F1CC606BED446BF1D9C7A E Global\MSI0000
      Imagebase:0x7ff725b70000
      File size:69'632 bytes
      MD5 hash:E5DA170027542E25EDE42FC54C929077
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly