Windows
Analysis Report
bmouJCkvam.msi
Overview
General Information
Sample name: | bmouJCkvam.msirenamed because original name is a hash value |
Original sample name: | 6d9f885c3655463a4e31d212b597980dcb20e708d682d8cc013de08b25ee8365.msi |
Analysis ID: | 1582400 |
MD5: | 6ed1eed0e2ed039803fde67276df358a |
SHA1: | e4f3e185cc58b6f0ec39244e969dd60a65141ac0 |
SHA256: | 6d9f885c3655463a4e31d212b597980dcb20e708d682d8cc013de08b25ee8365 |
Tags: | bankergrandoreiromsitrojanuser-johnk3r |
Infos: | |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- msiexec.exe (PID: 6492 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ bmouJCkvam .msi" MD5: E5DA170027542E25EDE42FC54C929077)
- msiexec.exe (PID: 6664 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 2516 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 2A7E35B 28F384BC4F 24AE80FA3E 2B513 MD5: 9D09DC1EDA745A5F87553048E57620CF)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Replication Through Removable Media | Windows Management Instrumentation | 1 DLL Side-Loading | 2 Process Injection | 21 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 2 Process Injection | LSASS Memory | 2 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 11 Peripheral Device Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 File Deletion | NTDS | 11 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | ReversingLabs | Win32.Trojan.Grandoreiro |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs | |||
24% | ReversingLabs | Win32.Trojan.Barys |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
15.164.165.52.in-addr.arpa | unknown | unknown | false | high | |
212.20.149.52.in-addr.arpa | unknown | unknown | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582400 |
Start date and time: | 2024-12-30 14:57:11 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | bmouJCkvam.msirenamed because original name is a hash value |
Original Sample Name: | 6d9f885c3655463a4e31d212b597980dcb20e708d682d8cc013de08b25ee8365.msi |
Detection: | MAL |
Classification: | mal56.winMSI@4/21@2/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 52.149.20.212, 52.165.164.15, 20.109.210.53, 13.107.246.45
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: bmouJCkvam.msi
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Windows\Installer\MSI5D76.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | PureCrypter | Browse | |||
Get hash | malicious | Matanbuchus | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | UltraVNC | Browse | |||
C:\Windows\Installer\MSI5CD9.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | PureCrypter | Browse | |||
Get hash | malicious | Matanbuchus | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | UltraVNC | Browse |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 775 |
Entropy (8bit): | 5.576140055616829 |
Encrypted: | false |
SSDEEP: | 24:KOgVBiiUpS6C+d6BxYDhiSGzZD85J/CZyl:bCEig93d6LYD8SGzZD858Z2 |
MD5: | 1FFC7F35B99FBD96C3233A3E1349C9C8 |
SHA1: | 184AA20D5509428023F9BC6691D411ED505E229B |
SHA-256: | D69034FB33F87F225B6F9AEF0556A556B6466479C1E21EE3C74383408B5DB5E9 |
SHA-512: | 5850BF7BE9DDDBD4DD68945F86EDEF0D4298769169E3768F0E629399DEE0CEBFB8AB1D8AE720542AD6B66AC23188AEDDFA776F2356AAC3EA174D27938E267EF0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 21412864 |
Entropy (8bit): | 6.454362864781552 |
Encrypted: | false |
SSDEEP: | 196608:y/iuPyU3SV31p/tMwPsDMo6dQU9FqgX4ebmpTCsR9UjrdNkomk:yauFSVFp/tMwPE6dQU9Fqgte0ck |
MD5: | 6ED1EED0E2ED039803FDE67276DF358A |
SHA1: | E4F3E185CC58B6F0EC39244E969DD60A65141AC0 |
SHA-256: | 6D9F885C3655463A4E31D212B597980DCB20E708D682D8CC013DE08B25EE8365 |
SHA-512: | 88194C42F242C9B6B882FA94D8F8F214EA2FFD3BBD87DDE8913DA75CD69DE22251859D6B99BF567AE25D6A7B7AC8CD572269C2A08B9390E68078C8C9E891B552 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 863 |
Entropy (8bit): | 5.4664118746541055 |
Encrypted: | false |
SSDEEP: | 24:KTgVBiiUpYu6q+dIFRzZOVYDhiS4zZWg5J/CZyh:2CEig0vdIXzZ0YD8S4zZWg58Zy |
MD5: | 0F91402E63A786B8682BB36855F05C6B |
SHA1: | EE883E073D6667DFC5E112D73870DC78669527EC |
SHA-256: | 4DE077BB38FC4DDF8F84C390D290A77DBB00FAFE53ECE48145D6AECD6C78E715 |
SHA-512: | 5238F7BB5A052538D7BE9B64B3BC05CF8D0596AE41CA75E11CE38168E4C92FAF64CEDDC43B6DC93E5AE54F1E5C3E18CBD0FDEFF53F3DF6AFA12E110F6F6D0F68 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | modified |
Size (bytes): | 20051968 |
Entropy (8bit): | 6.437956362029936 |
Encrypted: | false |
SSDEEP: | 196608:fiuPyU3SV31p/tMwPsDMo6dQU9FqgX4ebmpTCsR9Ujr:6uFSVFp/tMwPE6dQU9Fqgte0 |
MD5: | 254BBDD55517B894173134364C14DB8E |
SHA1: | 5F9F018D1F1C727AC4CD36E418BCE89D2A8355F6 |
SHA-256: | 6122367194A3CEBF4B2CCE39B779BA551EBD350A1D825D885276F03ADF396CAD |
SHA-512: | 97D7A91855918B5CC2D58D326E5761917EE0612943E15C8B9F20C95BD30285C1F5F98BEA46A0E290100207BDDAEC7527567BF0B16FA16B9F89C604504E38B089 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.1642222960917499 |
Encrypted: | false |
SSDEEP: | 12:JSbX72FjHAGiLIlHVRpZh/7777777777777777777777777vDHFbDBrRit/l0i8Q:JVQI5ttlrciF |
MD5: | D1839E3616D4703CAAB2ABDF43D79BFE |
SHA1: | D40B1CC67636DDC82CA8D6A1C8B8163DF24A265A |
SHA-256: | 2A91C6406D92B60D5A863EF092E78504DEF1D28543DC402EBBFC2F266EB710AD |
SHA-512: | 0225566141D5E193C720B9BF92B165B37A51D7D6F713B98035863062641452E897F9773306B92AF8D95B4F2B133F718F76CA3942F72A82B9DEE6B3A25F6D9D3D |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5607812888466475 |
Encrypted: | false |
SSDEEP: | 48:e8PhuuRc06WXJ0FT52KCnhKj3ISCj3KAECiCy1ovj3ISCj3ATUF:Rhu13FTehd1ECyL |
MD5: | D9A70B8B305F16B6A986B8BFF38F6678 |
SHA1: | 755E4F62309A153DEB7672048B7CC0EF5D9DB3AF |
SHA-256: | 9FF671C351A8094C9CBC2E970BAE25DEEEDCF2BAD39408128A17A550EDCE767B |
SHA-512: | 49FDD69F65CC68C1B02BEB7727E8704A8CFF755B16D74E54D8A3ABD12104629AAC7B26D0128A1A01BFD9E336C0853D8F6DEE1294AF1FEE38C7B7CD91BC4D7F1D |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 432221 |
Entropy (8bit): | 5.3751805840869835 |
Encrypted: | false |
SSDEEP: | 1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgau2:zTtbmkExhMJCIpErP |
MD5: | C72DC3071052AADA5D5DDCF242C5A4A0 |
SHA1: | CA544344942E5BEBEAA69EAAF62F143B7188F038 |
SHA-256: | A9B71BDAC87FE6E0221D1F612EE93F0BE01704E80D7470EC479F51B12A2AB2F4 |
SHA-512: | F2ED597AB2E3F2FCD0CBFACD004C3B290B58D9CFC299B0F71A45140AD65AE95DBECD203E28C2CFF2F174E2CF26BE776EAA750068C227460F9EDF79A0200FF837 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2518988465203087 |
Encrypted: | false |
SSDEEP: | 48:jFmu1BO+CFXJpT5WKCnhKj3ISCj3KAECiCy1ovj3ISCj3ATUF:Zms6RT+hd1ECyL |
MD5: | 3195E50E7A9E2A94398EAFB2D6DE5B4C |
SHA1: | C279B593A694EB5500B6B447840A7BE34CA4A9EE |
SHA-256: | 8DF0DEDE56D01EF915937D88E151855DB11A85649EEA333613F43FBBB82F09A8 |
SHA-512: | FC0A7F06483B8FBC6FB3728973BF4E0DF8EA7E9343C08F2934CF777DF069188B0DB67A1BCF49AD932C942758C8C8724C47780F20FF8C4A95ECBDBD2B06B351E8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 73728 |
Entropy (8bit): | 0.13525059066115974 |
Encrypted: | false |
SSDEEP: | 48:fFzTej3ISCj39j3ISCj3KAECiCy1oRKnhK:tp+1ECjK |
MD5: | 815421C6A1477F02B42D703CFEEB7C3C |
SHA1: | 33E17B885D7B812356561841194FAEB14BA6878C |
SHA-256: | 62982421E9C8D4925AF3F40CAE930105F5B1BC6DEA1FA889B9E6DEF54FF04869 |
SHA-512: | 02CEAC1236531C314B035101BB95A8AFBB956417870FAA0EAE59A59A490F5CC01C768E04D7A0A6A89901EC843E58917DD34D26A3DCFC8A48BE1D558582243769 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5607812888466475 |
Encrypted: | false |
SSDEEP: | 48:e8PhuuRc06WXJ0FT52KCnhKj3ISCj3KAECiCy1ovj3ISCj3ATUF:Rhu13FTehd1ECyL |
MD5: | D9A70B8B305F16B6A986B8BFF38F6678 |
SHA1: | 755E4F62309A153DEB7672048B7CC0EF5D9DB3AF |
SHA-256: | 9FF671C351A8094C9CBC2E970BAE25DEEEDCF2BAD39408128A17A550EDCE767B |
SHA-512: | 49FDD69F65CC68C1B02BEB7727E8704A8CFF755B16D74E54D8A3ABD12104629AAC7B26D0128A1A01BFD9E336C0853D8F6DEE1294AF1FEE38C7B7CD91BC4D7F1D |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.07153020212943359 |
Encrypted: | false |
SSDEEP: | 6:2/9LG7iVCnLG7iVrKOzPLHKObD/zbqHuRtc/tgVky6lit/:2F0i8n0itFzDHFbDBr+it/ |
MD5: | 2AD0AEB596564CBEB97619B9983E71CA |
SHA1: | 90696631EE9DD35ED1F7B7337BE06C6093EF8942 |
SHA-256: | C7B1BA9A942EAA9C9E9D8BDAB61C9813D7DD5FC5D7F8833DA476FCAA7B03F526 |
SHA-512: | A82A8E6AFB178434FB0360088FB738BB7575D5DCD08E2BF86ABE1BB3BC0DBB1AEAD6C30DFC7A5EAEC57AF2AACDF490C1FBCA2AEC07579EABF5B850A3E5493152 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5607812888466475 |
Encrypted: | false |
SSDEEP: | 48:e8PhuuRc06WXJ0FT52KCnhKj3ISCj3KAECiCy1ovj3ISCj3ATUF:Rhu13FTehd1ECyL |
MD5: | D9A70B8B305F16B6A986B8BFF38F6678 |
SHA1: | 755E4F62309A153DEB7672048B7CC0EF5D9DB3AF |
SHA-256: | 9FF671C351A8094C9CBC2E970BAE25DEEEDCF2BAD39408128A17A550EDCE767B |
SHA-512: | 49FDD69F65CC68C1B02BEB7727E8704A8CFF755B16D74E54D8A3ABD12104629AAC7B26D0128A1A01BFD9E336C0853D8F6DEE1294AF1FEE38C7B7CD91BC4D7F1D |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2518988465203087 |
Encrypted: | false |
SSDEEP: | 48:jFmu1BO+CFXJpT5WKCnhKj3ISCj3KAECiCy1ovj3ISCj3ATUF:Zms6RT+hd1ECyL |
MD5: | 3195E50E7A9E2A94398EAFB2D6DE5B4C |
SHA1: | C279B593A694EB5500B6B447840A7BE34CA4A9EE |
SHA-256: | 8DF0DEDE56D01EF915937D88E151855DB11A85649EEA333613F43FBBB82F09A8 |
SHA-512: | FC0A7F06483B8FBC6FB3728973BF4E0DF8EA7E9343C08F2934CF777DF069188B0DB67A1BCF49AD932C942758C8C8724C47780F20FF8C4A95ECBDBD2B06B351E8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2518988465203087 |
Encrypted: | false |
SSDEEP: | 48:jFmu1BO+CFXJpT5WKCnhKj3ISCj3KAECiCy1ovj3ISCj3ATUF:Zms6RT+hd1ECyL |
MD5: | 3195E50E7A9E2A94398EAFB2D6DE5B4C |
SHA1: | C279B593A694EB5500B6B447840A7BE34CA4A9EE |
SHA-256: | 8DF0DEDE56D01EF915937D88E151855DB11A85649EEA333613F43FBBB82F09A8 |
SHA-512: | FC0A7F06483B8FBC6FB3728973BF4E0DF8EA7E9343C08F2934CF777DF069188B0DB67A1BCF49AD932C942758C8C8724C47780F20FF8C4A95ECBDBD2B06B351E8 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.454362864781552 |
TrID: |
|
File name: | bmouJCkvam.msi |
File size: | 21'412'864 bytes |
MD5: | 6ed1eed0e2ed039803fde67276df358a |
SHA1: | e4f3e185cc58b6f0ec39244e969dd60a65141ac0 |
SHA256: | 6d9f885c3655463a4e31d212b597980dcb20e708d682d8cc013de08b25ee8365 |
SHA512: | 88194c42f242c9b6b882fa94d8f8f214ea2ffd3bbd87dde8913da75cd69de22251859d6b99bf567ae25d6a7b7ac8cd572269c2a08b9390e68078c8c9e891b552 |
SSDEEP: | 196608:y/iuPyU3SV31p/tMwPsDMo6dQU9FqgX4ebmpTCsR9UjrdNkomk:yauFSVFp/tMwPE6dQU9Fqgte0ck |
TLSH: | D7279D237245903EC15B26395937EB64993FBF116E228E472BF83D4D6E366803D2B643 |
File Content Preview: | ........................>...................G...................................!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L.. |
Icon Hash: | 2d2e3797b32b2b99 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 14:58:40.689058065 CET | 53 | 49585 | 162.159.36.2 | 192.168.2.4 |
Dec 30, 2024 14:58:41.145612955 CET | 63358 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 30, 2024 14:58:41.157517910 CET | 53 | 63358 | 1.1.1.1 | 192.168.2.4 |
Dec 30, 2024 14:58:42.226099014 CET | 62155 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 30, 2024 14:58:42.233355045 CET | 53 | 62155 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 30, 2024 14:58:41.145612955 CET | 192.168.2.4 | 1.1.1.1 | 0xc380 | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false | |
Dec 30, 2024 14:58:42.226099014 CET | 192.168.2.4 | 1.1.1.1 | 0x5ecd | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 30, 2024 14:58:41.157517910 CET | 1.1.1.1 | 192.168.2.4 | 0xc380 | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false | |
Dec 30, 2024 14:58:42.233355045 CET | 1.1.1.1 | 192.168.2.4 | 0x5ecd | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 08:58:10 |
Start date: | 30/12/2024 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff779700000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 08:58:11 |
Start date: | 30/12/2024 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff779700000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 08:58:11 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8b0000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |