Windows
Analysis Report
Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msi
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- msiexec.exe (PID: 7300 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ Fact28.NAT URGY.SABAD ONOPAGOID2 8122024.MS I.msi" MD5: E5DA170027542E25EDE42FC54C929077)
- msiexec.exe (PID: 7332 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 7396 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 6ECC0D9 E21236D27E 65D3469C48 A1B4F MD5: 9D09DC1EDA745A5F87553048E57620CF)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | String found in binary or memory: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Replication Through Removable Media | Windows Management Instrumentation | 1 DLL Side-Loading | 2 Process Injection | 21 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 2 Process Injection | LSASS Memory | 2 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 11 Peripheral Device Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 File Deletion | NTDS | 11 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs | |||
26% | ReversingLabs | Win32.Trojan.Barys |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582416 |
Start date and time: | 2024-12-30 15:29:15 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msi |
Detection: | MAL |
Classification: | mal48.winMSI@4/21@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.253.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msi
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Windows\Installer\MSI1C34.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | PureCrypter | Browse | |||
Get hash | malicious | Matanbuchus | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
C:\Windows\Installer\MSI1B77.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | PureCrypter | Browse | |||
Get hash | malicious | Matanbuchus | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 806 |
Entropy (8bit): | 5.632384943320435 |
Encrypted: | false |
SSDEEP: | 24:nOgN9NaayUpS6C+dweYDhiSGzZDFT5J/CZyl:OY9kxg93dweYD8SGzZDl58Z2 |
MD5: | A5AE2A076719FF803AD97E041CEABF0B |
SHA1: | 2FCDB7CB73A6D33A19256546AF74C36EC630552C |
SHA-256: | 99CC659C882C33EBC8DBD13B41F27CA5BC664EEEF40EF3845D94E9A35EFB8D9F |
SHA-512: | 9B794578116ADF131C2DE2C1C5A88EBE3743F974DC8D07C2A9BBD7EA42C0D1F36594013267ABA5458FC4E0A0C8D533E4C59D00A0D461C864C92ED5073B10ABFE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 21210112 |
Entropy (8bit): | 6.438756352238486 |
Encrypted: | false |
SSDEEP: | 196608:bNkomkc0qSy3Vre+8dVYPdm180iAR9Q+YJLRkEeljCOXIVAaj:Ckc0Ny3LOVYPdmG0iY9n4U6 |
MD5: | B8F6549890140413CFD1C1647C95B8EE |
SHA1: | D4B0BC4D5C390DBE2D4DC3302F6A64A6C254F7B4 |
SHA-256: | 5B79102CA44A5F6C0F3CF390928D1D54C9F6CA972605436837172A1788C9B5FC |
SHA-512: | 723FC9AA5480A876000FC4A197926F7141BDA4DB9F4DE02183F0C2CCF6F9777A750397068E99BBC7609097DAAD5CBD1A243235D09D25FA5BCCC10BA773D35D9E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 894 |
Entropy (8bit): | 5.520558504132719 |
Encrypted: | false |
SSDEEP: | 24:nTgN9NaayUpYu6q+dIFRzZOVYDhiS4zZWJ5J/CZyh:TY9kxg0vdIXzZ0YD8S4zZWJ58Zy |
MD5: | 42AE23EA2BA64FE2C86C01F81D342022 |
SHA1: | 93E5DB24B1EE5D2E083673B3208499CB5DFB686D |
SHA-256: | B1A163462E1656DD8AA142F3A669D8A079DF4B227164AF9F16FCBEAA7A709343 |
SHA-512: | BD3F4F89B88DF53369B750DFEC341EAC31597CD9D6BED28D45DA970437468804C89FDD2D28FC47DB78D0B27EB40A4492D2C10FEB480653B2EB04A1DDC823902B |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | modified |
Size (bytes): | 19850752 |
Entropy (8bit): | 6.420852890858687 |
Encrypted: | false |
SSDEEP: | 196608:FqSy3Vre+8dVYPdm180iAR9Q+YJLRkEeljCOXIVAaj:FNy3LOVYPdmG0iY9n4U6 |
MD5: | 8571E9E4526C27A9A9FBA0115CA4ECD6 |
SHA1: | 8D6CC4587B88D80D973D8581BC4AE6D4F65D0C30 |
SHA-256: | FBB5AABE1AE70E81695BB9A3D72FAB39B9F6D7D7DF86DEB5240DF6C707B9CD6B |
SHA-512: | 626382C8928BF257161588D288B0DD91DF2ED796F4E4F1C673CD87D63FB97D9FB2E865928231AAB0E7F02A857D072131DBF9CA978C70298725712F3760E5B123 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.190820839737944 |
Encrypted: | false |
SSDEEP: | 12:JSbX72Fj/1CXAlfLIlHmRpCBh+7777777777777777777777777ZDHFyftBnlak3:JpCUIYZIwaLFiF |
MD5: | 538E04482054C992BEDC73507C5C57F1 |
SHA1: | 2FA027F6A2296749B6F6828CED6F6483646568DD |
SHA-256: | FCA574C791DDE8EC661F5FD563729BD8B73A22460D396F760BA43C0AB978C428 |
SHA-512: | 4B70CF9685BDC7288F083D5AA615AB82BBC6679DF8ED853B0E2E5C7E8BB60FAF4D82A6D9798003FE393AC12E33B650C8D2A736A20ECFD3777BE822145384A64A |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.576215714808764 |
Encrypted: | false |
SSDEEP: | 48:t8PhXuRc06WX4aFT5se/4+Mbj3ISCj3KAECiCy1owj3ISCj3ATVy:QhX1qFTp/4dg1ECBQ |
MD5: | CC329F258B67B9C03C122243D362EFE6 |
SHA1: | 77B71D9D69B0085D84379815FCD26CD2FAAE16A8 |
SHA-256: | EE2B74C70BD5D15DEE42F6F5E354376AA55680F6EDD971BC4DFAD03A6BCA9C07 |
SHA-512: | 4AFCF8C27A95CFEE480EDE7821C433E4BD243ACEA2432A9C4630166A5472DF037745F004A7E1ECD2A0013BC3E0FE5E52FFAC55C56ED32F5DC1D4ABB329A28470 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 432221 |
Entropy (8bit): | 5.37515990819462 |
Encrypted: | false |
SSDEEP: | 1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgau1:zTtbmkExhMJCIpErk |
MD5: | BA8A31C1A1D725B69B7E56B0FF27FDA4 |
SHA1: | C80CF2579AEE4D75466780B1E204F173BD1951C7 |
SHA-256: | 2750097DD55FA96871063E44AE05A47E27E32E6C47E39EA7B1F175C94FD63268 |
SHA-512: | 97A38CD7B4B617408E634D4764B6645C160841114325941009F5BC493E3D1D3F7C89A7B4A50B7A24FD8524217CEC456FCB2245D2F73C9638710DB96CDC68E4C1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.08521648955106614 |
Encrypted: | false |
SSDEEP: | 6:2/9LG7iVCnLG7iVrKOzPLHKO0Qb6fBE6BDbLw2vbOkXBcg/tiVky6lrX:2F0i8n0itFzDHFyftBnlakxc6rX |
MD5: | 15A6095732DD0ACD2B72BCD9C4789F5E |
SHA1: | 801F786CC5460FB6CDFDEBF65865C2677B3CAD68 |
SHA-256: | FD358D3100CCC674FE30E71BC0EA6E01294815AF2CF9205731D7AFE1C4098B37 |
SHA-512: | 5BD31F38CDA9BCE73252B2F84F557B50A54E0466523E269937ED6C9C65587D262800463D29580763F35380BCD88D65E6C4D83EDA0B67E19A36F3E767BFC1EF09 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.576215714808764 |
Encrypted: | false |
SSDEEP: | 48:t8PhXuRc06WX4aFT5se/4+Mbj3ISCj3KAECiCy1owj3ISCj3ATVy:QhX1qFTp/4dg1ECBQ |
MD5: | CC329F258B67B9C03C122243D362EFE6 |
SHA1: | 77B71D9D69B0085D84379815FCD26CD2FAAE16A8 |
SHA-256: | EE2B74C70BD5D15DEE42F6F5E354376AA55680F6EDD971BC4DFAD03A6BCA9C07 |
SHA-512: | 4AFCF8C27A95CFEE480EDE7821C433E4BD243ACEA2432A9C4630166A5472DF037745F004A7E1ECD2A0013BC3E0FE5E52FFAC55C56ED32F5DC1D4ABB329A28470 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2616165351264361 |
Encrypted: | false |
SSDEEP: | 48:YaPugBthPIFX4LT5uVBe/4+Mbj3ISCj3KAECiCy1owj3ISCj3ATVy:7PRtIITEVo/4dg1ECBQ |
MD5: | EB99AB7672C2FC65E843B725D3EBFF5C |
SHA1: | B21889C45F631C20D22F5999900FE8BE235984C4 |
SHA-256: | D5D2E8F95C9EC5EF759CADCFDDED029016F80E066E0F922BEB2FC839775A303C |
SHA-512: | F90B17FD56FAC887FEF43D3C6042AA3C95E6F94C748BE55BB528CEA0A1AC18164CF4CDE6720DBCB39B9EFA12D0A6AA21C3DE20ED090580D4B04DDB597DAB6C41 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.576215714808764 |
Encrypted: | false |
SSDEEP: | 48:t8PhXuRc06WX4aFT5se/4+Mbj3ISCj3KAECiCy1owj3ISCj3ATVy:QhX1qFTp/4dg1ECBQ |
MD5: | CC329F258B67B9C03C122243D362EFE6 |
SHA1: | 77B71D9D69B0085D84379815FCD26CD2FAAE16A8 |
SHA-256: | EE2B74C70BD5D15DEE42F6F5E354376AA55680F6EDD971BC4DFAD03A6BCA9C07 |
SHA-512: | 4AFCF8C27A95CFEE480EDE7821C433E4BD243ACEA2432A9C4630166A5472DF037745F004A7E1ECD2A0013BC3E0FE5E52FFAC55C56ED32F5DC1D4ABB329A28470 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 73728 |
Entropy (8bit): | 0.14045491852260142 |
Encrypted: | false |
SSDEEP: | 48:iyyTej3ISCj39j3ISCj3KAECiCy1os+Mte/:iz+1ECmds/ |
MD5: | 013873CFFA59FBFA834721CFE1A36937 |
SHA1: | 049EA7FC71C94D7805AD7714111F10D2020672DF |
SHA-256: | B8AF7062ACDFC617B83FC3A4D936ED3841386B6466C9FA834806E3C1C82906D1 |
SHA-512: | 38DF6507B857869C31532C2B2223F0A53AC6DFE76E93AB5916A60BD0FB20C977C6E6A6F7D8C98CA67FC09F3D81783DD85CCFAA236C76093B779596F6C7EC8B1F |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2616165351264361 |
Encrypted: | false |
SSDEEP: | 48:YaPugBthPIFX4LT5uVBe/4+Mbj3ISCj3KAECiCy1owj3ISCj3ATVy:7PRtIITEVo/4dg1ECBQ |
MD5: | EB99AB7672C2FC65E843B725D3EBFF5C |
SHA1: | B21889C45F631C20D22F5999900FE8BE235984C4 |
SHA-256: | D5D2E8F95C9EC5EF759CADCFDDED029016F80E066E0F922BEB2FC839775A303C |
SHA-512: | F90B17FD56FAC887FEF43D3C6042AA3C95E6F94C748BE55BB528CEA0A1AC18164CF4CDE6720DBCB39B9EFA12D0A6AA21C3DE20ED090580D4B04DDB597DAB6C41 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.2616165351264361 |
Encrypted: | false |
SSDEEP: | 48:YaPugBthPIFX4LT5uVBe/4+Mbj3ISCj3KAECiCy1owj3ISCj3ATVy:7PRtIITEVo/4dg1ECBQ |
MD5: | EB99AB7672C2FC65E843B725D3EBFF5C |
SHA1: | B21889C45F631C20D22F5999900FE8BE235984C4 |
SHA-256: | D5D2E8F95C9EC5EF759CADCFDDED029016F80E066E0F922BEB2FC839775A303C |
SHA-512: | F90B17FD56FAC887FEF43D3C6042AA3C95E6F94C748BE55BB528CEA0A1AC18164CF4CDE6720DBCB39B9EFA12D0A6AA21C3DE20ED090580D4B04DDB597DAB6C41 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.438756352238486 |
TrID: |
|
File name: | Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msi |
File size: | 21'210'112 bytes |
MD5: | b8f6549890140413cfd1c1647c95b8ee |
SHA1: | d4b0bc4d5c390dbe2d4dc3302f6a64a6c254f7b4 |
SHA256: | 5b79102ca44a5f6c0f3cf390928d1d54c9f6ca972605436837172a1788c9b5fc |
SHA512: | 723fc9aa5480a876000fc4a197926f7141bda4db9f4de02183f0c2ccf6f9777a750397068e99bbc7609097daad5cbd1a243235d09d25fa5bccc10ba773d35d9e |
SSDEEP: | 196608:bNkomkc0qSy3Vre+8dVYPdm180iAR9Q+YJLRkEeljCOXIVAaj:Ckc0Ny3LOVYPdmG0iY9n4U6 |
TLSH: | C3278D137244903FC05B26395D37DAA49A3EBE11AE264F4727F83D8D5E366803D2B693 |
File Content Preview: | ........................>...................D...................................!..."...#...$...%...&...'...(...)...*...+...,...-......./.......T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o.. |
Icon Hash: | 2d2e3797b32b2b99 |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 09:30:05 |
Start date: | 30/12/2024 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ac4d0000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 09:30:05 |
Start date: | 30/12/2024 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ac4d0000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 09:30:06 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf80000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |