Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
id-Processo_Z5TGVQUK.msi

Overview

General Information

Sample Name:id-Processo_Z5TGVQUK.msi
Analysis ID:779347
MD5:3a46ebf8434c2742761f1e80ce621910
SHA1:8b04f7c51284ef28af70c9e717a6a6e24f0421f0
SHA256:a94cd3f5e620657b26e844d37db508f08da960e168345e1dabd31d047e2cb924
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Query firmware table information (likely to detect VMs)
Tries to evade analysis by execution special instruction (VM detection)
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for dropped file
PE file contains section with special chars
Queries the volume information (name, serial number etc) of a device
Deletes files inside the Windows folder
Creates files inside the system directory
PE file contains sections with non-standard names
Found dropped PE file which has not been started or loaded
Entry point lies outside standard sections
Sample file is different than original file name gathered from version info
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
PE file contains more sections than normal
Launches processes in debugging mode, may be used to hinder debugging
Checks for available system drives (often done to infect USB drives)

Classification

  • System is w10x64_ra
  • msiexec.exe (PID: 4800 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\id-Processo_Z5TGVQUK.msi" MD5: 2D9F692E71D9985F1C6237F063F6FE76)
  • msiexec.exe (PID: 1108 cmdline: C:\Windows\system32\msiexec.exe /V MD5: 2D9F692E71D9985F1C6237F063F6FE76)
    • msiexec.exe (PID: 244 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 405A35FE4080A1D43DBAF24C899E36CF MD5: F9A3EEE1C3A4067702BC9A59BC894285)
    • APLICA O SEGURA.exe (PID: 3092 cmdline: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe MD5: B7665D2B57D78BA73A91F63D8C4409E8)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: id-Processo_Z5TGVQUK.msiReversingLabs: Detection: 14%
Source: id-Processo_Z5TGVQUK.msiVirustotal: Detection: 11%Perma Link
Source: http://clientelas.is-a-caterer.com/clientes/inspecionando.phpAvira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Roaming\shfolder.dllReversingLabs: Detection: 25%
Source: C:\Users\user\AppData\Roaming\shfolder.dllVirustotal: Detection: 15%Perma Link
Source: C:\Users\user\AppData\Roaming\shfolder.dllJoe Sandbox ML: detected
Source: Binary string: d:\a01\_work\2\s\\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.2.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.dr, MSI421B.tmp.2.dr
Source: Binary string: D:\build\ob\bora-20089737\bora\build\build\vmnat\release\win32\vmnat.pdb source: APLICA O SEGURA.exe, 00000006.00000000.1370178372.00000000008D0000.00000002.00000001.01000000.00000004.sdmp, APLICA O SEGURA.exe.2.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: global trafficHTTP traffic detected: POST /clientes/inspecionando.php HTTP/1.0Connection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 0Host: clientelas.is-a-caterer.comAccept: text/html, */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: id-Processo_Z5TGVQUK.msi, APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: id-Processo_Z5TGVQUK.msi, APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: id-Processo_Z5TGVQUK.msi, APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: id-Processo_Z5TGVQUK.msi, APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: id-Processo_Z5TGVQUK.msi, APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://ocsp.digicert.com0
Source: id-Processo_Z5TGVQUK.msi, APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://ocsp.digicert.com0A
Source: id-Processo_Z5TGVQUK.msi, APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://ocsp.digicert.com0C
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://ocsp.digicert.com0L
Source: id-Processo_Z5TGVQUK.msi, APLICA O SEGURA.exe.2.dr, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://ocsp.digicert.com0X
Source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://t2.symcb.com0
Source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: http://tl.symcd.com0&
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://www.digicert.com/CPS0
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://www.vmware.com/0
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: http://www.vmware.com/0/
Source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: https://www.advancedinstaller.com
Source: APLICA O SEGURA.exe.2.drString found in binary or memory: https://www.digicert.com/CPS0
Source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: https://www.thawte.com/cps0/
Source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drString found in binary or memory: https://www.thawte.com/repository0W
Source: unknownHTTP traffic detected: POST /clientes/inspecionando.php HTTP/1.0Connection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 0Host: clientelas.is-a-caterer.comAccept: text/html, */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Source: unknownDNS traffic detected: queries for: clientelas.is-a-caterer.com

System Summary

barindex
Source: shfolder.dll.2.drStatic PE information: section name: .X*u
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI421B.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\523895.msiJump to behavior
Source: id-Processo_Z5TGVQUK.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs id-Processo_Z5TGVQUK.msi
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeSection loaded: security.dllJump to behavior
Source: shfolder.dll.2.drStatic PE information: Number of sections : 12 > 10
Source: id-Processo_Z5TGVQUK.msiReversingLabs: Detection: 14%
Source: id-Processo_Z5TGVQUK.msiVirustotal: Detection: 11%
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\id-Processo_Z5TGVQUK.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 405A35FE4080A1D43DBAF24C899E36CF
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 405A35FE4080A1D43DBAF24C899E36CFJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF5C5B1922ECB10A50.TMPJump to behavior
Source: classification engineClassification label: mal92.evad.winMSI@6/25@1/1
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: id-Processo_Z5TGVQUK.msiStatic file information: TRID: Microsoft Windows Installer (77509/1) 52.18%
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMutant created: \Sessions\1\BaseNamedObjects\B9297DB4-C17F-42DD-B67C-7A713E42F839
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeWindow found: window name: TEditJump to behavior
Source: id-Processo_Z5TGVQUK.msiStatic file information: File size 21580800 > 1048576
Source: Binary string: d:\a01\_work\2\s\\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.2.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.dr, MSI421B.tmp.2.dr
Source: Binary string: D:\build\ob\bora-20089737\bora\build\build\vmnat\release\win32\vmnat.pdb source: APLICA O SEGURA.exe, 00000006.00000000.1370178372.00000000008D0000.00000002.00000001.01000000.00000004.sdmp, APLICA O SEGURA.exe.2.dr
Source: shfolder.dll.2.drStatic PE information: section name: .didata
Source: shfolder.dll.2.drStatic PE information: section name: .4rj
Source: shfolder.dll.2.drStatic PE information: section name: .sJZ
Source: shfolder.dll.2.drStatic PE information: section name: .X*u
Source: initial sampleStatic PE information: section where entry point is pointing to: .X*u
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI450B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4579.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI447D.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI421B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\shfolder.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\vcruntime140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI450B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4579.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI447D.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI421B.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run APLICA O SEGURA.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run APLICA O SEGURA.exeJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 2DC0005 value: E9 6B 22 12 74 Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 76EE2270 value: E9 9A DD ED 8B Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 2DD0007 value: E9 DB AB 14 74 Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 76F1ABE0 value: E9 2E 54 EB 8B Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 2DF0005 value: E9 6B 15 0B 74 Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 76EA1570 value: E9 9A EA F4 8B Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 2E00008 value: E9 FB 90 0F 74 Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 76EF9100 value: E9 10 6F F0 8B Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 31F0005 value: E9 4B BC 06 73 Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 7625BC50 value: E9 BA 43 F9 8C Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 3200005 value: E9 8B F9 04 73 Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 7624F990 value: E9 7A 06 FB 8C Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 3210005 value: E9 EB C2 A7 72 Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 75C8C2F0 value: E9 1A 3D 58 8D Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 3230005 value: E9 3B C4 A6 72 Jump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeMemory written: PID: 3092 base: 75C9C440 value: E9 CA 3B 59 8D Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeSpecial instruction interceptor: First address: 000000006CA8226F instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeSpecial instruction interceptor: First address: 000000006C7F404D instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeRDTSC instruction interceptor: First address: 000000006CA9E1E1 second address: 000000006CA9E1E6 instructions: 0x00000000 rdtsc 0x00000002 pop ebx 0x00000003 lahf 0x00000004 cwde 0x00000005 rdtsc
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI450B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI4579.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI447D.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMware
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMnet8
Source: APLICA O SEGURA.exe.2.drBinary or memory string: acpiacpiGPEahciaioaioGenericaioHttpaioKernelaioMgraioWin32aioWin32CompletionamdIommuappstateassignHwasyncsocketatapiCdromauthenticodeautomationAVCapturebackdoorbarrierbatteryblitbrtalkbuslogicbuslogicMdevbuttoncdromcheckpointchecksumchipsetcmoscptOpscpucountCpuidInfocrc32crtboracuidataCachedataSetsMgrdataSetsStoredeviceGroupdevicePowerOndeviceSwapdeviceThreaddictdigestlibdirectBootdiskdisklibdiskVmnixdmadmgdnddockerduiduiDevicesduiLocalizationduiMKSduiProxyAppsdumperdvxe1000efinvefivarstoreehcienableDetTimerepdextcfgdevicefakeDmafiltlibFiltLibTestLogflashramfloppyfsresxftConfigftcptgmmgpumgmtgrainTrackgrmguestAppMonitorguestInstallguest_msgguest_rpcguestVarsguiguiWin32HeaphbaCommonhbrhdaudiohdaudio_alsahgfshgfsServerhidQueuehostctlhostonlyhpethttpich7minputdevtapipcipcMgrkeyboardkeymapkeypersistlargepagelibconnectlicensellclsilogiclwdFiltermacbwmacfimacfiltermachPollmaclatencymainmainMemmainMemReplayCheckmasReceiptmemoryHotplugmemspacemigratemigrateVMmirrormksmksBasicOpsmksClientmksControlmksCursorPositionmksDX11WindowmksDX11RenderermksDX11BasicmksDX11ResourceViewmksDX11ShimOpsmksFramemksGLBasicmksGLContextMuxmksGLDrawmksGLFBOmksGLManagermksGLQuerymksGLShadermksGLStatemksGLTextureViewmksGLWindowmksHostCursormksInputmksKeyboardmksMousemksMTLRenderermksRenderOpsmksServermksSWBmksVulkanRenderermksVulkanCmdsmksWinBSODmormstatmvncnamespaceDbnamespaceMgrnetPktnumanumaHostnvdimmnvmenvramMgrobjcobjliboemDeviceopNotificationopromovhdmemparallelpassthroughpcipcibridgepci_e1000pci_ehcipci_hdaudiopci_hyperpciPassthrupciPluginpci_scsipci_svgapci_uhcipci_videpci_vlancepci_vmcipci_vmxnet3pci_xhcipmemobjpollprecisionclockpromotediskpvnvrampvscsiqatremoteDevicereplayVMXsbxscsisecureBootserialserviceImplserviceUsersgsgxsgxmpasgxRegistrationToolshadersharedFolderMgrshim3DslotfssmbiossmcsmramsnapshotsoundsparseCheckersslstate3dstatssvgasvgadevtapsvga_rectsyncWaitQtarReadertimertoolstoolsIsotoolsversiontpm2emutpm2VerificationtxtudpfecuhciundopointunityMsgupitbeupitdusbusb_xhciutiluwtvaBasicOpsvcpuhotplugvcpuNUMAvdfsvdfs_9pvdpPluginvdtiPciCfgSpcvflashvgavideviewClientvigorviommuvlancevmcfvmcivmgencvmGLvmhsvmIPCvmkcfgvmkEventvmkmgmtlibvmLockvmmousevmnamevmnetBridgevmOvhdvmUpsellControllervmvavmWindowControllervmxnetvmxnet3vmxvmdbCallbacksvncBlitvncDecodevncEncodevncServervncServerOSvnetvprobeVProbeClientvrdmavsanobjvsockvsockProxyvthreadvtpmvuivusbaudiovusbccidvusbhidvusbkeyboardvusbmousevusbrngvusbtabletvusbvideovvolbevvtdvwdtwifiwin32utilworkerxpmode
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMware NAT
Source: APLICA O SEGURA.exe, 00000006.00000000.1370178372.00000000008D0000.00000002.00000001.01000000.00000004.sdmp, APLICA O SEGURA.exe.2.drBinary or memory string: hgfsServer
Source: APLICA O SEGURA.exe.2.drBinary or memory string: http://www.vmware.com/0
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMware NAT Panic: %s
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMware, Inc.1!0
Source: APLICA O SEGURA.exe.2.drBinary or memory string: `%s' is not VMware network device (cannot set VMnet number)
Source: APLICA O SEGURA.exe.2.drBinary or memory string: \\.\Global\VMnetUserif
Source: APLICA O SEGURA.exe, 00000006.00000003.1469048676.0000000002DE4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\CurrentControlSet\Services\VMware NAT Service\Parameters
Source: APLICA O SEGURA.exe.2.drBinary or memory string: System\CurrentControlSet\services\Tcpip\ParametersDomainDhcpDomainSearchListretriespolicyrotateburstrecursiveEnablenameserver1nameserver2nameserver3localdomain\SYSTEM\CurrentControlSet\Services\VMware NAT Service\ParametersConfigPathVMwarebora\lib\string\str.c%s:%d Buffer too small
Source: APLICA O SEGURA.exe.2.drBinary or memory string: pci_vmci
Source: APLICA O SEGURA.exe.2.drBinary or memory string: FileDescriptionVMware NAT ServiceL
Source: APLICA O SEGURA.exe.2.drBinary or memory string: device\\.\Global\VMnetUserifNot enough memory for vmnet watch
Source: APLICA O SEGURA.exe.2.drBinary or memory string: Unable to setup receive event for vmnet.
Source: APLICA O SEGURA.exe.2.drBinary or memory string: Not enough memory for vmnet polling
Source: APLICA O SEGURA.exe.2.drBinary or memory string: http://www.vmware.com/0/
Source: APLICA O SEGURA.exe.2.drBinary or memory string: SYSTEM\CurrentControlSet\Services\VMware NAT Service\Parameters
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMware, Inc.1
Source: APLICA O SEGURA.exe.2.drBinary or memory string: <description>"VMware NAT Service"</description>
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMware NAT Service
Source: APLICA O SEGURA.exe.2.drBinary or memory string: ProductNameVMware WorkstationP
Source: APLICA O SEGURA.exe.2.drBinary or memory string: Not enough memory for vmnet watch
Source: APLICA O SEGURA.exe.2.drBinary or memory string: vmmouse
Source: APLICA O SEGURA.exe.2.drBinary or memory string: vmnetnat-mac.txtMACVMnet8Error with host MAC configuration parameter in configuration file.
Source: APLICA O SEGURA.exe.2.drBinary or memory string: `%s' is not a VMware network device (cannot set interface flags)
Source: APLICA O SEGURA.exe.2.drBinary or memory string: 252-TCP segments sent to vmnet: %d
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMware NATSTATICvh%08Xvirtual.localhost240-ICMP ECHO NAT table
Source: APLICA O SEGURA.exe.2.drBinary or memory string: name="VMware.VMware.vmnat"
Source: APLICA O SEGURA.exe.2.drBinary or memory string: noreply@vmware.com0
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMnet
Source: APLICA O SEGURA.exe.2.drBinary or memory string: `%s' is not a VMware network device (cannot get MAC address)
Source: APLICA O SEGURA.exe.2.drBinary or memory string: `%s' is not VMware network device (cannot set MAC address)
Source: APLICA O SEGURA.exe.2.drBinary or memory string: CompanyNameVMware, Inc.N
Source: APLICA O SEGURA.exe.2.drBinary or memory string: vmnetnat-mac.txt
Source: APLICA O SEGURA.exe.2.drBinary or memory string: vmnet
Source: APLICA O SEGURA.exe.2.drBinary or memory string: nbnsTimeoutnetbiosnbnsRetriesnbdsTimeoutwpadresetConnectionOnLinkDownVMware NAT ServiceBad service requestHandler not installedService startedStopping the NAT service.
Source: APLICA O SEGURA.exe.2.drBinary or memory string: 251-fd %u, from %u.%u.%u.%u/%u to %u.%u.%u.%u/%u state %d251-fd %u, from %s/%u to %s?%u state %d252-TCP segments sent to vmnet: %d
Source: APLICA O SEGURA.exe.2.drBinary or memory string: vmnetBridge
Source: APLICA O SEGURA.exe.2.drBinary or memory string: vmnetnat.conf
Source: APLICA O SEGURA.exe.2.drBinary or memory string: hostMACVMware NAT Panic: %s
Source: APLICA O SEGURA.exe.2.drBinary or memory string: # VMnet device if not specified on command line
Source: APLICA O SEGURA.exe.2.drBinary or memory string: 1998-2022 VMware, Inc.<
Source: APLICA O SEGURA.exe.2.drBinary or memory string: SkBuff_Push_undernatIp6EnablehostvmnetnatIp6Prefixfe80::250:56ff:fe%02x:2222fd15:4ba5:5a2b:10%02x::2222fd15:4ba5:5a2b:10%02x::2222fe80::250:56ff:fec0:2222vmnetnat.confUsage: %s [-D] [-c configfile] [-d pidfile] [-m macfile]
Source: APLICA O SEGURA.exe.2.drBinary or memory string: VMnet`%s' is not VMware network device (cannot set VMnet number)

Anti Debugging

barindex
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeSystem information queried: KernelDebuggerInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe C:\Users\user\AppData\Roaming\APLICA O SEGURA.exeJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Replication Through Removable Media
Windows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
21
Masquerading
1
Credential API Hooking
521
Security Software Discovery
1
Replication Through Removable Media
1
Credential API Hooking
Exfiltration Over Other Network Medium2
Non-Application Layer Protocol
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/Job1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
1
Disable or Modify Tools
LSASS Memory22
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)1
DLL Side-Loading
22
Virtualization/Sandbox Evasion
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Process Injection
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
File Deletion
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync213
System Information Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
id-Processo_Z5TGVQUK.msi15%ReversingLabs
id-Processo_Z5TGVQUK.msi11%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\shfolder.dll100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe4%ReversingLabs
C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe3%VirustotalBrowse
C:\Users\user\AppData\Roaming\shfolder.dll25%ReversingLabsWin32.Downloader.Generic
C:\Users\user\AppData\Roaming\shfolder.dll16%VirustotalBrowse
C:\Users\user\AppData\Roaming\vcruntime140.dll0%ReversingLabs
C:\Windows\Installer\MSI421B.tmp0%ReversingLabs
C:\Windows\Installer\MSI447D.tmp0%ReversingLabs
C:\Windows\Installer\MSI450B.tmp0%ReversingLabs
C:\Windows\Installer\MSI4579.tmp0%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLink
clientelas.is-a-caterer.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://clientelas.is-a-caterer.com/clientes/inspecionando.php100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
clientelas.is-a-caterer.com
198.12.119.196
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://clientelas.is-a-caterer.com/clientes/inspecionando.phpfalse
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.vmware.com/0/APLICA O SEGURA.exe.2.drfalse
    high
    https://www.advancedinstaller.comid-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drfalse
      high
      http://www.vmware.com/0APLICA O SEGURA.exe.2.drfalse
        high
        https://www.thawte.com/cps0/id-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drfalse
          high
          https://www.thawte.com/repository0Wid-Processo_Z5TGVQUK.msi, MSI447D.tmp.2.dr, MSI4579.tmp.2.dr, MSI450B.tmp.2.drfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            198.12.119.196
            clientelas.is-a-caterer.comUnited States
            36352AS-COLOCROSSINGUSfalse
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:779347
            Start date and time:2023-01-06 19:11:01 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 5m 17s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:id-Processo_Z5TGVQUK.msi
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
            Number of analysed new started processes analysed:15
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal92.evad.winMSI@6/25@1/1
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .msi
            • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, usocoreworker.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 20.190.160.17, 40.126.32.133, 20.190.160.20, 40.126.32.134, 20.190.160.22, 40.126.32.74, 40.126.32.72, 40.126.32.140
            • Excluded domains from analysis (whitelisted): prda.aadg.msidentity.com, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, login.msa.msidentity.com, www.tm.a.prd.aadg.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            No simulations
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            AS-COLOCROSSINGUShttps://activities03sec.online/entGet hashmaliciousBrowse
            • 192.3.137.194
            BNR.exeGet hashmaliciousBrowse
            • 198.23.207.34
            Contracts0001.exeGet hashmaliciousBrowse
            • 198.23.207.34
            bwVf0tx6FY.exeGet hashmaliciousBrowse
            • 23.236.181.126
            wl7NyOaxI2.exeGet hashmaliciousBrowse
            • 23.236.181.126
            SecuriteInfo.com.Heur.Mint.Zard.52.13041.3941.exeGet hashmaliciousBrowse
            • 23.236.181.126
            ueYfEcBEne.exeGet hashmaliciousBrowse
            • 23.236.181.126
            EDWeRICYe7.exeGet hashmaliciousBrowse
            • 23.236.181.126
            V0m3tO8GdZ.exeGet hashmaliciousBrowse
            • 23.236.181.126
            4ICuD7jDWy.exeGet hashmaliciousBrowse
            • 23.236.181.126
            DgXXuttghF.exeGet hashmaliciousBrowse
            • 23.236.181.126
            o74gtZ1whC.exeGet hashmaliciousBrowse
            • 23.236.181.126
            K0XDClG0A2.exeGet hashmaliciousBrowse
            • 23.236.181.126
            UB933GPHuV.exeGet hashmaliciousBrowse
            • 23.236.181.126
            file.exeGet hashmaliciousBrowse
            • 23.236.181.126
            file.exeGet hashmaliciousBrowse
            • 23.236.181.126
            file.exeGet hashmaliciousBrowse
            • 23.236.181.126
            file.exeGet hashmaliciousBrowse
            • 23.236.181.126
            SecuriteInfo.com.Trojan.PackedNET.1293.5221.25042.exeGet hashmaliciousBrowse
            • 198.23.207.34
            29FAOioczx.exeGet hashmaliciousBrowse
            • 23.236.181.126
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            C:\Users\user\AppData\Roaming\vcruntime140.dllAplicativo seguro Windows.msiGet hashmaliciousBrowse
              tmp8765.tmp.zipGet hashmaliciousBrowse
                YeMuOJ7Q47.docGet hashmaliciousBrowse
                  rrI0OyGbCB.exeGet hashmaliciousBrowse
                    cc.exeGet hashmaliciousBrowse
                      RYUSUdTh3G.exeGet hashmaliciousBrowse
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:modified
                        Size (bytes):1779
                        Entropy (8bit):5.52962702839911
                        Encrypted:false
                        SSDEEP:24:9gDhJd4xNVclTi6OZh26AN/1FhchYhImCXh1PDhi/6+JwOwidnw8PzpjqowL9f0S:9eBARs1o7P7+ZxAAX62u5
                        MD5:A29207B327D054C88BC32C4AE7EE6D75
                        SHA1:13F7F13BEFA0D2FA6CCC5950FC5247AA8B9B66E3
                        SHA-256:1C3B3EFFD88C7C2897B1DF90B8CCF4BF12E5A7D5F5B19062134885987DA598FC
                        SHA-512:96926B867EAEE48DB8CD40769DC1BF8B56EA9754BEB7F4DAFDCE6B465223C6BBAB7BC30CDBA6E75EDC17E94F1B7E755F844DD12C0873614B76E3D275A0504BB2
                        Malicious:false
                        Reputation:low
                        Preview:...@IXOS.@.....@q.&V.@.....@.....@.....@.....@.....@......&.{BA0FD81B-1EDA-4E71-B6A8-65C145924EB9}..Aplicativo..id-Processo_Z5TGVQUK.msi.@.....@.....@.....@........&.{B7541E21-2BE3-499F-9998-2F7CA442E8A9}.....@.....@.....@.....@.......@.....@.....@.......@......Aplicativo......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]....ProcessComponents%.Atualizando o registro de componentes..&.{1F583AF6-1185-43DC-BB41-836CBDF19080}&.{BA0FD81B-1EDA-4E71-B6A8-65C145924EB9}.@......&.{072CB05F-3AAD-4CC1-BB4C-62C553E4C9B5}&.{BA0FD81B-1EDA-4E71-B6A8-65C145924EB9}.@......&.{47531199-9826-4319-BA3E-EA048B06AF83}&.{BA0FD81B-1EDA-4E71-B6A8-65C145924EB9}.@......&.{4D99D46F-0300-4678-8F3E-2EC9608A4DA7}&.{BA0FD81B-1EDA-4E71-B6A8-65C145924EB9}.@......&.{993A2C72-8D4E-4B12-B112-6301C4919ECE}&.{BA0FD81B-1EDA-4E71-B6A8-65C145924EB9}.@........CreateFolders..Criando novas pastas..Pasta: [1]".!.C:\Users\user\AppData\Roaming\.@..............0......
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):545520
                        Entropy (8bit):6.642012114737864
                        Encrypted:false
                        SSDEEP:12288:B1cJxwt3tq5aDuumpb4kzEptIrZ+gRDmlsJtZ2IlwJb4:3t3gkDjmOtmZ+gRDssXFuJM
                        MD5:B7665D2B57D78BA73A91F63D8C4409E8
                        SHA1:CD85F91FD1A9A5119BB06BF53ED39242AE1606EB
                        SHA-256:4E3A2EFE25C0C1F9771E113C357728E2DA8FDA16C1D566385DD7CA82D5986481
                        SHA-512:A9D6A51B37BF584DC7165AB70C2A1158D8F2BEE5F3F6A8ED7B4F5690B2C24C1A1FDA32C7EB0DBAFDF1EDC32C8A04C4483BA74D46DC174165B0E5833146F8F0DB
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 4%
                        • Antivirus: Virustotal, Detection: 3%, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........P..L1r.L1r.L1r.*^..M1r.XZt.M1r.XZs.\1r. Es.N1r.EI.U1r.L1s..0r. Ew.Y1r. Ev.@1r. Eq.G1r..Ev..1r..E..M1r..Ep.M1r.RichL1r.........PE..L.....b.....................~....................@......................................@..................................7..|....................6...R...`...?..p2..T....................3.......2..@...............<............................text............................... ..`.rdata...H.......J..................@..@.data.... ...P.......2..............@....rsrc...............................@..@.reloc...?...`...@..................@..B........................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):20227584
                        Entropy (8bit):7.995215454914083
                        Encrypted:true
                        SSDEEP:393216:tK39yHzLrSA53vTt2xghTT7fTR8vEhxb5IP6Lh5x8d/v:s3xy3v8yTPfTfhxtrl8
                        MD5:F25AC9B4044A7B5B728549AE3C22AB31
                        SHA1:4CD8EA645946B40316080BABCD2D5FB8EEA55376
                        SHA-256:91A66915577BC72087251822B2DB16F4F2BEBB8323D6F9D2071547968DEAC360
                        SHA-512:901C5C26297B6E581DBE996D24C8C08E27834E321844523B4C25528C903DA159C7DCA531EDCC014906C10233B1794A4E94B31DC22902A770E95A90D79D8B3A35
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 25%
                        • Antivirus: Virustotal, Detection: 16%, Browse
                        Reputation:low
                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L......c..................6...........t.......7...@..........................@............@..........................,n......WZ.h............................0........................................................T.....H.Z......................text.....6......................... ..`.itext...&....6..................... ..`.data.........7.....................@....bss.....z... 8..........................idata..f8....8.....................@....didata.h.....8.....................@....edata........8.....................@..@.rdata..E.....9.....................@..@.4rj.....v....9..................... ..`.sJZ..........T.....................@....X*u.... .4...T...4................. ..`.reloc.......0........4.............@..B....................................................................................@..@........................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):76152
                        Entropy (8bit):6.765545830906817
                        Encrypted:false
                        SSDEEP:1536:L2HuqvERNjBwySXtVaSvrgOFw9RxKMniecbCerlLi:L2HZMRNjKySdLcOiHiecbCerhi
                        MD5:AFA8FB684EDED0D4CA6AA03AEBEA446F
                        SHA1:98BBB8543D4B3FBECEBB952037ADB0F9869A63A5
                        SHA-256:44DE8D0DC9994BFF357344C44F12E8BFFF8150442F7CA313298B98E6C23A588E
                        SHA-512:6669EEC07269002C881467D4F4AF82E5510928EA32CE79A7B1F51A71BA9567E8D99605C5BC86F940A7B70231D70638AEB2F6C2397EF197BD4C28F5E9FAD40312
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: Aplicativo seguro Windows.msi, Detection: malicious, Browse
                        • Filename: tmp8765.tmp.zip, Detection: malicious, Browse
                        • Filename: YeMuOJ7Q47.doc, Detection: malicious, Browse
                        • Filename: rrI0OyGbCB.exe, Detection: malicious, Browse
                        • Filename: cc.exe, Detection: malicious, Browse
                        • Filename: RYUSUdTh3G.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................{.........i.............................................................Rich....................PE..L...+.-a.........."!.........................................................@............@A......................................... ..................x#...0.......#..8............................#..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {B7541E21-2BE3-499F-9998-2F7CA442E8A9}, Number of Words: 10, Subject: Aplicativo, Author: Seguro, Name of Creating Application: Aplicativo, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Aplicativo., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                        Category:dropped
                        Size (bytes):21580800
                        Entropy (8bit):7.978077185143596
                        Encrypted:false
                        SSDEEP:393216:7yM3rDafPgizvn5b2BBpyKX5I/sqk8BoQLH5+/OoA5KdzyXy:OMben5b2NT5gsq6QLZIvd
                        MD5:3A46EBF8434C2742761F1E80CE621910
                        SHA1:8B04F7C51284EF28AF70C9E717A6A6E24F0421F0
                        SHA-256:A94CD3F5E620657B26E844D37DB508F08DA960E168345E1DABD31D047E2CB924
                        SHA-512:4128F080FE3D50C13EA4BAEB738B507E656C55C3D2F14B20490A76B3F75C22B0F51869A4D2EE510B8C82D68E390F78C3BAC77A7B9022F3EFECAAAD590209CCA4
                        Malicious:false
                        Preview:......................>...................J...................................F.......b.......o.......................................p.......<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...{...|...}...~...................................................................................................................<...........!...3............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...4...2...;...?...5...6...7...8...9...:...E...=.......>.......@...A...B...C...D...............H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):570784
                        Entropy (8bit):6.450187144191945
                        Encrypted:false
                        SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                        MD5:DB7612F0FD6408D664185CFC81BEF0CB
                        SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                        SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                        SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):570784
                        Entropy (8bit):6.450187144191945
                        Encrypted:false
                        SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                        MD5:DB7612F0FD6408D664185CFC81BEF0CB
                        SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                        SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                        SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):570784
                        Entropy (8bit):6.450187144191945
                        Encrypted:false
                        SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                        MD5:DB7612F0FD6408D664185CFC81BEF0CB
                        SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                        SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                        SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):570784
                        Entropy (8bit):6.450187144191945
                        Encrypted:false
                        SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                        MD5:DB7612F0FD6408D664185CFC81BEF0CB
                        SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                        SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                        SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):2298
                        Entropy (8bit):5.248748498226518
                        Encrypted:false
                        SSDEEP:24:sgDhJd4xNVclTi6OZhEu6ANP17asqXwjKchCdwLItcNkftcx/6+zPgP4VkUnycOI:seBA4A1dq9X5GUB+s+Ei4AX6Avz
                        MD5:6444512D5A958275BE9C2E667649D08E
                        SHA1:12DCC6FD61C797066D45A8685CF56E4E38B6872D
                        SHA-256:75602E0E2A0B1FA004E6D0633C358EFEFD6C5AB8B625A3A0011C5B2621A665B4
                        SHA-512:9C8691185FC9AF829928C2CFBC926AED1F1590F231F6CB729C91B903AFA320D89E756F38EC55A6756946DE3FDD50EF237A487F83B34664405B8414BAC17FEE45
                        Malicious:false
                        Preview:...@IXOS.@.....@q.&V.@.....@.....@.....@.....@.....@......&.{BA0FD81B-1EDA-4E71-B6A8-65C145924EB9}..Aplicativo..id-Processo_Z5TGVQUK.msi.@.....@.....@.....@........&.{B7541E21-2BE3-499F-9998-2F7CA442E8A9}.....@.....@.....@.....@.......@.....@.....@.......@......Aplicativo......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]...@.......@........ProcessComponents%.Atualizando o registro de componentes...@.....@.....@.]....&.{1F583AF6-1185-43DC-BB41-836CBDF19080}!.C:\Users\user\AppData\Roaming\.@.......@.....@.....@......&.{072CB05F-3AAD-4CC1-BB4C-62C553E4C9B5}&.01:\Software\Seguro\Aplicativo\Version.@.......@.....@.....@......&.{47531199-9826-4319-BA3E-EA048B06AF83}5.C.:.\.U.s.e.r.s.\.a.l.f.r.e.d.o.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.A.P.L.I.C.A.....O. .S.E.G.U.R.A...e.x.e..@.......@.....@.....@......&.{4D99D46F-0300-4678-8F3E-2EC9608A4DA7}-.C:\Users\user\AppData\Roaming\shfolder.dll.@.......@.....@.....@......&.{993A2C72
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):1.1699962096805367
                        Encrypted:false
                        SSDEEP:12:JSbX72FjXAGiLIlHVRpDh/7777777777777777777777777vDHFyEHXoY5Ml0i8Q:JRQI5nf3djF
                        MD5:DF2BB68CC2ECAFBC73367B48D35FA50D
                        SHA1:ED356593BFC1F72E4BD61E824DDD738A154D206C
                        SHA-256:F560D23C5E05D03A32F5138F923AA4B7DF42131FFBE2BD42FD7E2A3F6F857A77
                        SHA-512:00F5BDD22030D7BE634CEC2F84DD7C2CB2CDB12C8117800DB096AA74F282058494AA3FE879A4226C5FAE76A0A816C01A971C59144EDF0FC762A3CB3552B32660
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):1.5080947078948836
                        Encrypted:false
                        SSDEEP:48:SQ8PhluRc06WXJcnT5PYAESpAE1CyjMHCxSdTlw:S/hl1/nTRXEnyC0Mix3
                        MD5:2CBC5A3441A7BCF994559000CB4141BD
                        SHA1:338BD4AEE55FF1C4AE8C065218BC1138FABFADA4
                        SHA-256:E8FE75E10C8055C4FE98517E828C1A8D139E8D436664B54584F8512C6B475CE4
                        SHA-512:90150C1C93D720F165175303EE27F70EE1BC18B47F978969F14CE6E2826CF29207565471D17A5E14D27DDF4798C7E29A249E7220BBD3556E19FCF0659D2DACA4
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):323399
                        Entropy (8bit):5.3926403023367016
                        Encrypted:false
                        SSDEEP:3072:TZm8NfjtKEXD/98zObewGTR/qvvnrcm1G0xw5cyqq173c0t82xthfiqiTxZOQb7B:sEXD/98zObewGTR/qspTUz9
                        MD5:C904BC3F85E8654B1DC34F9412290713
                        SHA1:9DDB66A4DB647F345EBBD84200917771C197C54A
                        SHA-256:2D8FBB303CE93E2F5632FF246E8FA280C722FF3A77FAD71F303364830848C5BE
                        SHA-512:E0B1A1FC9A36467E06BCD59AD54AD91C8EEB95EAD7DBCA810A0409F77150C11364A0FE7DA0E88F4059B4722BDA27BC5EE30B2449C9045C2A0712EFAE2B941D61
                        Malicious:false
                        Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..03/19/2019 06:29:48.034 [4768]: Command line: D:\wd\compilerTemp\BMT.thr2gc0c.r44\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..03/19/2019 06:29:48.065 [4768]: Executing command from offline queue: install "System.IdentityModel.Selectors, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:3..03/19/2019 06:29:48.065 [4768]: Exclusion list entry found for System.IdentityModel.Selectors, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil; it will not be installed..03/19/2019 06:29:48.065 [4768]: Executing command from offline queue: install "System.AddIn.Contract, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b03f5f7f11d50a3a, processorArchitecture=msil" /NoDependencies /queue:3..03/19/2019 06:29:48.065 [4768]: Exclusion
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):512
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3::
                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                        Malicious:false
                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):1.5080947078948836
                        Encrypted:false
                        SSDEEP:48:SQ8PhluRc06WXJcnT5PYAESpAE1CyjMHCxSdTlw:S/hl1/nTRXEnyC0Mix3
                        MD5:2CBC5A3441A7BCF994559000CB4141BD
                        SHA1:338BD4AEE55FF1C4AE8C065218BC1138FABFADA4
                        SHA-256:E8FE75E10C8055C4FE98517E828C1A8D139E8D436664B54584F8512C6B475CE4
                        SHA-512:90150C1C93D720F165175303EE27F70EE1BC18B47F978969F14CE6E2826CF29207565471D17A5E14D27DDF4798C7E29A249E7220BBD3556E19FCF0659D2DACA4
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):0.07570469176594281
                        Encrypted:false
                        SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOLkXgTHIMoY/toVky6lM:2F0i8n0itFzDHFyEHXoY5M
                        MD5:A9D4A4CCDA68062084C01B9877814F56
                        SHA1:1E359740ADDE23F45E2AAFBEB55DABB0D47351E8
                        SHA-256:DDE5E6A139DD48A6DD89243659B386F10311D569245491460F532CD381501C9B
                        SHA-512:C25E7DA692819A8E6955DC9337802931FA7C241CCE39F751496EA7F128FC58A34638242A24F5D204DC32CE36DEECD6DC107C341F57C25206AD23C7662032FD4F
                        Malicious:false
                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):1.2127716385162661
                        Encrypted:false
                        SSDEEP:48:M9kduLM+CFXJzT5JYAESpAE1CyjMHCxSdTlw:MSdpLTfXEnyC0Mix3
                        MD5:CC1389A02D455CF9F396C800E11EF5B6
                        SHA1:25B8C363629815AA8990330E9F968D0613C03D3C
                        SHA-256:FA6A423B3BA22F2FE13386C42300934F3B0CA4D0500C41CE172F4C3BA02F32E7
                        SHA-512:16E0F7BACCD719951D2641422FACE05DAE78A7303125307644B13528F389516927D0D21EB343EE105BB4DB5492F67026C31219D361DFF3C7303886B330ED8B97
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):73728
                        Entropy (8bit):0.11601173663107023
                        Encrypted:false
                        SSDEEP:24:YXwCiIdTx2wipV2a2wipV2SAEV2yjCyjMHVawGh8G+0kWQ:2w2TzSrSpAE1CyjMHCtrY
                        MD5:4D9937BA78F45AA104D838D26F06AB2B
                        SHA1:21651E88865AC11FDD881B544712B86D051ED1D4
                        SHA-256:9F2A2A8DBD6DBD2F305AA06E819E3F9948E0FA3BA91F21CB6A472D9FB05A3359
                        SHA-512:1B6FA2D9BEE1F795941033D45B4953BE36D62444E518606ED4FEE62CE679D66B2DC63E4A9FA804EFFE238E24D0610D780665A99893DBE7BC4B561F2A9B7C1735
                        Malicious:false
                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):1.2127716385162661
                        Encrypted:false
                        SSDEEP:48:M9kduLM+CFXJzT5JYAESpAE1CyjMHCxSdTlw:MSdpLTfXEnyC0Mix3
                        MD5:CC1389A02D455CF9F396C800E11EF5B6
                        SHA1:25B8C363629815AA8990330E9F968D0613C03D3C
                        SHA-256:FA6A423B3BA22F2FE13386C42300934F3B0CA4D0500C41CE172F4C3BA02F32E7
                        SHA-512:16E0F7BACCD719951D2641422FACE05DAE78A7303125307644B13528F389516927D0D21EB343EE105BB4DB5492F67026C31219D361DFF3C7303886B330ED8B97
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):1.2127716385162661
                        Encrypted:false
                        SSDEEP:48:M9kduLM+CFXJzT5JYAESpAE1CyjMHCxSdTlw:MSdpLTfXEnyC0Mix3
                        MD5:CC1389A02D455CF9F396C800E11EF5B6
                        SHA1:25B8C363629815AA8990330E9F968D0613C03D3C
                        SHA-256:FA6A423B3BA22F2FE13386C42300934F3B0CA4D0500C41CE172F4C3BA02F32E7
                        SHA-512:16E0F7BACCD719951D2641422FACE05DAE78A7303125307644B13528F389516927D0D21EB343EE105BB4DB5492F67026C31219D361DFF3C7303886B330ED8B97
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):1.5080947078948836
                        Encrypted:false
                        SSDEEP:48:SQ8PhluRc06WXJcnT5PYAESpAE1CyjMHCxSdTlw:S/hl1/nTRXEnyC0Mix3
                        MD5:2CBC5A3441A7BCF994559000CB4141BD
                        SHA1:338BD4AEE55FF1C4AE8C065218BC1138FABFADA4
                        SHA-256:E8FE75E10C8055C4FE98517E828C1A8D139E8D436664B54584F8512C6B475CE4
                        SHA-512:90150C1C93D720F165175303EE27F70EE1BC18B47F978969F14CE6E2826CF29207565471D17A5E14D27DDF4798C7E29A249E7220BBD3556E19FCF0659D2DACA4
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):512
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3::
                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                        Malicious:false
                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):512
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3::
                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                        Malicious:false
                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):512
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3::
                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                        Malicious:false
                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):512
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3::
                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                        Malicious:false
                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {B7541E21-2BE3-499F-9998-2F7CA442E8A9}, Number of Words: 10, Subject: Aplicativo, Author: Seguro, Name of Creating Application: Aplicativo, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Aplicativo., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                        Entropy (8bit):7.978077185143596
                        TrID:
                        • Microsoft Windows Installer (77509/1) 52.18%
                        • Windows SDK Setup Transform Script (63028/2) 42.43%
                        • Generic OLE2 / Multistream Compound File (8008/1) 5.39%
                        File name:id-Processo_Z5TGVQUK.msi
                        File size:21580800
                        MD5:3a46ebf8434c2742761f1e80ce621910
                        SHA1:8b04f7c51284ef28af70c9e717a6a6e24f0421f0
                        SHA256:a94cd3f5e620657b26e844d37db508f08da960e168345e1dabd31d047e2cb924
                        SHA512:4128f080fe3d50c13ea4baeb738b507e656c55c3d2f14b20490a76b3f75c22b0f51869a4d2ee510b8c82d68e390f78c3bac77a7b9022f3efecaaad590209cca4
                        SSDEEP:393216:7yM3rDafPgizvn5b2BBpyKX5I/sqk8BoQLH5+/OoA5KdzyXy:OMben5b2NT5gsq6QLZIvd
                        TLSH:CA273325A3CBCA32D25C02BBE469FE5D4474BE73573041E7B6F479AF48B08C291B9942
                        File Content Preview:........................>...................J...................................F.......b.......o.......................................p.......<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W..
                        Icon Hash:a2a0b496b2caca72
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 6, 2023 19:11:46.841597080 CET4971580192.168.2.3198.12.119.196
                        Jan 6, 2023 19:11:47.021487951 CET8049715198.12.119.196192.168.2.3
                        Jan 6, 2023 19:11:47.021714926 CET4971580192.168.2.3198.12.119.196
                        Jan 6, 2023 19:11:47.022723913 CET4971580192.168.2.3198.12.119.196
                        Jan 6, 2023 19:11:47.202490091 CET8049715198.12.119.196192.168.2.3
                        Jan 6, 2023 19:11:47.505646944 CET8049715198.12.119.196192.168.2.3
                        Jan 6, 2023 19:11:47.515393019 CET4971580192.168.2.3198.12.119.196
                        Jan 6, 2023 19:11:47.695420980 CET8049715198.12.119.196192.168.2.3
                        Jan 6, 2023 19:11:47.695517063 CET4971580192.168.2.3198.12.119.196
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 6, 2023 19:11:45.925894022 CET5447953192.168.2.31.1.1.1
                        Jan 6, 2023 19:11:46.831083059 CET53544791.1.1.1192.168.2.3
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 6, 2023 19:11:45.925894022 CET192.168.2.31.1.1.10x8da7Standard query (0)clientelas.is-a-caterer.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 6, 2023 19:11:46.831083059 CET1.1.1.1192.168.2.30x8da7No error (0)clientelas.is-a-caterer.com198.12.119.196A (IP address)IN (0x0001)false
                        • clientelas.is-a-caterer.com
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.349715198.12.119.19680C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe
                        TimestampkBytes transferredDirectionData
                        Jan 6, 2023 19:11:47.022723913 CET265OUTPOST /clientes/inspecionando.php HTTP/1.0
                        Connection: keep-alive
                        Content-Type: application/x-www-form-urlencoded
                        Content-Length: 0
                        Host: clientelas.is-a-caterer.com
                        Accept: text/html, */*
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
                        Jan 6, 2023 19:11:47.505646944 CET266INHTTP/1.1 200 OK
                        Date: Fri, 06 Jan 2023 18:11:47 GMT
                        Server: Apache/2.4.37 (AlmaLinux)
                        X-Powered-By: PHP/7.2.24
                        Content-Length: 0
                        Keep-Alive: timeout=5, max=100
                        Connection: Keep-Alive
                        Content-Type: text/html; charset=UTF-8


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:19:11:27
                        Start date:06/01/2023
                        Path:C:\Windows\System32\msiexec.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\id-Processo_Z5TGVQUK.msi"
                        Imagebase:0x7ff6ddbe0000
                        File size:67072 bytes
                        MD5 hash:2D9F692E71D9985F1C6237F063F6FE76
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Target ID:2
                        Start time:19:11:28
                        Start date:06/01/2023
                        Path:C:\Windows\System32\msiexec.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\msiexec.exe /V
                        Imagebase:0x7ff6ddbe0000
                        File size:67072 bytes
                        MD5 hash:2D9F692E71D9985F1C6237F063F6FE76
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Target ID:5
                        Start time:19:11:31
                        Start date:06/01/2023
                        Path:C:\Windows\SysWOW64\msiexec.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 405A35FE4080A1D43DBAF24C899E36CF
                        Imagebase:0x470000
                        File size:59904 bytes
                        MD5 hash:F9A3EEE1C3A4067702BC9A59BC894285
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Target ID:6
                        Start time:19:11:34
                        Start date:06/01/2023
                        Path:C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\APLICA O SEGURA.exe
                        Imagebase:0x890000
                        File size:545520 bytes
                        MD5 hash:B7665D2B57D78BA73A91F63D8C4409E8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Antivirus matches:
                        • Detection: 4%, ReversingLabs
                        • Detection: 3%, Virustotal, Browse
                        Reputation:low

                        No disassembly