Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Danfe2372342.msi

Overview

General Information

Sample Name:Danfe2372342.msi
Analysis ID:786219
MD5:f43a95abda2a482dcb5ffed7ed3eef70
SHA1:03488cff850e2ce03c60daaea617198bf228b9cd
SHA256:db1d955d0078b3742f10f891b52782101b01a32061cbf250ccdeb1f02beae663
Tags:msi
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Multi AV Scanner detection for dropped file
PE file contains section with special chars
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Deletes files inside the Windows folder
Drops PE files to the windows directory (C:\Windows)
Creates files inside the system directory
PE file contains sections with non-standard names
PE file contains more sections than normal
Checks for available system drives (often done to infect USB drives)
Dropped file seen in connection with other malware
Found dropped PE file which has not been started or loaded
Entry point lies outside standard sections
Abnormal high CPU Usage

Classification

  • System is w10x64
  • msiexec.exe (PID: 2148 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Danfe2372342.msi" MD5: 4767B71A318E201188A0D0A420C8B608)
  • msiexec.exe (PID: 3124 cmdline: C:\Windows\system32\msiexec.exe /V MD5: 4767B71A318E201188A0D0A420C8B608)
    • msiexec.exe (PID: 5504 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 8D67A83332D6063841652989804414D6 MD5: 12C17B5A5C2A7B97342C362CA467E9A2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Danfe2372342.msiVirustotal: Detection: 29%Perma Link
Source: C:\Users\user\AppData\Roaming\01hdjshdyeur.exeVirustotal: Detection: 25%Perma Link
Source: Binary string: d:\a01\_work\2\s\\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://ocsp.digicert.com0A
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://ocsp.digicert.com0C
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://ocsp.digicert.com0X
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://t2.symcb.com0
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: http://tl.symcd.com0&
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: https://www.advancedinstaller.com
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: https://www.thawte.com/cps0/
Source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drString found in binary or memory: https://www.thawte.com/repository0W

System Summary

barindex
Source: shfolder.dll.1.drStatic PE information: section name: .X*u
Source: Danfe2372342.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs Danfe2372342.msi
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIF717.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\51ef76.msiJump to behavior
Source: shfolder.dll.1.drStatic PE information: Number of sections : 12 > 10
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\01hdjshdyeur.exe 4E3A2EFE25C0C1F9771E113C357728E2DA8FDA16C1D566385DD7CA82D5986481
Source: C:\Windows\System32\msiexec.exeProcess Stats: CPU usage > 98%
Source: Danfe2372342.msiVirustotal: Detection: 29%
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Danfe2372342.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 8D67A83332D6063841652989804414D6
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 8D67A83332D6063841652989804414D6Jump to behavior
Source: Danfe2372342.msiStatic file information: TRID: Microsoft Windows Installer (77509/1) 52.18%
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DFB4AEBF5A8002AF55.TMPJump to behavior
Source: classification engineClassification label: mal60.winMSI@4/12@0/0
Source: Danfe2372342.msiStatic file information: File size 23694336 > 1048576
Source: Binary string: d:\a01\_work\2\s\\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.dr
Source: shfolder.dll.1.drStatic PE information: section name: .didata
Source: shfolder.dll.1.drStatic PE information: section name: .4rj
Source: shfolder.dll.1.drStatic PE information: section name: .sJZ
Source: shfolder.dll.1.drStatic PE information: section name: .X*u
Source: initial sampleStatic PE information: section where entry point is pointing to: .X*u
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF8A1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\01hdjshdyeur.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF871.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\shfolder.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\vcruntime140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF717.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF812.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF8A1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF871.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF717.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF812.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIF8A1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\01hdjshdyeur.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIF871.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\shfolder.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\vcruntime140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIF812.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Masquerading
OS Credential Dumping1
Security Software Discovery
1
Replication Through Removable Media
Data from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Peripheral Device Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
File Deletion
NTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Danfe2372342.msi30%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\01hdjshdyeur.exe25%VirustotalBrowse
C:\Users\user\AppData\Roaming\vcruntime140.dll0%VirustotalBrowse
C:\Windows\Installer\MSIF717.tmp0%VirustotalBrowse
C:\Windows\Installer\MSIF812.tmp0%VirustotalBrowse
C:\Windows\Installer\MSIF871.tmp0%VirustotalBrowse
C:\Windows\Installer\MSIF8A1.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.advancedinstaller.comDanfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drfalse
    high
    https://www.thawte.com/cps0/Danfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drfalse
      high
      https://www.thawte.com/repository0WDanfe2372342.msi, MSIF812.tmp.1.dr, 51ef76.msi.1.drfalse
        high
        No contacted IP infos
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:786219
        Start date and time:2023-01-17 22:07:13 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 32s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:Danfe2372342.msi
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:12
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal60.winMSI@4/12@0/0
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .msi
        • Exclude process from analysis (whitelisted): SgrmBroker.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com
        No simulations
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        C:\Users\user\AppData\Roaming\01hdjshdyeur.exeid-Processo_Z5TGVQUK.msiGet hashmaliciousBrowse
          id-Processo_Z5TGVQUK.msiGet hashmaliciousBrowse
            C:\Users\user\AppData\Roaming\vcruntime140.dllid-Processo_Z5TGVQUK.msiGet hashmaliciousBrowse
              id-Processo_Z5TGVQUK.msiGet hashmaliciousBrowse
                Aplicativo seguro Windows.msiGet hashmaliciousBrowse
                  tmp8765.tmp.zipGet hashmaliciousBrowse
                    YeMuOJ7Q47.docGet hashmaliciousBrowse
                      rrI0OyGbCB.exeGet hashmaliciousBrowse
                        cc.exeGet hashmaliciousBrowse
                          RYUSUdTh3G.exeGet hashmaliciousBrowse
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):545520
                            Entropy (8bit):6.642012114737864
                            Encrypted:false
                            SSDEEP:12288:B1cJxwt3tq5aDuumpb4kzEptIrZ+gRDmlsJtZ2IlwJb4:3t3gkDjmOtmZ+gRDssXFuJM
                            MD5:B7665D2B57D78BA73A91F63D8C4409E8
                            SHA1:CD85F91FD1A9A5119BB06BF53ED39242AE1606EB
                            SHA-256:4E3A2EFE25C0C1F9771E113C357728E2DA8FDA16C1D566385DD7CA82D5986481
                            SHA-512:A9D6A51B37BF584DC7165AB70C2A1158D8F2BEE5F3F6A8ED7B4F5690B2C24C1A1FDA32C7EB0DBAFDF1EDC32C8A04C4483BA74D46DC174165B0E5833146F8F0DB
                            Malicious:true
                            Antivirus:
                            • Antivirus: Virustotal, Detection: 25%, Browse
                            Joe Sandbox View:
                            • Filename: id-Processo_Z5TGVQUK.msi, Detection: malicious, Browse
                            • Filename: id-Processo_Z5TGVQUK.msi, Detection: malicious, Browse
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........P..L1r.L1r.L1r.*^..M1r.XZt.M1r.XZs.\1r. Es.N1r.EI.U1r.L1s..0r. Ew.Y1r. Ev.@1r. Eq.G1r..Ev..1r..E..M1r..Ep.M1r.RichL1r.........PE..L.....b.....................~....................@......................................@..................................7..|....................6...R...`...?..p2..T....................3.......2..@...............<............................text............................... ..`.rdata...H.......J..................@..@.data.... ...P.......2..............@....rsrc...............................@..@.reloc...?...`...@..................@..B........................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1204649155
                            Entropy (8bit):0.2556345769131746
                            Encrypted:false
                            SSDEEP:
                            MD5:E50032FA0B7A9438DB93F27A2142C858
                            SHA1:85EAD9E6124DEB103A902DB5C88FB0BC7D0BE2AE
                            SHA-256:DF2084FAF313CBFA46FC04202214C3576331B476FB5B00610FFC60EEB7028DBF
                            SHA-512:E090A320025E44F5EE487B9BCA65F634770A098D8964CADE3443CB4059F24C2F9A47EA07D39267C4B6AD5381C78611E705B12A050DA3192CA0A711670CD1777B
                            Malicious:true
                            Reputation:low
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L......c..................6...........t.......7...@..........................@............@..........................,n......WZ.h............................0........................................................T.....H.Z......................text.....6......................... ..`.itext...&....6..................... ..`.data.........7.....................@....bss.....z... 8..........................idata..f8....8.....................@....didata.h.....8.....................@....edata........8.....................@..@.rdata..E.....9.....................@..@.4rj.....v....9..................... ..`.sJZ..........T.....................@....X*u.... .4...T...4................. ..`.reloc.......0........4.............@..B....................................................................................@..@........................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):76152
                            Entropy (8bit):6.765545830906817
                            Encrypted:false
                            SSDEEP:1536:L2HuqvERNjBwySXtVaSvrgOFw9RxKMniecbCerlLi:L2HZMRNjKySdLcOiHiecbCerhi
                            MD5:AFA8FB684EDED0D4CA6AA03AEBEA446F
                            SHA1:98BBB8543D4B3FBECEBB952037ADB0F9869A63A5
                            SHA-256:44DE8D0DC9994BFF357344C44F12E8BFFF8150442F7CA313298B98E6C23A588E
                            SHA-512:6669EEC07269002C881467D4F4AF82E5510928EA32CE79A7B1F51A71BA9567E8D99605C5BC86F940A7B70231D70638AEB2F6C2397EF197BD4C28F5E9FAD40312
                            Malicious:false
                            Antivirus:
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Joe Sandbox View:
                            • Filename: id-Processo_Z5TGVQUK.msi, Detection: malicious, Browse
                            • Filename: id-Processo_Z5TGVQUK.msi, Detection: malicious, Browse
                            • Filename: Aplicativo seguro Windows.msi, Detection: malicious, Browse
                            • Filename: tmp8765.tmp.zip, Detection: malicious, Browse
                            • Filename: YeMuOJ7Q47.doc, Detection: malicious, Browse
                            • Filename: rrI0OyGbCB.exe, Detection: malicious, Browse
                            • Filename: cc.exe, Detection: malicious, Browse
                            • Filename: RYUSUdTh3G.exe, Detection: malicious, Browse
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................{.........i.............................................................Rich....................PE..L...+.-a.........."!.........................................................@............@A......................................... ..................x#...0.......#..8............................#..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {C1F62FEA-D8CD-49AE-B106-30DE4E33B9DF}, Number of Words: 10, Subject: Aplicao, Author: windows, Name of Creating Application: Aplicao, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Aplicao., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                            Category:dropped
                            Size (bytes):23694336
                            Entropy (8bit):7.775327929193499
                            Encrypted:false
                            SSDEEP:393216:UXOM3rDafPgizvn5b2BBpyKX5I/sqk8BoQLH5+/OoA5KdzyXy:wOMben5b2NT5gsq6QLZIvd
                            MD5:F43A95ABDA2A482DCB5FFED7ED3EEF70
                            SHA1:03488CFF850E2CE03C60DAAEA617198BF228B9CD
                            SHA-256:DB1D955D0078B3742F10F891B52782101B01A32061CBF250CCDEB1F02BEAE663
                            SHA-512:97A0CFB841804B232255736BE72C62BA607B0C1D5C02E896751D8B9B31EAC3E65D658B510386EE24476CD6F8794DD2AEDFF2D4A03A474D6D216A17A2EE734DC4
                            Malicious:false
                            Reputation:low
                            Preview:......................>...................j...................................F.......b.......o.......................................p.......<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...{...|...}...~...................................................................................................................<..............."...3........................................................................................... ...!...+...#...$...%...&...'...(...)...*...1...,...-......./...0...4...2...;...?...5...6...7...8...9...:...E...=.......>.......@...A...B...C...D...............H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):570784
                            Entropy (8bit):6.450187144191945
                            Encrypted:false
                            SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                            MD5:DB7612F0FD6408D664185CFC81BEF0CB
                            SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                            SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                            SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                            Malicious:true
                            Antivirus:
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):570784
                            Entropy (8bit):6.450187144191945
                            Encrypted:false
                            SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                            MD5:DB7612F0FD6408D664185CFC81BEF0CB
                            SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                            SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                            SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                            Malicious:true
                            Antivirus:
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):570784
                            Entropy (8bit):6.450187144191945
                            Encrypted:false
                            SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                            MD5:DB7612F0FD6408D664185CFC81BEF0CB
                            SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                            SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                            SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                            Malicious:true
                            Antivirus:
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):570784
                            Entropy (8bit):6.450187144191945
                            Encrypted:false
                            SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                            MD5:DB7612F0FD6408D664185CFC81BEF0CB
                            SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                            SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                            SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                            Malicious:true
                            Antivirus:
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2192
                            Entropy (8bit):5.35172934206865
                            Encrypted:false
                            SSDEEP:48:uVT0UqpA40BP7RAo/mPLS5B+WJVGBl2qAX657RV:uVTFwAJ/+jLHBlNi6R
                            MD5:E7413115DD2F9D9D80759DA5FB88C596
                            SHA1:C35DE1385E61A8BC986D06629816E962D1AD064A
                            SHA-256:DE33F85D1EB4B22F89F21B76ED21EC52D2E4276A41CC0A4E045F876C482D8960
                            SHA-512:B7D27B782633A7CFF4564EEA5DC3BD44FD32B9CC583A9F1F1EF4C243AC1D4825D9297EE9E28493B80B2EC1CE0A3ED7951E1D98AC25339914424CD8749BDBD29D
                            Malicious:false
                            Preview:...@IXOS.@.....@..1V.@.....@.....@.....@.....@.....@......&.{B2AB488E-0EA8-40AF-B78B-007F91779D57}..A.p.l.i.c.a.....o...Danfe2372342.msi.@.....@.....@.....@........&.{C1F62FEA-D8CD-49AE-B106-30DE4E33B9DF}.....@.....@.....@.....@.......@.....@.....@.......@......A.p.l.i.c.a.....o.......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]...@.......@........ProcessComponents%.Atualizando o registro de componentes...@.....@.....@.]....&.{5DA66C3E-C99A-4AB8-BDD9-67A1EF93E94F}..C:\Users\user\AppData\Roaming\.@.......@.....@.....@......&.{C83EB36A-ED7D-48B4-B60E-3410EBED3A62}&.0.1.:.\.S.o.f.t.w.a.r.e.\.w.i.n.d.o.w.s.\.A.p.l.i.c.a.....o.\.V.e.r.s.i.o.n..@.......@.....@.....@......&.{7C8D38CC-ED47-4FF8-AE09-1FEAD7B69B9D}/.C:\Users\user\AppData\Roaming\vcruntime140.dll.@.......@.....@.....@......&.{DE9041B2-B47B-4740-8035-4C0845D1D990}/.C:\Users\user\AppData\Roaming\01hdjshdyeur.exe.@.......@.....@.....@......&.{05C8B20E-9A4F-45DC-B0
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):192827
                            Entropy (8bit):5.391999202050189
                            Encrypted:false
                            SSDEEP:3072:iHHJCoX5CNWFHjkzRl1pqf5JjzH6wbxygaK8Nkv6kF8Kwu8K8uBD556GIlZZ6bFd:i0LVlAf
                            MD5:E88B84C9E571326D9EABCCB6F01EC7E9
                            SHA1:7833545A75458DF43F7C94B25D6084B8C4C8618F
                            SHA-256:1AAE7E4887BFD2C17AA12C44AF6D36E5830F95B3F114112E1B10DA8DB53BBF72
                            SHA-512:7927B7CB451291F6F4614EE28A4DC64802ABE4ED9420DC468DDF670469E0EEF35CAD42E01486F796D368510D1B052D005A6CF4D15E5E9A902DF6684376F4B3F6
                            Malicious:false
                            Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..07/23/2020 10:13:25.847 [3928]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.VisualStudio.Tools.Applications.Hosting, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 10:13:25.863 [3928]: ngen returning 0x00000000..07/23/2020 10:13:25.925 [1900]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.VisualStudio.Tools.Applications.ServerDocument, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 10:13:25.925 [1900]: ngen returning 0x00000000..07/23/2020 10:13:25.972 [4436]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.Office.Tools.v4.0.Framework, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /N
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):1.204676907491465
                            Encrypted:false
                            SSDEEP:48:si5uZI+CFXJTT5HlymSKsAEKgCyjMHk9mSKqT0bC:X5z7TTNlkC0MxM
                            MD5:781260DCEBC9CD13FFFE8211188441CC
                            SHA1:2879080E4E0055665DC2165D08DDE135DD36E4CA
                            SHA-256:1B8F6D54C4FFBCA9700E4E8332F54B9C136D454C77BBE85E34E005A81B2F2F78
                            SHA-512:CEE28965DE23A8FE76FA802D3E150EFA3B62B333A5D65C66D13B77E236B1DEA9DACA9CE66E4AEA89B6E702B704B043700CD460ABB2EDB04669FA79EB241603A3
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {C1F62FEA-D8CD-49AE-B106-30DE4E33B9DF}, Number of Words: 10, Subject: Aplicao, Author: windows, Name of Creating Application: Aplicao, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Aplicao., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                            Entropy (8bit):7.775327929193499
                            TrID:
                            • Microsoft Windows Installer (77509/1) 52.18%
                            • Windows SDK Setup Transform Script (63028/2) 42.43%
                            • Generic OLE2 / Multistream Compound File (8008/1) 5.39%
                            File name:Danfe2372342.msi
                            File size:23694336
                            MD5:f43a95abda2a482dcb5ffed7ed3eef70
                            SHA1:03488cff850e2ce03c60daaea617198bf228b9cd
                            SHA256:db1d955d0078b3742f10f891b52782101b01a32061cbf250ccdeb1f02beae663
                            SHA512:97a0cfb841804b232255736be72c62ba607b0c1d5c02e896751d8b9b31eac3e65d658b510386ee24476cd6f8794dd2aedff2d4a03a474d6d216a17a2ee734dc4
                            SSDEEP:393216:UXOM3rDafPgizvn5b2BBpyKX5I/sqk8BoQLH5+/OoA5KdzyXy:wOMben5b2NT5gsq6QLZIvd
                            TLSH:CB37D320937779D9EA27A2FFF0AC5FC48014B5F1A118EA7B73783FA589D054661B6803
                            File Content Preview:........................>...................j...................................F.......b.......o.......................................p.......<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W..
                            Icon Hash:a2a0b496b2caca72
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to jump to process

                            Target ID:0
                            Start time:22:08:04
                            Start date:17/01/2023
                            Path:C:\Windows\System32\msiexec.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Danfe2372342.msi"
                            Imagebase:0x7ff637150000
                            File size:66048 bytes
                            MD5 hash:4767B71A318E201188A0D0A420C8B608
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:1
                            Start time:22:08:04
                            Start date:17/01/2023
                            Path:C:\Windows\System32\msiexec.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\msiexec.exe /V
                            Imagebase:0x7ff637150000
                            File size:66048 bytes
                            MD5 hash:4767B71A318E201188A0D0A420C8B608
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:2
                            Start time:22:08:06
                            Start date:17/01/2023
                            Path:C:\Windows\SysWOW64\msiexec.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 8D67A83332D6063841652989804414D6
                            Imagebase:0x260000
                            File size:59904 bytes
                            MD5 hash:12C17B5A5C2A7B97342C362CA467E9A2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            No disassembly