Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Danfe2372342.msi

Overview

General Information

Sample Name:Danfe2372342.msi
Analysis ID:786219
MD5:f43a95abda2a482dcb5ffed7ed3eef70
SHA1:03488cff850e2ce03c60daaea617198bf228b9cd
SHA256:db1d955d0078b3742f10f891b52782101b01a32061cbf250ccdeb1f02beae663
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Multi AV Scanner detection for dropped file
PE file contains section with special chars
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Deletes files inside the Windows folder
Drops PE files to the windows directory (C:\Windows)
Creates files inside the system directory
PE file contains sections with non-standard names
PE file contains more sections than normal
Checks for available system drives (often done to infect USB drives)
Dropped file seen in connection with other malware
Found dropped PE file which has not been started or loaded
Entry point lies outside standard sections

Classification

  • System is w10x64native
  • msiexec.exe (PID: 2180 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Danfe2372342.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 4756 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7512 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 7CBC5917A43DB9FC3EC884BC2BB72269 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Danfe2372342.msiVirustotal: Detection: 29%Perma Link
Source: C:\Users\user\AppData\Roaming\01hdjshdyeur.exeVirustotal: Detection: 25%Perma Link
Source: Binary string: d:\a01\_work\2\s\\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.2.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.dr
Source: Binary string: D:\build\ob\bora-20089737\bora\build\build\vmnat\release\win32\vmnat.pdb source: 01hdjshdyeur.exe.2.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: d:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Danfe2372342.msi, 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: Danfe2372342.msi, 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Danfe2372342.msi, 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Danfe2372342.msi, 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: Danfe2372342.msi, 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://ocsp.digicert.com0
Source: Danfe2372342.msi, 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://ocsp.digicert.com0A
Source: Danfe2372342.msi, 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://ocsp.digicert.com0C
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://ocsp.digicert.com0L
Source: Danfe2372342.msi, 01hdjshdyeur.exe.2.dr, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://ocsp.digicert.com0X
Source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://t2.symcb.com0
Source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: http://tl.symcd.com0&
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://www.digicert.com/CPS0
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://www.vmware.com/0
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: http://www.vmware.com/0/
Source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: https://www.advancedinstaller.com
Source: 01hdjshdyeur.exe.2.drString found in binary or memory: https://www.digicert.com/CPS0
Source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: https://www.thawte.com/cps0/
Source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drString found in binary or memory: https://www.thawte.com/repository0W

System Summary

barindex
Source: shfolder.dll.2.drStatic PE information: section name: .X*u
Source: Danfe2372342.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs Danfe2372342.msi
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI4D6F.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5d4736.msiJump to behavior
Source: shfolder.dll.2.drStatic PE information: Number of sections : 12 > 10
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\01hdjshdyeur.exe 4E3A2EFE25C0C1F9771E113C357728E2DA8FDA16C1D566385DD7CA82D5986481
Source: Danfe2372342.msiVirustotal: Detection: 29%
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Danfe2372342.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 7CBC5917A43DB9FC3EC884BC2BB72269
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 7CBC5917A43DB9FC3EC884BC2BB72269Jump to behavior
Source: Danfe2372342.msiStatic file information: TRID: Microsoft Windows Installer (77509/1) 52.18%
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\InstallerJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DFB7F8F828D868ABC4.TMPJump to behavior
Source: classification engineClassification label: mal60.winMSI@4/12@0/0
Source: Danfe2372342.msiStatic file information: File size 23694336 > 1048576
Source: Binary string: d:\a01\_work\2\s\\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.2.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.dr
Source: Binary string: D:\build\ob\bora-20089737\bora\build\build\vmnat\release\win32\vmnat.pdb source: 01hdjshdyeur.exe.2.dr
Source: shfolder.dll.2.drStatic PE information: section name: .didata
Source: shfolder.dll.2.drStatic PE information: section name: .4rj
Source: shfolder.dll.2.drStatic PE information: section name: .sJZ
Source: shfolder.dll.2.drStatic PE information: section name: .X*u
Source: initial sampleStatic PE information: section where entry point is pointing to: .X*u
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4E6A.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\vcruntime140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4ED9.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4D6F.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4F38.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\01hdjshdyeur.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\shfolder.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4E6A.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4ED9.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4D6F.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI4F38.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI4E6A.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\vcruntime140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI4ED9.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI4F38.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\01hdjshdyeur.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\shfolder.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMware
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMnet8
Source: 01hdjshdyeur.exe.2.drBinary or memory string: acpiacpiGPEahciaioaioGenericaioHttpaioKernelaioMgraioWin32aioWin32CompletionamdIommuappstateassignHwasyncsocketatapiCdromauthenticodeautomationAVCapturebackdoorbarrierbatteryblitbrtalkbuslogicbuslogicMdevbuttoncdromcheckpointchecksumchipsetcmoscptOpscpucountCpuidInfocrc32crtboracuidataCachedataSetsMgrdataSetsStoredeviceGroupdevicePowerOndeviceSwapdeviceThreaddictdigestlibdirectBootdiskdisklibdiskVmnixdmadmgdnddockerduiduiDevicesduiLocalizationduiMKSduiProxyAppsdumperdvxe1000efinvefivarstoreehcienableDetTimerepdextcfgdevicefakeDmafiltlibFiltLibTestLogflashramfloppyfsresxftConfigftcptgmmgpumgmtgrainTrackgrmguestAppMonitorguestInstallguest_msgguest_rpcguestVarsguiguiWin32HeaphbaCommonhbrhdaudiohdaudio_alsahgfshgfsServerhidQueuehostctlhostonlyhpethttpich7minputdevtapipcipcMgrkeyboardkeymapkeypersistlargepagelibconnectlicensellclsilogiclwdFiltermacbwmacfimacfiltermachPollmaclatencymainmainMemmainMemReplayCheckmasReceiptmemoryHotplugmemspacemigratemigrateVMmirrormksmksBasicOpsmksClientmksControlmksCursorPositionmksDX11WindowmksDX11RenderermksDX11BasicmksDX11ResourceViewmksDX11ShimOpsmksFramemksGLBasicmksGLContextMuxmksGLDrawmksGLFBOmksGLManagermksGLQuerymksGLShadermksGLStatemksGLTextureViewmksGLWindowmksHostCursormksInputmksKeyboardmksMousemksMTLRenderermksRenderOpsmksServermksSWBmksVulkanRenderermksVulkanCmdsmksWinBSODmormstatmvncnamespaceDbnamespaceMgrnetPktnumanumaHostnvdimmnvmenvramMgrobjcobjliboemDeviceopNotificationopromovhdmemparallelpassthroughpcipcibridgepci_e1000pci_ehcipci_hdaudiopci_hyperpciPassthrupciPluginpci_scsipci_svgapci_uhcipci_videpci_vlancepci_vmcipci_vmxnet3pci_xhcipmemobjpollprecisionclockpromotediskpvnvrampvscsiqatremoteDevicereplayVMXsbxscsisecureBootserialserviceImplserviceUsersgsgxsgxmpasgxRegistrationToolshadersharedFolderMgrshim3DslotfssmbiossmcsmramsnapshotsoundsparseCheckersslstate3dstatssvgasvgadevtapsvga_rectsyncWaitQtarReadertimertoolstoolsIsotoolsversiontpm2emutpm2VerificationtxtudpfecuhciundopointunityMsgupitbeupitdusbusb_xhciutiluwtvaBasicOpsvcpuhotplugvcpuNUMAvdfsvdfs_9pvdpPluginvdtiPciCfgSpcvflashvgavideviewClientvigorviommuvlancevmcfvmcivmgencvmGLvmhsvmIPCvmkcfgvmkEventvmkmgmtlibvmLockvmmousevmnamevmnetBridgevmOvhdvmUpsellControllervmvavmWindowControllervmxnetvmxnet3vmxvmdbCallbacksvncBlitvncDecodevncEncodevncServervncServerOSvnetvprobeVProbeClientvrdmavsanobjvsockvsockProxyvthreadvtpmvuivusbaudiovusbccidvusbhidvusbkeyboardvusbmousevusbrngvusbtabletvusbvideovvolbevvtdvwdtwifiwin32utilworkerxpmode
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMware NAT
Source: 01hdjshdyeur.exe.2.drBinary or memory string: hgfsServer
Source: 01hdjshdyeur.exe.2.drBinary or memory string: http://www.vmware.com/0
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMware NAT Panic: %s
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMware, Inc.1!0
Source: 01hdjshdyeur.exe.2.drBinary or memory string: `%s' is not VMware network device (cannot set VMnet number)
Source: 01hdjshdyeur.exe.2.drBinary or memory string: \\.\Global\VMnetUserif
Source: 01hdjshdyeur.exe.2.drBinary or memory string: System\CurrentControlSet\services\Tcpip\ParametersDomainDhcpDomainSearchListretriespolicyrotateburstrecursiveEnablenameserver1nameserver2nameserver3localdomain\SYSTEM\CurrentControlSet\Services\VMware NAT Service\ParametersConfigPathVMwarebora\lib\string\str.c%s:%d Buffer too small
Source: 01hdjshdyeur.exe.2.drBinary or memory string: pci_vmci
Source: 01hdjshdyeur.exe.2.drBinary or memory string: device\\.\Global\VMnetUserifNot enough memory for vmnet watch
Source: 01hdjshdyeur.exe.2.drBinary or memory string: FileDescriptionVMware NAT ServiceL
Source: 01hdjshdyeur.exe.2.drBinary or memory string: Unable to setup receive event for vmnet.
Source: 01hdjshdyeur.exe.2.drBinary or memory string: Not enough memory for vmnet polling
Source: 01hdjshdyeur.exe.2.drBinary or memory string: http://www.vmware.com/0/
Source: 01hdjshdyeur.exe.2.drBinary or memory string: SYSTEM\CurrentControlSet\Services\VMware NAT Service\Parameters
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMware, Inc.1
Source: 01hdjshdyeur.exe.2.drBinary or memory string: <description>"VMware NAT Service"</description>
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMware NAT Service
Source: 01hdjshdyeur.exe.2.drBinary or memory string: Not enough memory for vmnet watch
Source: 01hdjshdyeur.exe.2.drBinary or memory string: ProductNameVMware WorkstationP
Source: 01hdjshdyeur.exe.2.drBinary or memory string: vmmouse
Source: 01hdjshdyeur.exe.2.drBinary or memory string: vmnetnat-mac.txtMACVMnet8Error with host MAC configuration parameter in configuration file.
Source: 01hdjshdyeur.exe.2.drBinary or memory string: `%s' is not a VMware network device (cannot set interface flags)
Source: 01hdjshdyeur.exe.2.drBinary or memory string: 252-TCP segments sent to vmnet: %d
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMware NATSTATICvh%08Xvirtual.localhost240-ICMP ECHO NAT table
Source: 01hdjshdyeur.exe.2.drBinary or memory string: name="VMware.VMware.vmnat"
Source: 01hdjshdyeur.exe.2.drBinary or memory string: noreply@vmware.com0
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMnet
Source: 01hdjshdyeur.exe.2.drBinary or memory string: `%s' is not a VMware network device (cannot get MAC address)
Source: 01hdjshdyeur.exe.2.drBinary or memory string: `%s' is not VMware network device (cannot set MAC address)
Source: 01hdjshdyeur.exe.2.drBinary or memory string: CompanyNameVMware, Inc.N
Source: 01hdjshdyeur.exe.2.drBinary or memory string: vmnetnat-mac.txt
Source: 01hdjshdyeur.exe.2.drBinary or memory string: vmnet
Source: 01hdjshdyeur.exe.2.drBinary or memory string: nbnsTimeoutnetbiosnbnsRetriesnbdsTimeoutwpadresetConnectionOnLinkDownVMware NAT ServiceBad service requestHandler not installedService startedStopping the NAT service.
Source: 01hdjshdyeur.exe.2.drBinary or memory string: 251-fd %u, from %u.%u.%u.%u/%u to %u.%u.%u.%u/%u state %d251-fd %u, from %s/%u to %s?%u state %d252-TCP segments sent to vmnet: %d
Source: 01hdjshdyeur.exe.2.drBinary or memory string: vmnetBridge
Source: 01hdjshdyeur.exe.2.drBinary or memory string: vmnetnat.conf
Source: 01hdjshdyeur.exe.2.drBinary or memory string: hostMACVMware NAT Panic: %s
Source: 01hdjshdyeur.exe.2.drBinary or memory string: # VMnet device if not specified on command line
Source: 01hdjshdyeur.exe.2.drBinary or memory string: SkBuff_Push_undernatIp6EnablehostvmnetnatIp6Prefixfe80::250:56ff:fe%02x:2222fd15:4ba5:5a2b:10%02x::2222fd15:4ba5:5a2b:10%02x::2222fe80::250:56ff:fec0:2222vmnetnat.confUsage: %s [-D] [-c configfile] [-d pidfile] [-m macfile]
Source: 01hdjshdyeur.exe.2.drBinary or memory string: 1998-2022 VMware, Inc.<
Source: 01hdjshdyeur.exe.2.drBinary or memory string: VMnet`%s' is not VMware network device (cannot set VMnet number)
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Masquerading
OS Credential Dumping11
Security Software Discovery
1
Replication Through Removable Media
Data from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Peripheral Device Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
File Deletion
NTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Danfe2372342.msi30%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\01hdjshdyeur.exe25%VirustotalBrowse
C:\Users\user\AppData\Roaming\vcruntime140.dll0%VirustotalBrowse
C:\Windows\Installer\MSI4D6F.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.vmware.com/0/01hdjshdyeur.exe.2.drfalse
    high
    https://www.advancedinstaller.comDanfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drfalse
      high
      http://www.vmware.com/001hdjshdyeur.exe.2.drfalse
        high
        https://www.thawte.com/cps0/Danfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drfalse
          high
          https://www.thawte.com/repository0WDanfe2372342.msi, MSI4D6F.tmp.2.dr, MSI4E6A.tmp.2.dr, MSI4ED9.tmp.2.dr, MSI4F38.tmp.2.dr, 5d4736.msi.2.drfalse
            high
            No contacted IP infos
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:786219
            Start date and time:2023-01-17 22:14:41 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 13m 48s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:Danfe2372342.msi
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
            Run name:Suspected Instruction Hammering
            Number of analysed new started processes analysed:8
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal60.winMSI@4/12@0/0
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .msi
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): dllhost.exe, UserOOBEBroker.exe, backgroundTaskHost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, tile-service.weather.microsoft.com
            No simulations
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            C:\Users\user\AppData\Roaming\01hdjshdyeur.exeid-Processo_Z5TGVQUK.msiGet hashmaliciousBrowse
              id-Processo_Z5TGVQUK.msiGet hashmaliciousBrowse
                C:\Users\user\AppData\Roaming\vcruntime140.dllid-Processo_Z5TGVQUK.msiGet hashmaliciousBrowse
                  id-Processo_Z5TGVQUK.msiGet hashmaliciousBrowse
                    Aplicativo seguro Windows.msiGet hashmaliciousBrowse
                      tmp8765.tmp.zipGet hashmaliciousBrowse
                        YeMuOJ7Q47.docGet hashmaliciousBrowse
                          rrI0OyGbCB.exeGet hashmaliciousBrowse
                            cc.exeGet hashmaliciousBrowse
                              RYUSUdTh3G.exeGet hashmaliciousBrowse
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):545520
                                Entropy (8bit):6.642012114737864
                                Encrypted:false
                                SSDEEP:12288:B1cJxwt3tq5aDuumpb4kzEptIrZ+gRDmlsJtZ2IlwJb4:3t3gkDjmOtmZ+gRDssXFuJM
                                MD5:B7665D2B57D78BA73A91F63D8C4409E8
                                SHA1:CD85F91FD1A9A5119BB06BF53ED39242AE1606EB
                                SHA-256:4E3A2EFE25C0C1F9771E113C357728E2DA8FDA16C1D566385DD7CA82D5986481
                                SHA-512:A9D6A51B37BF584DC7165AB70C2A1158D8F2BEE5F3F6A8ED7B4F5690B2C24C1A1FDA32C7EB0DBAFDF1EDC32C8A04C4483BA74D46DC174165B0E5833146F8F0DB
                                Malicious:true
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 25%, Browse
                                Joe Sandbox View:
                                • Filename: id-Processo_Z5TGVQUK.msi, Detection: malicious, Browse
                                • Filename: id-Processo_Z5TGVQUK.msi, Detection: malicious, Browse
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........P..L1r.L1r.L1r.*^..M1r.XZt.M1r.XZs.\1r. Es.N1r.EI.U1r.L1s..0r. Ew.Y1r. Ev.@1r. Eq.G1r..Ev..1r..E..M1r..Ep.M1r.RichL1r.........PE..L.....b.....................~....................@......................................@..................................7..|....................6...R...`...?..p2..T....................3.......2..@...............<............................text............................... ..`.rdata...H.......J..................@..@.data.... ...P.......2..............@....rsrc...............................@..@.reloc...?...`...@..................@..B........................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):1204649155
                                Entropy (8bit):0.2556345769131746
                                Encrypted:false
                                SSDEEP:
                                MD5:E50032FA0B7A9438DB93F27A2142C858
                                SHA1:85EAD9E6124DEB103A902DB5C88FB0BC7D0BE2AE
                                SHA-256:DF2084FAF313CBFA46FC04202214C3576331B476FB5B00610FFC60EEB7028DBF
                                SHA-512:E090A320025E44F5EE487B9BCA65F634770A098D8964CADE3443CB4059F24C2F9A47EA07D39267C4B6AD5381C78611E705B12A050DA3192CA0A711670CD1777B
                                Malicious:true
                                Reputation:low
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L......c..................6...........t.......7...@..........................@............@..........................,n......WZ.h............................0........................................................T.....H.Z......................text.....6......................... ..`.itext...&....6..................... ..`.data.........7.....................@....bss.....z... 8..........................idata..f8....8.....................@....didata.h.....8.....................@....edata........8.....................@..@.rdata..E.....9.....................@..@.4rj.....v....9..................... ..`.sJZ..........T.....................@....X*u.... .4...T...4................. ..`.reloc.......0........4.............@..B....................................................................................@..@........................................................
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):76152
                                Entropy (8bit):6.765545830906817
                                Encrypted:false
                                SSDEEP:1536:L2HuqvERNjBwySXtVaSvrgOFw9RxKMniecbCerlLi:L2HZMRNjKySdLcOiHiecbCerhi
                                MD5:AFA8FB684EDED0D4CA6AA03AEBEA446F
                                SHA1:98BBB8543D4B3FBECEBB952037ADB0F9869A63A5
                                SHA-256:44DE8D0DC9994BFF357344C44F12E8BFFF8150442F7CA313298B98E6C23A588E
                                SHA-512:6669EEC07269002C881467D4F4AF82E5510928EA32CE79A7B1F51A71BA9567E8D99605C5BC86F940A7B70231D70638AEB2F6C2397EF197BD4C28F5E9FAD40312
                                Malicious:false
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Joe Sandbox View:
                                • Filename: id-Processo_Z5TGVQUK.msi, Detection: malicious, Browse
                                • Filename: id-Processo_Z5TGVQUK.msi, Detection: malicious, Browse
                                • Filename: Aplicativo seguro Windows.msi, Detection: malicious, Browse
                                • Filename: tmp8765.tmp.zip, Detection: malicious, Browse
                                • Filename: YeMuOJ7Q47.doc, Detection: malicious, Browse
                                • Filename: rrI0OyGbCB.exe, Detection: malicious, Browse
                                • Filename: cc.exe, Detection: malicious, Browse
                                • Filename: RYUSUdTh3G.exe, Detection: malicious, Browse
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................{.........i.............................................................Rich....................PE..L...+.-a.........."!.........................................................@............@A......................................... ..................x#...0.......#..8............................#..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {C1F62FEA-D8CD-49AE-B106-30DE4E33B9DF}, Number of Words: 10, Subject: Aplicao, Author: windows, Name of Creating Application: Aplicao, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Aplicao., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                Category:dropped
                                Size (bytes):23694336
                                Entropy (8bit):7.775327929193499
                                Encrypted:false
                                SSDEEP:393216:UXOM3rDafPgizvn5b2BBpyKX5I/sqk8BoQLH5+/OoA5KdzyXy:wOMben5b2NT5gsq6QLZIvd
                                MD5:F43A95ABDA2A482DCB5FFED7ED3EEF70
                                SHA1:03488CFF850E2CE03C60DAAEA617198BF228B9CD
                                SHA-256:DB1D955D0078B3742F10F891B52782101B01A32061CBF250CCDEB1F02BEAE663
                                SHA-512:97A0CFB841804B232255736BE72C62BA607B0C1D5C02E896751D8B9B31EAC3E65D658B510386EE24476CD6F8794DD2AEDFF2D4A03A474D6D216A17A2EE734DC4
                                Malicious:false
                                Preview:......................>...................j...................................F.......b.......o.......................................p.......<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...{...|...}...~...................................................................................................................<..............."...3........................................................................................... ...!...+...#...$...%...&...'...(...)...*...1...,...-......./...0...4...2...;...?...5...6...7...8...9...:...E...=.......>.......@...A...B...C...D...............H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):570784
                                Entropy (8bit):6.450187144191945
                                Encrypted:false
                                SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                                MD5:DB7612F0FD6408D664185CFC81BEF0CB
                                SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                                SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                                SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                                Malicious:true
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):570784
                                Entropy (8bit):6.450187144191945
                                Encrypted:false
                                SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                                MD5:DB7612F0FD6408D664185CFC81BEF0CB
                                SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                                SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                                SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                                Malicious:true
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):570784
                                Entropy (8bit):6.450187144191945
                                Encrypted:false
                                SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                                MD5:DB7612F0FD6408D664185CFC81BEF0CB
                                SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                                SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                                SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                                Malicious:true
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):570784
                                Entropy (8bit):6.450187144191945
                                Encrypted:false
                                SSDEEP:6144:X+Sud3L4YgAc8wjVMeKRtGnm3CCRloVywX9gDAOAVafv5kh4JQCmR+gj:X+SuPgAc8+MjGCCslegDiwX5vOCmR+gj
                                MD5:DB7612F0FD6408D664185CFC81BEF0CB
                                SHA1:19A6334EC00365B4F4E57D387ED885B32AA7C9AA
                                SHA-256:E9E426B679B3EFB233F03C696E997E2DA3402F16A321E954B54454317FCEB240
                                SHA-512:25E129CB22AAABC68C42ECF10BB650AC4D0609B12C08703C780572BAC7ECF4559FCC49CD595C56EA48CF55260A984CFA333C08307FFB7C62268B03FBECC724B9
                                Malicious:true
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&r.gb..4b..4b..4.a.5o..4.a.5...4-o.5s..4-o.5z..4-o.5(..4.a.5{..4.a.5c..4.a.5E..4b..4...4.o.5...4.o.5c..4.ou4c..4b..4c..4.o.5c..4Richb..4................PE..L...f.c.........."!..."............................................................q.....@.....................................,....`...................#...p...b..8Y..p....................Y......xX..@...............<............................text...6........................... ..`.rdata..X...........................@..@.data...."...0......................@....rsrc........`.......&..............@..@.reloc...b...p...d..................@..B................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):2200
                                Entropy (8bit):5.333524442196173
                                Encrypted:false
                                SSDEEP:48:hVT0UqpA40B17RAo/QH85B+a+GBl2qAX657RT:hVTFwAJ5c9IBlNi6P
                                MD5:6434A61749454BD13B243B041CAE3B95
                                SHA1:3362099AB8F89C78371F0A3F1952549872092D7D
                                SHA-256:F3EB9A365C00970D9213A55B89F21B67277C1A1ECEF9A3982A748841B3C81580
                                SHA-512:1FB08FAB1E2A146989A1B10183236EB5322744ED776B874E91D3884B86D28E5929217BFFE2876286A243731AF3EB6C4F7FB9528DD48FC2BD87055353730442D4
                                Malicious:false
                                Preview:...@IXOS.@.....@..1V.@.....@.....@.....@.....@.....@......&.{B2AB488E-0EA8-40AF-B78B-007F91779D57}..A.p.l.i.c.a.....o...Danfe2372342.msi.@.....@.....@.....@........&.{C1F62FEA-D8CD-49AE-B106-30DE4E33B9DF}.....@.....@.....@.....@.......@.....@.....@.......@......A.p.l.i.c.a.....o.......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]...@.......@........ProcessComponents%.Atualizando o registro de componentes...@.....@.....@.]....&.{5DA66C3E-C99A-4AB8-BDD9-67A1EF93E94F} .C:\Users\user\AppData\Roaming\.@.......@.....@.....@......&.{C83EB36A-ED7D-48B4-B60E-3410EBED3A62}&.0.1.:.\.S.o.f.t.w.a.r.e.\.w.i.n.d.o.w.s.\.A.p.l.i.c.a.....o.\.V.e.r.s.i.o.n..@.......@.....@.....@......&.{7C8D38CC-ED47-4FF8-AE09-1FEAD7B69B9D}0.C:\Users\user\AppData\Roaming\vcruntime140.dll.@.......@.....@.....@......&.{DE9041B2-B47B-4740-8035-4C0845D1D990}0.C:\Users\user\AppData\Roaming\01hdjshdyeur.exe.@.......@.....@.....@......&.{05C8B20E-9A4F-45DC
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):566196
                                Entropy (8bit):5.4037405267791625
                                Encrypted:false
                                SSDEEP:3072:76sAoN1IAMVcB6J3l7NPh7sOyQSiMbRolrNWG6x+Rkeov8Qj9lOx2s9OW1LRuuGH:TFfxq8RfKF0Du4
                                MD5:0D913E2253328FCD215EA3175B034AC5
                                SHA1:E1765B4C9C6A893E172E69D4B7D4CC19DF524F1B
                                SHA-256:F1F554138789474142429DD6D4A3858DF460226BC081009166D1E1018F1DA0D9
                                SHA-512:380B76589644572C4AC4D3D425D3049302CA997A88AD754E5D4E9E54E9FC31333890B1EC87086F506F1CC1D1477433A2ADBB79B7DE88CED26C2BBD89AF8232D9
                                Malicious:false
                                Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 09:59:37.236 [4684]: Command line: D:\wd\compilerTemp\BMT.i51yo0aa.beh\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 09:59:37.255 [4684]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 09:59:37.299 [4684]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 09:59:37.299 [4684]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 09:59:37.299 [
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):512
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3::
                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                Malicious:false
                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\msiexec.exe
                                File Type:Composite Document File V2 Document, Cannot read section info
                                Category:dropped
                                Size (bytes):32768
                                Entropy (8bit):1.2069365652387494
                                Encrypted:false
                                SSDEEP:48:Kir7uLO+CFXJjT5iX6S0AE4CyjMHiSSTXC:xr7f7T0X6mzC0MCU
                                MD5:F9BD22DCD0CA93C541CD3297D2A39F0B
                                SHA1:09F338AE558DA316C15FA802F218505023AB8878
                                SHA-256:3A583BB330EDF6F8D1ED7EA5F37BC7D0D8703D614ED9A2C136E1AF97745BF203
                                SHA-512:B01A7C32FA3FD82AD8A47C271BE8B2CCA0A67C6CE8575349416C6565F7D51B5C9C1729A4A2EB73A79A25567B84633934A5446C85A50ECE13DD30FAA77BFEB10B
                                Malicious:false
                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {C1F62FEA-D8CD-49AE-B106-30DE4E33B9DF}, Number of Words: 10, Subject: Aplicao, Author: windows, Name of Creating Application: Aplicao, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Aplicao., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                Entropy (8bit):7.775327929193499
                                TrID:
                                • Microsoft Windows Installer (77509/1) 52.18%
                                • Windows SDK Setup Transform Script (63028/2) 42.43%
                                • Generic OLE2 / Multistream Compound File (8008/1) 5.39%
                                File name:Danfe2372342.msi
                                File size:23694336
                                MD5:f43a95abda2a482dcb5ffed7ed3eef70
                                SHA1:03488cff850e2ce03c60daaea617198bf228b9cd
                                SHA256:db1d955d0078b3742f10f891b52782101b01a32061cbf250ccdeb1f02beae663
                                SHA512:97a0cfb841804b232255736be72c62ba607b0c1d5c02e896751d8b9b31eac3e65d658b510386ee24476cd6f8794dd2aedff2d4a03a474d6d216a17a2ee734dc4
                                SSDEEP:393216:UXOM3rDafPgizvn5b2BBpyKX5I/sqk8BoQLH5+/OoA5KdzyXy:wOMben5b2NT5gsq6QLZIvd
                                TLSH:CB37D320937779D9EA27A2FFF0AC5FC48014B5F1A118EA7B73783FA589D054661B6803
                                File Content Preview:........................>...................j...................................F.......b.......o.......................................p.......<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W..
                                Icon Hash:a2a0b496b2caca72
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to jump to process

                                Target ID:1
                                Start time:22:16:36
                                Start date:17/01/2023
                                Path:C:\Windows\System32\msiexec.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Danfe2372342.msi"
                                Imagebase:0x7ff69f230000
                                File size:69632 bytes
                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate

                                Target ID:2
                                Start time:22:16:36
                                Start date:17/01/2023
                                Path:C:\Windows\System32\msiexec.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\msiexec.exe /V
                                Imagebase:0x7ff69f230000
                                File size:69632 bytes
                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate

                                Target ID:4
                                Start time:22:16:38
                                Start date:17/01/2023
                                Path:C:\Windows\SysWOW64\msiexec.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 7CBC5917A43DB9FC3EC884BC2BB72269
                                Imagebase:0xf10000
                                File size:59904 bytes
                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate

                                No disassembly