IOC Report
Order.msi

loading gif

Files

File Path
Type
Category
Malicious
Order.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: ServiceUeh, Author: SoftHg, Keywords: Installer, Comments: This installer database contains the logic and data required to install ServiceUeh., Template: Intel;8201, Revision Number: {AF26AC5E-9451-47ED-BC01-6E2EB89EC5B7}, Create Time/Date: Sun Oct 13 10:22:04 2024, Last Saved Time/Date: Sun Oct 13 10:22:04 2024, Number of Pages: 500, Number of Words: 8, Name of Creating Application: Windows Installer XML Toolset (3.14.0.5721), Security: 2
initial sample
malicious
C:\Windows\Installer\641f68.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: ServiceUeh, Author: SoftHg, Keywords: Installer, Comments: This installer database contains the logic and data required to install ServiceUeh., Template: Intel;8201, Revision Number: {AF26AC5E-9451-47ED-BC01-6E2EB89EC5B7}, Create Time/Date: Sun Oct 13 10:22:04 2024, Last Saved Time/Date: Sun Oct 13 10:22:04 2024, Number of Pages: 500, Number of Words: 8, Name of Creating Application: Windows Installer XML Toolset (3.14.0.5721), Security: 2
dropped
malicious
C:\Windows\Installer\MSI20EF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Order.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding D409B1A5B3A8068FDFADD1A7B085FD25

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence