Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SCADA 4.0.12.737.msi

Overview

General Information

Sample name:SCADA 4.0.12.737.msi
Analysis ID:1543865
MD5:32f1ffd5853059fe0d14ca8897da9be5
SHA1:ad6b641d75f4596c2b7a1812ce78a315a65ea8ab
SHA256:f39c1e9da463fb7b7791b3dc9c0fbd0fd4528e51ba59212113c1b36994b74762
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Checks for available system drives (often done to infect USB drives)
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • msiexec.exe (PID: 6200 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\SCADA 4.0.12.737.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 6296 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Binary string: D:\myprogram\CVSProj\ePassSvr\rock_usb\rocknt\objfre\i386\Rockey4.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\vista\rockey4usb\objfre_wlh_x86\i386\Rockey4Usb.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: D:\myprogram\CVSProj\ePassSvr\rock_usb\RockeyCoinstall\objfre\i386\Ry4CoInst.pdbU source: SCADA 4.0.12.737.msi
Source: Binary string: D:\myprogram\CVSProj\ePassSvr\rock_usb\enduser\objfre\i386\Rockey4Usb.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: D:\myprogram\CVSProj\ePassSvr\rock_usb\RockeyCoinstall\objfre\i386\Ry4CoInst.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\vista\rockey4usb\objfre_wlh_x86\i386\Rockey4Usb.pdbN source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\vista\coinstall\objfre_wlh_x86\i386\Ry4CoInst.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: h:\nt.obj.x86fre\base\wcp\tools\msmcustomaction\objfre\i386\msmcustomaction.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\vista\rockey4\objfre_wlh_x86\i386\Rockey4.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\rockeynt\objfre_w2k_x86\i386\rockeynt.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: D:\Rockey4Drv\wdm\enduser\objfre\i386\RockUsb.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: D:\Rockey4Drv\wdm\enduser\objfre\i386\RockUsb.pdbMZ source: SCADA 4.0.12.737.msi
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://ocsp.thawte.com0
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://s2.symcb.com0
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://sv.symcd.com0&
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://www.flexerasoftware.com0
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://www.symauth.com/cps0(
Source: SCADA 4.0.12.737.msiString found in binary or memory: http://www.symauth.com/rpa00
Source: SCADA 4.0.12.737.msiString found in binary or memory: https://d.symcb.com/cps0%
Source: SCADA 4.0.12.737.msiString found in binary or memory: https://d.symcb.com/rpa0
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilename_IsIcoRes.exe< vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilenameSetAllUsers.dll< vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilenameSFHelper.dll vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilenameRockey4.sys vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilenameRockey4USB.sys vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilenameRockeynt.sys vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilenameRockUsb.sysR vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilenameR4CoInst.dll vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary or memory string: OriginalFilenameInstDll.dll vs SCADA 4.0.12.737.msi
Source: SCADA 4.0.12.737.msiBinary string: \Device\ROCKEYUSB
Source: SCADA 4.0.12.737.msiBinary string: \Device\USBHUB0U
Source: SCADA 4.0.12.737.msiBinary string: \Device\Dongle0TestBusySupport\Parameters\DosDevices\ROCKEYNT
Source: SCADA 4.0.12.737.msiBinary string: \Device\Dongle0U
Source: SCADA 4.0.12.737.msiBinary string: \DosDevices\ROCKEY9X\Device\Dongle0
Source: SCADA 4.0.12.737.msiBinary string: D@B\Device\ROCKEYUSB\DosDevices\ROCKEYUSBU
Source: SCADA 4.0.12.737.msiBinary string: \Device\ROCKEYUSB%s%03dU
Source: SCADA 4.0.12.737.msiBinary string: \Device\ROCKEYUSB\DosDevices\ROCKEYNTTestBusySupport\Parameters\Device\Dongle0
Source: SCADA 4.0.12.737.msiBinary string: \Device\RootHubU
Source: SCADA 4.0.12.737.msiBinary string: \DosDevices\ROCKEYNT\Device\Dongle0
Source: SCADA 4.0.12.737.msiBinary string: P`0PEnum\USBSystem\CurrentControlSet\Services\vxd\Rockey9xSupportTestBusyDisablePort1DisablePort2DisablePort3\Device\ROCKEYUSBU
Source: SCADA 4.0.12.737.msiBinary string: P@RockUsb for NT 4.0\Device\ROCKEYUSB\DosDevices\ROCKEYUSBU
Source: classification engineClassification label: clean2.winMSI@2/1@0/0
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI46ae6.LOGJump to behavior
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\SCADA 4.0.12.737.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: SCADA 4.0.12.737.msiStatic file information: File size 3905024 > 1048576
Source: Binary string: D:\myprogram\CVSProj\ePassSvr\rock_usb\rocknt\objfre\i386\Rockey4.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\vista\rockey4usb\objfre_wlh_x86\i386\Rockey4Usb.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: D:\myprogram\CVSProj\ePassSvr\rock_usb\RockeyCoinstall\objfre\i386\Ry4CoInst.pdbU source: SCADA 4.0.12.737.msi
Source: Binary string: D:\myprogram\CVSProj\ePassSvr\rock_usb\enduser\objfre\i386\Rockey4Usb.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: D:\myprogram\CVSProj\ePassSvr\rock_usb\RockeyCoinstall\objfre\i386\Ry4CoInst.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\vista\rockey4usb\objfre_wlh_x86\i386\Rockey4Usb.pdbN source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\vista\coinstall\objfre_wlh_x86\i386\Ry4CoInst.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: h:\nt.obj.x86fre\base\wcp\tools\msmcustomaction\objfre\i386\msmcustomaction.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\vista\rockey4\objfre_wlh_x86\i386\Rockey4.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: e:\ft_code\drv_proj\drv_rockey4\src\32\rockeynt\objfre_w2k_x86\i386\rockeynt.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: D:\Rockey4Drv\wdm\enduser\objfre\i386\RockUsb.pdb source: SCADA 4.0.12.737.msi
Source: Binary string: D:\Rockey4Drv\wdm\enduser\objfre\i386\RockUsb.pdbMZ source: SCADA 4.0.12.737.msi
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping11
Peripheral Device Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1543865 Sample: SCADA 4.0.12.737.msi Startdate: 28/10/2024 Architecture: WINDOWS Score: 2 4 msiexec.exe 5 2->4         started        6 msiexec.exe 2->6         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SCADA 4.0.12.737.msi0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://www.symauth.com/cps0(0%URL Reputationsafe
http://www.symauth.com/rpa000%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0SCADA 4.0.12.737.msifalse
  • URL Reputation: safe
unknown
http://www.flexerasoftware.com0SCADA 4.0.12.737.msifalse
    unknown
    http://www.symauth.com/cps0(SCADA 4.0.12.737.msifalse
    • URL Reputation: safe
    unknown
    http://www.symauth.com/rpa00SCADA 4.0.12.737.msifalse
    • URL Reputation: safe
    unknown
    http://ocsp.thawte.com0SCADA 4.0.12.737.msifalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1543865
    Start date and time:2024-10-28 15:17:27 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 46s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SCADA 4.0.12.737.msi
    Detection:CLEAN
    Classification:clean2.winMSI@2/1@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .msi
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: SCADA 4.0.12.737.msi
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\msiexec.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):288
    Entropy (8bit):3.453859603790795
    Encrypted:false
    SSDEEP:6:Q6qYrQM5CAl1AssaGqKXlnElClaeaLebj2JDoblv2K88qdNhH:Q6NQzAl1qFXlnMClVaa2NRK6
    MD5:46FB0A077EF4AC4436FF1AC5C6199C1F
    SHA1:A6EC0EC086F450AF209B8A1DA88B5100081381F0
    SHA-256:250B2C52056E4712F2B3EC9BA0157BFBDDE57F3E548CB59E6A519AB21ED9D236
    SHA-512:A5A0CFFAE4794286C526AFA07C498084337946C78AB2AB53D0235ED4BF0B21F1419B3332EA5F8E070CF8D42B1F8E0C085B1C4E3CC262B75B4C903B514865AA9F
    Malicious:false
    Reputation:low
    Preview:..T.h.i.s. .i.n.s.t.a.l.l.a.t.i.o.n. .c.a.n.n.o.t. .b.e. .r.u.n. .b.y. .d.i.r.e.c.t.l.y. .l.a.u.n.c.h.i.n.g. .t.h.e. .M.S.I. .p.a.c.k.a.g.e... .Y.o.u. .m.u.s.t. .r.u.n. .s.e.t.u.p...e.x.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.8./.1.0./.2.0.2.4. . .1.0.:.1.8.:.2.5. .=.=.=.....
    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Blank Project Template, Author: Shanghai ZPMC Electric Co.Ltd, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2018 - Professional Edition 24, Last Saved Time/Date: Wed Jun 5 02:57:46 2019, Create Time/Date: Wed Jun 5 02:57:46 2019, Last Printed: Wed Jun 5 02:57:46 2019, Revision Number: {66DF9F58-4C89-4E3E-AF81-ABF197C1156B}, Code page: 1252, Template: Intel;1033
    Entropy (8bit):6.133000677779072
    TrID:
    • Windows SDK Setup Transform Script (63028/2) 47.91%
    • Microsoft Windows Installer (60509/1) 46.00%
    • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
    File name:SCADA 4.0.12.737.msi
    File size:3'905'024 bytes
    MD5:32f1ffd5853059fe0d14ca8897da9be5
    SHA1:ad6b641d75f4596c2b7a1812ce78a315a65ea8ab
    SHA256:f39c1e9da463fb7b7791b3dc9c0fbd0fd4528e51ba59212113c1b36994b74762
    SHA512:56457f8f049a46a8455a2636bf35746d046b2d38c398f7038f7a15027064456e9e65d142c3422710bb273f0fb346d5a07271e0c0babee4c250c61c2833d9535c
    SSDEEP:98304:x6a1SmKbjgRzVW8iy9zpplkVW8iy9zpGa4Yi:x2IzVW8iy9zppKVW8iy9zpGDYi
    TLSH:BD06B324BECDD666DD3206B09BA1F1F280567F73479900B260CB7F5F7A35A690823D92
    File Content Preview:........................>...................<...............8...................................Q..............................................................................................................................................................
    Icon Hash:2d2e3797b32b2b99
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:10:18:20
    Start date:28/10/2024
    Path:C:\Windows\System32\msiexec.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\SCADA 4.0.12.737.msi"
    Imagebase:0x7ff669080000
    File size:69'632 bytes
    MD5 hash:E5DA170027542E25EDE42FC54C929077
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:10:18:21
    Start date:28/10/2024
    Path:C:\Windows\System32\msiexec.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\msiexec.exe /V
    Imagebase:0x7ff669080000
    File size:69'632 bytes
    MD5 hash:E5DA170027542E25EDE42FC54C929077
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly