Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Iu4csQ2rwX.msi

Overview

General Information

Sample name:Iu4csQ2rwX.msi
renamed because original name is a hash value
Original sample name:6d3f68d31efc5fc456850af228427c25.msi
Analysis ID:1431500
MD5:6d3f68d31efc5fc456850af228427c25
SHA1:487fcaaab61ce4e76d6a1e2568cf3602a5f6632b
SHA256:147f810affa8a7f95cc8a15cc5918933d3cf430232e132b340180d3878951974
Tags:AsyncRATmsi
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • msiexec.exe (PID: 2312 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Iu4csQ2rwX.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 1344 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 6892 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 49FA398F3E264BE26A418C8408A7EA4A MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • icacls.exe (PID: 7180 cmdline: "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\." /SETINTEGRITYLEVEL (CI)(OI)HIGH MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • expand.exe (PID: 7232 cmdline: "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files MD5: 544B0DBFF3F393BCE8BB9D815F532D51)
        • conhost.exe (PID: 7240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • mafiachroom.exe (PID: 7300 cmdline: "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe" MD5: 6E7EBD37B6095CB1A2F3FFA9D5598C81)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "127.0.0.1,twinks234.duckdns.org,", "Port": "6606,7707,8808", "Version": "AWS | 3Losh", "MutexName": "mafiaEXE", "Autorun": "false", "Group": "true"}
SourceRuleDescriptionAuthorStrings
Iu4csQ2rwX.msiJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    Iu4csQ2rwX.msiWindows_Trojan_Asyncrat_11a11ba1unknownunknown
    • 0x4d4f0:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
    • 0x17a20c:$a2: Stub.exe
    • 0x17a29c:$a2: Stub.exe
    • 0x49ba7:$a3: get_ActivatePong
    • 0x4d708:$a4: vmware
    • 0x4d580:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
    • 0x4abd8:$a6: get_SslClient
    Iu4csQ2rwX.msiINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0x4d582:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    SourceRuleDescriptionAuthorStrings
    C:\Windows\Installer\6c70ae.msiJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      C:\Windows\Installer\6c70ae.msiWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0x4d4f0:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0x17a20c:$a2: Stub.exe
      • 0x17a29c:$a2: Stub.exe
      • 0x49ba7:$a3: get_ActivatePong
      • 0x4d708:$a4: vmware
      • 0x4d580:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x4abd8:$a6: get_SslClient
      C:\Windows\Installer\6c70ae.msiINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0x4d582:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cabJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cabWindows_Trojan_Asyncrat_11a11ba1unknownunknown
        • 0xd4f0:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0x13a20c:$a2: Stub.exe
        • 0x13a29c:$a2: Stub.exe
        • 0x9ba7:$a3: get_ActivatePong
        • 0xd708:$a4: vmware
        • 0xd580:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
        • 0xabd8:$a6: get_SslClient
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        00000007.00000002.4721202096.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x3a273:$x1: AsyncRAT
        • 0x3a2b1:$x1: AsyncRAT
        00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmpWindows_Trojan_Asyncrat_11a11ba1unknownunknown
          • 0xd294:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
          • 0x13a680:$a2: Stub.exe
          • 0x13a710:$a2: Stub.exe
          • 0x994b:$a3: get_ActivatePong
          • 0xd4ac:$a4: vmware
          • 0xd324:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
          • 0xa97c:$a6: get_SslClient
          00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0xd326:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          Process Memory Space: mafiachroom.exe PID: 7300MALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x1a394:$x1: AsyncRAT
          • 0x1a3c6:$x1: AsyncRAT
          SourceRuleDescriptionAuthorStrings
          7.0.mafiachroom.exe.7c0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            7.0.mafiachroom.exe.7c0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              7.0.mafiachroom.exe.7c0000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0xd494:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0x13a080:$a2: Stub.exe
              • 0x13a110:$a2: Stub.exe
              • 0x9b4b:$a3: get_ActivatePong
              • 0xd6ac:$a4: vmware
              • 0xd524:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0xab7c:$a6: get_SslClient
              7.0.mafiachroom.exe.7c0000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0xd526:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmpAvira: detection malicious, Label: TR/Spy.Gen
              Source: 00000007.00000002.4721778629.0000000002C61000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "127.0.0.1,twinks234.duckdns.org,", "Port": "6606,7707,8808", "Version": "AWS | 3Losh", "MutexName": "mafiaEXE", "Autorun": "false", "Group": "true"}
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmpVirustotal: Detection: 60%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe (copy)Virustotal: Detection: 60%Perma Link
              Source: Iu4csQ2rwX.msiReversingLabs: Detection: 50%
              Source: Iu4csQ2rwX.msiVirustotal: Detection: 44%Perma Link
              Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49743 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 20.42.65.94:443 -> 192.168.2.4:49772 version: TLS 1.2
              Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: Iu4csQ2rwX.msi, 6c70ae.msi.1.dr, MSI7206.tmp.1.dr
              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: c:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

              Networking

              barindex
              Source: Malware configuration extractorURLs: twinks234.duckdns.org
              Source: Malware configuration extractorURLs:
              Source: unknownDNS query: name: twinks234.duckdns.org
              Source: Yara matchFile source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPED
              Source: global trafficHTTP traffic detected: POST /OneCollector/1.0/ HTTP/1.1Accept: */*APIKey: cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521AuthMsaDeviceTicket: t=GwAWAbuEBAAU2qcZHJoKGNizGOeyqM4OaIoSZ0MOZgAAEJanOM/f8BEauEo6GRqguxLgAJt0LBh1uWaBD08sPTthnLouxyOeqq8UXC40zxYtXUeuLL3jc98oc4sgTt8Qg5RgpVyPUGOqQCdIMU+jHj5jPNgpCOYLzgjk7/68jQbYqRpL5buJGDaKHJUU4Qzi5sjC1iwUwrkBZLfklCNSWdGai+iykzR0ELnFD4lJb88vZch+TXuihcRzjbZvJG6mFONQPa3ignNQpsSbQgkMM4xuASI/kaIM+YTU5dBQE1SH8k0CwZj5Yc3H1S94NyGSn+DeuALqccEE8gt3uchW9hnkYs9tmlAQt7GBc9BBk/kSpz+oHgE=&p=Client-Id: NO_AUTHContent-Encoding: deflateContent-Type: application/bond-compact-binaryExpect: 100-continueSDK-Version: EVT-Windows-C++-No-3.4.15.1Upload-Time: 1714035143184Host: self.events.data.microsoft.comContent-Length: 7974Connection: Keep-AliveCache-Control: no-cache
              Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: unknownDNS traffic detected: query: twinks234.duckdns.org replaycode: Name error (3)
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
              Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
              Source: unknownTCP traffic detected without corresponding DNS query: 23.47.204.65
              Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
              Source: unknownTCP traffic detected without corresponding DNS query: 23.47.204.65
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.94
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=dp3LT5UDBFGklVa&MD=ECx2K67C HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
              Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=dp3LT5UDBFGklVa&MD=ECx2K67C HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
              Source: global trafficDNS traffic detected: DNS query: twinks234.duckdns.org
              Source: unknownHTTP traffic detected: POST /OneCollector/1.0/ HTTP/1.1Accept: */*APIKey: cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521AuthMsaDeviceTicket: t=GwAWAbuEBAAU2qcZHJoKGNizGOeyqM4OaIoSZ0MOZgAAEJanOM/f8BEauEo6GRqguxLgAJt0LBh1uWaBD08sPTthnLouxyOeqq8UXC40zxYtXUeuLL3jc98oc4sgTt8Qg5RgpVyPUGOqQCdIMU+jHj5jPNgpCOYLzgjk7/68jQbYqRpL5buJGDaKHJUU4Qzi5sjC1iwUwrkBZLfklCNSWdGai+iykzR0ELnFD4lJb88vZch+TXuihcRzjbZvJG6mFONQPa3ignNQpsSbQgkMM4xuASI/kaIM+YTU5dBQE1SH8k0CwZj5Yc3H1S94NyGSn+DeuALqccEE8gt3uchW9hnkYs9tmlAQt7GBc9BBk/kSpz+oHgE=&p=Client-Id: NO_AUTHContent-Encoding: deflateContent-Type: application/bond-compact-binaryExpect: 100-continueSDK-Version: EVT-Windows-C++-No-3.4.15.1Upload-Time: 1714035143184Host: self.events.data.microsoft.comContent-Length: 7974Connection: Keep-AliveCache-Control: no-cache
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
              Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49743 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 20.42.65.94:443 -> 192.168.2.4:49772 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: Iu4csQ2rwX.msi, type: SAMPLE
              Source: Yara matchFile source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Windows\Installer\6c70ae.msi, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPED

              System Summary

              barindex
              Source: Iu4csQ2rwX.msi, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: Iu4csQ2rwX.msi, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000007.00000002.4721202096.0000000000EE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: mafiachroom.exe PID: 7300, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Windows\Installer\6c70ae.msi, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: C:\Windows\Installer\6c70ae.msi, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6c70ae.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{BE13E8ED-EE1E-41EA-93EE-21B2B781511E}Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7206.tmpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeCode function: 7_2_029FE0487_2_029FE048
              Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI7206.tmp FD622CF73EA951A6DE631063ABA856487D77745DD1500ADCA61902B8DDE56FE1
              Source: Iu4csQ2rwX.msiBinary or memory string: OriginalFilenameStub.exe" vs Iu4csQ2rwX.msi
              Source: Iu4csQ2rwX.msiBinary or memory string: OriginalFilenameGoogleUpdateSetup.exe< vs Iu4csQ2rwX.msi
              Source: Iu4csQ2rwX.msi, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: Iu4csQ2rwX.msi, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000007.00000002.4721202096.0000000000EE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: mafiachroom.exe PID: 7300, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: C:\Windows\Installer\6c70ae.msi, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: C:\Windows\Installer\6c70ae.msi, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: d6568875baf18047a674d73da59f1fb3.tmp.5.dr, AtjEEKOEuHXUOep.csBase64 encoded string: 'ksQPxnES2fM8HYnhktKYQddmpNNvaPZcZXlbPq8AMWbKnoeQXFPkfKVZ8UfTiDguZfOWZMfUXSgI7Ux3e+eSPQ==', 'SgQXL2QA4L9vwixmFL+JxlZfG6w8CiqLoFBV7G5CTA/DicQG+u5K2c7VX9fxnYDGxOz0G8YT9YiLMQpmhmojdNqFs06hw1ygjn44iXtNlvF4W6GHuHxbJQCJK0mWHXKk', 'sr5Xdq1ax701VPJO+EBt6ZHFQhv3uIoSV0Ju2Ui5tbo5pZda+YCweYpmscCN+cVtHAm6niAwKAWhUZCUOm3JKw==', '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', 'rPKGR/Pk0v34iOtuba4jVAhs6crwp/6wbLU49IS66y/IrzIFWD+98JypPwKVjIVdRENpzBPZhABm4RIgLrqAsEk7c4eo/kYpYjzd7nQlwCLvjRxqwHe6pfGbI8odhHQPtO1xB6Po+N/rIT+GlTrTDkN3I/vlbDPkPC5NjqCzl2ZPs3aGoma41/f4gJGPS/cICc40o0BTCtFVNb0c29mGSVqzW4lZUkmCU1i/Otv+4OL8d5pIjPWP/sobbbHtK1IcuAnm12/+95t7ZE0NGT1/rY9eYRj3en3ZhnNseeQ/EmaeIgMT2M4YeKzVJzapxviczHioUsT3m6N
              Source: classification engineClassification label: mal100.troj.evad.winMSI@12/13@8/2
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7188:120:WilError_03
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7240:120:WilError_03
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeMutant created: \Sessions\1\BaseNamedObjects\mafiaEXE
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DFEEBD6A38A1E19B64.TMPJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\msiwrapper.iniJump to behavior
              Source: C:\Windows\SysWOW64\icacls.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Iu4csQ2rwX.msiReversingLabs: Detection: 50%
              Source: Iu4csQ2rwX.msiVirustotal: Detection: 44%
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Iu4csQ2rwX.msi"
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 49FA398F3E264BE26A418C8408A7EA4A
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
              Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
              Source: C:\Windows\SysWOW64\expand.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe"
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 49FA398F3E264BE26A418C8408A7EA4AJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\." /SETINTEGRITYLEVEL (CI)(OI)HIGHJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* filesJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe" Jump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeSection loaded: dpx.dllJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeSection loaded: wdscore.dllJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeSection loaded: dbgcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\msiwrapper.iniJump to behavior
              Source: Iu4csQ2rwX.msiStatic file information: File size 1552384 > 1048576
              Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: Iu4csQ2rwX.msi, 6c70ae.msi.1.dr, MSI7206.tmp.1.dr

              Data Obfuscation

              barindex
              Source: d6568875baf18047a674d73da59f1fb3.tmp.5.dr, ujxpsfygzVqvr.cs.Net Code: UZwAtRevkNJm System.AppDomain.Load(byte[])
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeCode function: 7_2_029FA89E push 00000005h; ret 7_2_029FA8A6
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeCode function: 7_2_029FA8BE push 00000005h; ret 7_2_029FA8C6
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeCode function: 7_2_029FA85E push 00000005h; ret 7_2_029FA866
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeCode function: 7_2_029FA87E push 00000005h; ret 7_2_029FA886
              Source: d6568875baf18047a674d73da59f1fb3.tmp.5.dr, YWmRkWYrYGPet.csHigh entropy of concatenated method names: 'dOLkdHCjzPHOK', 'PcHoejmereKNz', 'OZtFFradpqx', 'ZMDVdpULrjF', 'UkBtrgkGaOCpi', 'iwFRajAjpAmh', 'raJGsWKBGiWiLlJ', 'qSvPuuyFOZo', 'ZVtGUpLMMg', 'DSFRqIgqmPZ'
              Source: d6568875baf18047a674d73da59f1fb3.tmp.5.dr, SSBptkGuhwd.csHigh entropy of concatenated method names: 'AlvQbzcpWiYHWNLc', 'qRmxoPOEWB', 'LvkblCiiBspjmvk', 'OQrExEtkalkUsP', 'xVIPiVkQkrYm', 'qiVWUUwAcvhIe', 'tipFhEQwhk', 'JoFwsKIJcYc', 'yppPjeoCEiujCA', 'nQNUgHpaPJrGgHr'
              Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7206.tmpJump to dropped file
              Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7206.tmpJump to dropped file

              Boot Survival

              barindex
              Source: Yara matchFile source: Iu4csQ2rwX.msi, type: SAMPLE
              Source: Yara matchFile source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Windows\Installer\6c70ae.msi, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPED
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Iu4csQ2rwX.msi, type: SAMPLE
              Source: Yara matchFile source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Windows\Installer\6c70ae.msi, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPED
              Source: Iu4csQ2rwX.msi, 6c70ae.msi.1.dr, files.cab.2.dr, d6568875baf18047a674d73da59f1fb3.tmp.5.drBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeMemory allocated: 29F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeMemory allocated: 2C60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeMemory allocated: 2A60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeWindow / User API: threadDelayed 9715Jump to behavior
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI7206.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe TID: 7344Thread sleep count: 250 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe TID: 7344Thread sleep time: -250000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe TID: 7344Thread sleep count: 9715 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe TID: 7344Thread sleep time: -9715000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: d6568875baf18047a674d73da59f1fb3.tmp.5.drBinary or memory string: vmware
              Source: mafiachroom.exe, 00000007.00000002.4721202096.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllnn
              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\." /SETINTEGRITYLEVEL (CI)(OI)HIGHJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* filesJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe" Jump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\expand.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: Iu4csQ2rwX.msi, type: SAMPLE
              Source: Yara matchFile source: 7.0.mafiachroom.exe.7c0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Windows\Installer\6c70ae.msi, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure1
              Replication Through Removable Media
              1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              11
              Process Injection
              2
              Masquerading
              OS Credential Dumping21
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Services File Permissions Weakness
              1
              Scheduled Task/Job
              2
              Virtualization/Sandbox Evasion
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              1
              Services File Permissions Weakness
              1
              Disable or Modify Tools
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive3
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              11
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture24
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
              Obfuscated Files or Information
              LSA Secrets11
              Peripheral Device Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Services File Permissions Weakness
              Cached Domain Credentials2
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Software Packing
              DCSync13
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1431500 Sample: Iu4csQ2rwX.msi Startdate: 25/04/2024 Architecture: WINDOWS Score: 100 39 twinks234.duckdns.org 2->39 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Antivirus detection for dropped file 2->49 53 7 other signatures 2->53 9 msiexec.exe 3 10 2->9         started        12 msiexec.exe 5 2->12         started        signatures3 51 Uses dynamic DNS services 39->51 process4 file5 33 C:\Windows\Installer\MSI7206.tmp, PE32 9->33 dropped 35 C:\Windows\Installer\6c70ae.msi, Composite 9->35 dropped 14 msiexec.exe 5 9->14         started        process6 file7 37 C:\Users\user\AppData\Local\...\files.cab, Microsoft 14->37 dropped 17 expand.exe 4 14->17         started        20 mafiachroom.exe 2 14->20         started        23 icacls.exe 1 14->23         started        process8 dnsIp9 29 C:\Users\user\...\mafiachroom.exe (copy), PE32 17->29 dropped 31 C:\...\d6568875baf18047a674d73da59f1fb3.tmp, PE32 17->31 dropped 25 conhost.exe 17->25         started        41 127.0.0.1 unknown unknown 20->41 43 192.168.2.4, 138, 443, 49723 unknown unknown 20->43 27 conhost.exe 23->27         started        file10 process11

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Iu4csQ2rwX.msi50%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
              Iu4csQ2rwX.msi44%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp100%AviraTR/Spy.Gen
              C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp61%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe (copy)61%VirustotalBrowse
              C:\Windows\Installer\MSI7206.tmp0%ReversingLabs
              C:\Windows\Installer\MSI7206.tmp1%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              twinks234.duckdns.org1%VirustotalBrowse
              SourceDetectionScannerLabelLink
              0%Avira URL Cloudsafe
              twinks234.duckdns.org0%Avira URL Cloudsafe
              twinks234.duckdns.org1%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              twinks234.duckdns.org
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              true
              • Avira URL Cloud: safe
              low
              twinks234.duckdns.orgtrue
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              IP
              192.168.2.4
              127.0.0.1
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1431500
              Start date and time:2024-04-25 10:46:41 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 59s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Run name:Potential for more IOCs and behavior
              Number of analysed new started processes analysed:13
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Iu4csQ2rwX.msi
              renamed because original name is a hash value
              Original Sample Name:6d3f68d31efc5fc456850af228427c25.msi
              Detection:MAL
              Classification:mal100.troj.evad.winMSI@12/13@8/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 11
              • Number of non-executed functions: 1
              Cookbook Comments:
              • Found application associated with file extension: .msi
              • Close Viewer
              • Override analysis time to 119996.9943 for current running targets taking high CPU consumption
              • Override analysis time to 239993.9886 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 199.232.210.172, 192.229.211.108
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, self.events.data.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              10:48:09API Interceptor12316733x Sleep call for process: mafiachroom.exe modified
              No context
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              28a2c9bd18a11de089ef85a160da29e4https://docs.google.com/presentation/d/e/2PACX-1vRA7cYu2pjKyfaCRROgTu4J2OpPGWE_raEqtGhCVl21QDvJzZsVPQtIU_FG6khcCjqxbwzOTOoBBBx6/pub?start=false&loop=false&delayms=3000&slide=id.pGet hashmaliciousUnknownBrowse
              • 52.165.165.26
              http://survey-smiles.comGet hashmaliciousUnknownBrowse
              • 52.165.165.26
              g77dRQ1Csm.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, zgRATBrowse
              • 52.165.165.26
              http://rapnews.plGet hashmaliciousUnknownBrowse
              • 52.165.165.26
              http://rfpteams.ksplastlc.netGet hashmaliciousUnknownBrowse
              • 52.165.165.26
              https://app.milanote.com/1RZbnl1zfBXuaf?p=r2B66sphbV4Get hashmaliciousUnknownBrowse
              • 52.165.165.26
              http://decktop.us/gORiyfGet hashmaliciousHTMLPhisherBrowse
              • 52.165.165.26
              https://cos-aliyun8789.towqzg.cn/Get hashmaliciousUnknownBrowse
              • 52.165.165.26
              https://shining-melodic-magnesium.glitch.me/rvicendDev.htmlGet hashmaliciousUnknownBrowse
              • 52.165.165.26
              http://confirmartucuentamsnaquimx.hstn.me/login.live.com_login_verify_credentials_outlook.htmlGet hashmaliciousHTMLPhisherBrowse
              • 52.165.165.26
              a0e9f5d64349fb13191bc781f81f42e1o7b91j8vnJ.exeGet hashmaliciousLummaCBrowse
              • 20.42.65.94
              SHEOrder-10524.exeGet hashmaliciousRemcos, DBatLoaderBrowse
              • 20.42.65.94
              file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
              • 20.42.65.94
              https://56hytuti5.weebly.com/Get hashmaliciousUnknownBrowse
              • 20.42.65.94
              udVh4Ist4Z.exeGet hashmaliciousRemcos, DBatLoaderBrowse
              • 20.42.65.94
              samradapps_datepicker_221114.xlamGet hashmaliciousUnknownBrowse
              • 20.42.65.94
              Enquiry 230424.batGet hashmaliciousRemcos, DBatLoaderBrowse
              • 20.42.65.94
              URGENTE_NOTIFICATION.cmdGet hashmaliciousRemcos, DBatLoaderBrowse
              • 20.42.65.94
              fu56fbrtn8.exeGet hashmaliciousRemcos, DBatLoaderBrowse
              • 20.42.65.94
              Payment MT103.xlsGet hashmaliciousUnknownBrowse
              • 20.42.65.94
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Windows\Installer\MSI7206.tmpSecuriteInfo.com.Trojan.Generic.35702255.16709.9631.msiGet hashmaliciousHidden Macro 4.0Browse
                SecuriteInfo.com.Trojan.Generic.35702255.16709.9631.msiGet hashmaliciousHidden Macro 4.0Browse
                  psmb.msiGet hashmaliciousUnknownBrowse
                    Process:C:\Windows\SysWOW64\msiexec.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 1289612 bytes, 1 file, at 0x2c +A "mafiachroom.exe", ID 3549, number 1, 40 datablocks, 0 compression
                    Category:dropped
                    Size (bytes):1289612
                    Entropy (8bit):7.943191122442787
                    Encrypted:false
                    SSDEEP:24576:TLcVXyEq9GRhv9cWP8rtPN01Mq7+xtA+w9TxDfoUBoiGt+eWilfdqFWVgK:TLcJyEq9GRhvVqtV01Mq7kctDAUdGHWZ
                    MD5:D4E7F05D7F6A7DC75F468DBCAA9F437F
                    SHA1:F377284434B0200C6EBEBA730DFCDDAFF7F2DE13
                    SHA-256:943EF4C71D53EF383EE9591D460799C7E503E493C26ABDD6DED50EB82F2DD47F
                    SHA-512:9F8D960EE4367F388A0717B9A3991682A900F13DB547DD51242A6C1686A2D9BADBB94446DB36700116C0C7753DAACC7FB43EC35C09E94BC462E74C36E2B86BF5
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files.cab, Author: ditekSHen
                    Reputation:low
                    Preview:MSCF............,...................L...(..............X.. .mafiachroom.exe.."x.....MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]x^e................................. ... ....@.. ..............................N4....`.................................<...O.... ..s............................................................................ ............... ..H............text........ ...................... ..`.rsrc...s.... ......................@..@.reloc..............................@..B................p.......H.......X}................................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(A......*2~.....oB...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(y...*V~'...(3....(...(....*.r!
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):1289216
                    Entropy (8bit):7.943449212177756
                    Encrypted:false
                    SSDEEP:24576:1lcVkyEq9DRho1jFP8ltPP01Ws7+wFPEl9ix4fpUzoQDt+egElxdqFWVvQ:1lcCyEq9DRho/ctH01Ws74rA4RUBDHgq
                    MD5:6E7EBD37B6095CB1A2F3FFA9D5598C81
                    SHA1:D4D0CFA65F6DD224AF16FF81A29ABDF6AB0EAB69
                    SHA-256:1CF774A50175EB7321B1366C585CCFC68BDF0916D8E78EDF1FE24E079209EB9E
                    SHA-512:F23D689393DB2F8292018D8B303992B19DD8B9CFD4F226A84DDD70D30EC2D89083E9B1418D5F82E04A1A81D9014387E0450747B99A02FC32E094C987CC2C782B
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, Author: Joe Security
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\19846695766e49c9ae2db4b896af4d3a$dpx$.tmp\d6568875baf18047a674d73da59f1fb3.tmp, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Virustotal, Detection: 61%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]x^e................................. ... ....@.. ..............................N4....`.................................<...O.... ..s............................................................................ ............... ..H............text........ ...................... ..`.rsrc...s.... ......................@..@.reloc..............................@..B................p.......H.......X}................................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(A......*2~.....oB...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(y...*V~'...(3....(...(....*.r!4.p(....r+4.p(r....$......4...sC....'...~.....(......)...*V(....s.... ...o....*b.+.
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):1289216
                    Entropy (8bit):7.943449212177756
                    Encrypted:false
                    SSDEEP:24576:1lcVkyEq9DRho1jFP8ltPP01Ws7+wFPEl9ix4fpUzoQDt+egElxdqFWVvQ:1lcCyEq9DRho/ctH01Ws74rA4RUBDHgq
                    MD5:6E7EBD37B6095CB1A2F3FFA9D5598C81
                    SHA1:D4D0CFA65F6DD224AF16FF81A29ABDF6AB0EAB69
                    SHA-256:1CF774A50175EB7321B1366C585CCFC68BDF0916D8E78EDF1FE24E079209EB9E
                    SHA-512:F23D689393DB2F8292018D8B303992B19DD8B9CFD4F226A84DDD70D30EC2D89083E9B1418D5F82E04A1A81D9014387E0450747B99A02FC32E094C987CC2C782B
                    Malicious:true
                    Antivirus:
                    • Antivirus: Virustotal, Detection: 61%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]x^e................................. ... ....@.. ..............................N4....`.................................<...O.... ..s............................................................................ ............... ..H............text........ ...................... ..`.rsrc...s.... ......................@..@.reloc..............................@..B................p.......H.......X}................................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(A......*2~.....oB...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(y...*V~'...(3....(...(....*.r!4.p(....r+4.p(r....$......4...sC....'...~.....(......)...*V(....s.... ...o....*b.+.
                    Process:C:\Windows\SysWOW64\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):1472
                    Entropy (8bit):3.6623629971399727
                    Encrypted:false
                    SSDEEP:24:L0VdX8DW8dfjKQZPyag7ESrF39KYixC9KYixLy29KYix1QZNlRu7b:LKeeQkz7JF39Ko9KFl9KrQZRuH
                    MD5:281ABB073F619A12C17B92204964376F
                    SHA1:693D424F526727D92E4F873DDF8079DB5D384547
                    SHA-256:7CB20C8D8CC154F87378592E337D5582EE32BC1B6647B79F4A0459A05DD207AC
                    SHA-512:5B644DE545680AA09350619C615876310CED2A8E7029362B3BFE9D6292C60DF9892C8A898A69DED304699D22278669027CA4801740085BB3CFB8A6BA66E8EBA8
                    Malicious:false
                    Reputation:low
                    Preview:W.r.a.p.p.e.d.A.p.p.l.i.c.a.t.i.o.n.I.d.=.G.o.o.g.l.e. .C.h.r.o.m.e...W.r.a.p.p.e.d.R.e.g.i.s.t.r.a.t.i.o.n.=.H.i.d.d.e.n...I.n.s.t.a.l.l.S.u.c.c.e.s.s.C.o.d.e.s.=.0...E.l.e.v.a.t.i.o.n.M.o.d.e.=.a.d.m.i.n.i.s.t.r.a.t.o.r.s...B.a.s.e.N.a.m.e.=.m.a.f.i.a.c.h.r.o.o.m...e.x.e...C.a.b.H.a.s.h.=.9.4.3.e.f.4.c.7.1.d.5.3.e.f.3.8.3.e.e.9.5.9.1.d.4.6.0.7.9.9.c.7.e.5.0.3.e.4.9.3.c.2.6.a.b.d.d.6.d.e.d.5.0.e.b.8.2.f.2.d.d.4.7.f...S.e.t.u.p.P.a.r.a.m.e.t.e.r.s.=...W.o.r.k.i.n.g.D.i.r.=...C.u.r.r.e.n.t.D.i.r.=.*.S.O.U.R.C.E.D.I.R.*...U.I.L.e.v.e.l.=.5...F.o.c.u.s.=.y.e.s...S.e.s.s.i.o.n.D.i.r.=.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.b.f.5.b.0.9.8.d.-.e.7.2.2.-.4.c.b.5.-.9.f.f.e.-.2.c.0.7.6.0.c.3.2.7.a.0.\...F.i.l.e.s.D.i.r.=.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.b.f.5.b.0.9.8.d.-.e.7.2.2.-.4.c.b.5.-.9.f.f.e.-.2.c.0.7.6.0.c.3.2.7.a.0.\.f.i.l.e.s.\...R.u.n.B.e.f.o.r.e.I.n.s.t.a.l.l.F.i.l.e.=...R.u.n.B.e.f.o.r.e.I.n.s.t.a.l.l.P.a.r.
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Google Chrome - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 123.0.6312.122, Subject: Google Chrome - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Google LLC, Keywords: Installer, Template: x64;1033, Revision Number: {13CFB811-92D4-4E78-880A-3A795941D09C}, Create Time/Date: Thu Jan 11 14:59:38 2024, Last Saved Time/Date: Thu Jan 11 14:59:38 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
                    Category:dropped
                    Size (bytes):1552384
                    Entropy (8bit):7.805123646694037
                    Encrypted:false
                    SSDEEP:24576:kt9cpVDhOXLcVXyEq9GRhv9cWP8rtPN01Mq7+xtA+w9TxDfoUBoiGt+eWilfdqF6:jpRhOXLcJyEq9GRhvVqtV01Mq7kctDAo
                    MD5:6D3F68D31EFC5FC456850AF228427C25
                    SHA1:487FCAAAB61CE4E76D6A1E2568CF3602A5F6632B
                    SHA-256:147F810AFFA8A7F95CC8A15CC5918933D3CF430232E132B340180D3878951974
                    SHA-512:E1C26181065AD69078E281154F741D318CEEC9D412C030A89397E6D27FF89C224ED7F106B68892F41309264830E48255FF114369985206EFE9C5311F8725DF3D
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Windows\Installer\6c70ae.msi, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Windows\Installer\6c70ae.msi, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Windows\Installer\6c70ae.msi, Author: ditekSHen
                    Reputation:low
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:modified
                    Size (bytes):212992
                    Entropy (8bit):6.513409725320959
                    Encrypted:false
                    SSDEEP:3072:xspAtOdmXwCGjtYNKbYO2gjpcm8rRuqpjCL42loHUvU0yGxr5GqM2a8:jtOdiRQYpgjpjew5DHyGxcqo8
                    MD5:0C8921BBCC37C6EFD34FAF44CF3B0CB5
                    SHA1:DCFA71246157EDCD09EECAF9D4C5E360B24B3E49
                    SHA-256:FD622CF73EA951A6DE631063ABA856487D77745DD1500ADCA61902B8DDE56FE1
                    SHA-512:ED55443E20D40CCA90596F0A0542FA5AB83FE0270399ADFAAFD172987FB813DFD44EC0DA0A58C096AF3641003F830341FE259AD5BCE9823F238AE63B7E11E108
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    • Antivirus: Virustotal, Detection: 1%, Browse
                    Joe Sandbox View:
                    • Filename: SecuriteInfo.com.Trojan.Generic.35702255.16709.9631.msi, Detection: malicious, Browse
                    • Filename: SecuriteInfo.com.Trojan.Generic.35702255.16709.9631.msi, Detection: malicious, Browse
                    • Filename: psmb.msi, Detection: malicious, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............p...p...p.......p.....p..../.p.......p...q.%.p.......p.....p.....p.Rich..p.........................PE..L...Y..e...........!.....h..........K................................................]....@.........................P...]............P.......................`.....................................p...@...............t............................text....f.......h.................. ..`.rdata...............l..............@..@.data....5..........................@....rsrc........P......................@..@.reloc...)...`...*..................@..B........................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):49152
                    Entropy (8bit):0.7692339800996187
                    Encrypted:false
                    SSDEEP:12:JSbX72Fj7f/iAGiLIlHVRpZh/7777777777777777777777777vDHFfmtRk1it/z:JtyQI5tEP5iF
                    MD5:892B7CD83624EF32E2706DBD14F68D24
                    SHA1:5B86AC3E986110187680CBF2F7AD6AB910AE5563
                    SHA-256:9108392014A3C81667125872FE32A81B91EDAEB851F937D31562F3BC2DB6AE86
                    SHA-512:3E6047385CB776953BC0D82EBEB9B89B9187CD29667A28E464FD222A9206B06D120E14B571A2433D18F353BF5DF9B5D509D9889EF223FD00F202B3E66FAA4DA9
                    Malicious:false
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):1.2264399780340365
                    Encrypted:false
                    SSDEEP:48:dLQuyPveFXJpT5g9pNhdASPo/rXvdASB21rBJq:dQCRTUpNkoq
                    MD5:AC2974284B998CE815AEBAA18C792EF9
                    SHA1:353878AF3BE88908B8DAE50A603165706901848B
                    SHA-256:2DAB60657892B5931633B3434B080FCCDD93459C5EC51D8FC97F8A92F7A52617
                    SHA-512:15BE58EC8703E2386670D0C009208E39F3390FC408985B0B1E59DD85E193E93A0EAE3BDE3F0EFF6999EDB46B3E0236028B7D253958CAED8B662EFF78ABD21E4E
                    Malicious:false
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:CSV text
                    Category:dropped
                    Size (bytes):345054
                    Entropy (8bit):4.386377718866352
                    Encrypted:false
                    SSDEEP:192:0K9KmK9KIK7KIK7KYK7KIK7KYK7KIK7KYK7KIK7KYK7KIK7KYK7KIK7KYK7KIK7R:W
                    MD5:8B72457D1938B5D9E2315E6E78160917
                    SHA1:8FA88A04D0F6CF01742FB85337251FDCE7998012
                    SHA-256:FC51DB92DB8DD84C4E80C4EE04A47FA600214F2CF0B42415E3D5F83FCA840D63
                    SHA-512:1D6D640BB448A13FB87024E6EDC8B2C0D8145F72EAEFE6D38F9F8CB5CB59A4E2BEDBC3285BF0EA90F64F0A363BBE43F71288C65EBD9BC1C53657E5755C3578E5
                    Malicious:false
                    Preview:.2023-10-03 11:48:47, Info DPX Started DPX phase: Resume and Download Job..2023-10-03 11:48:47, Info DPX Started DPX phase: Apply Deltas Provided In File..2023-10-03 11:48:47, Info DPX Ended DPX phase: Apply Deltas Provided In File..2023-10-03 11:48:47, Info DPX Started DPX phase: Apply Deltas Provided In File..2023-10-03 11:48:47, Info DPX Ended DPX phase: Apply Deltas Provided In File..2023-10-03 11:48:47, Info DPX CJob::Resume completed with status: 0x0..2023-10-03 11:48:47, Info DPX Ended DPX phase: Resume and Download Job..2023-10-03 11:48:49, Info DPX Started DPX phase: Resume and Download Job..2023-10-03 11:48:49, Info DPX Started DPX phase: Apply Deltas Provided In File..2023-10-03 11:48:49, Info DPX Ended DPX phase: Apply Deltas Provided In File..2023-10-03 11:48:49, Info
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):432221
                    Entropy (8bit):5.3751734831354545
                    Encrypted:false
                    SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauN:zTtbmkExhMJCIpErI
                    MD5:53A788998286B1FEC1368D97FADBD5F2
                    SHA1:695F6C740AC128536A73AD2EA559F5BB040C1265
                    SHA-256:886EE555A5F5C7AF778ECDD0B16D0CF84AB07529BB8F5A8C1E1B49AD532B579B
                    SHA-512:AD8F93A201C2DAFC404B82E58394A23D565471FE54F2A94929CDD08FF589AA7F6A084A81348A65EF7A82CB97D967579A6AFD080129980C0FCB93B96B7E7DCD1D
                    Malicious:false
                    Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):81920
                    Entropy (8bit):0.1112771354957745
                    Encrypted:false
                    SSDEEP:24:zFIqPAE0kwY+wJfAebfdAipV72XdAipVdV2BwGNplrkg9Sk0wu+CJ9b:mqBPrfdASB2XdASPo/rXYNJ9
                    MD5:AB5A0A12EEADBE80694DF46E0AB79F62
                    SHA1:8E5980EDE5CF477AD00E0BE562D3D094737588B9
                    SHA-256:A4224F9F5709902B258BF38490A4FF74BFE3A4E1232A577FCA39D6B4680B1BDD
                    SHA-512:B0EB3435D4FB96FCF592B645130603643DC8CFB42E774105D8B1E8540796732A7C1CF04AD9B13E34FD3CF0EA50CE79C000F85F5DA49C926FAA41C5CAD0B26143
                    Malicious:false
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):0.07150915138307373
                    Encrypted:false
                    SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOL7BDsc+B7R7kIgVky6lit/:2F0i8n0itFzDHFfmtRkCit/
                    MD5:7FFC53FE45A6E495C9024D66AE1712A1
                    SHA1:E8FD316F9FFF4731283C63302E064448F7AE0C5B
                    SHA-256:B4BC0B01676BAC54694FA20D972BBF1AD63A57F9ADEAFB349118D8F21ED20C1D
                    SHA-512:674B314E388751BDF91DE86DBF70841E2B18C2AE2E462EF72918FABD532247B8BB8090396297C46CDD5BFCF2FE68E6F731DA7A6CE9ADF9A68BF657BA78492F9C
                    Malicious:false
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:ASCII text, with CRLF, CR, LF line terminators
                    Category:dropped
                    Size (bytes):205
                    Entropy (8bit):4.707542624470352
                    Encrypted:false
                    SSDEEP:3:RGXKRjN3MZ9aSLKLbzXDD9jmKXVM8/FAJoDYRJ50ACFkYLIZILDlzsLDIZJ0gEn:zx3MmSLQHtBXVNsRj0kHwD0DIZJQn
                    MD5:7FAEE4F4623A57B77908F193F47336F4
                    SHA1:443782BFA3F9EA0AAC6E256BB7BDDD5552A762F3
                    SHA-256:F97EA661036D2A9CB59B10B2C0D81FE1C3D20A40BF527DDEEC97DBFF8309BCC0
                    SHA-512:60A0073B34F8890068B244009E234F430D849234221938BD9CA7331385787B0330E082FB09C69E662E3BA02C2C0E9957696FFD6F9455ED7BEBCEBB8F64153095
                    Malicious:false
                    Preview:Microsoft (R) File Expansion Utility..Copyright (c) Microsoft Corporation. All rights reserved.....Adding files\mafiachroom.exe to Extraction Queue....Expanding Files ........Expanding Files Complete .....
                    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Google Chrome - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 123.0.6312.122, Subject: Google Chrome - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Google LLC, Keywords: Installer, Template: x64;1033, Revision Number: {13CFB811-92D4-4E78-880A-3A795941D09C}, Create Time/Date: Thu Jan 11 14:59:38 2024, Last Saved Time/Date: Thu Jan 11 14:59:38 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
                    Entropy (8bit):7.805123646694037
                    TrID:
                    • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                    File name:Iu4csQ2rwX.msi
                    File size:1'552'384 bytes
                    MD5:6d3f68d31efc5fc456850af228427c25
                    SHA1:487fcaaab61ce4e76d6a1e2568cf3602a5f6632b
                    SHA256:147f810affa8a7f95cc8a15cc5918933d3cf430232e132b340180d3878951974
                    SHA512:e1c26181065ad69078e281154f741d318ceec9d412c030a89397e6d27ff89c224ed7f106b68892f41309264830e48255ff114369985206efe9c5311f8725df3d
                    SSDEEP:24576:kt9cpVDhOXLcVXyEq9GRhv9cWP8rtPN01Mq7+xtA+w9TxDfoUBoiGt+eWilfdqF6:jpRhOXLcJyEq9GRhvVqtV01Mq7kctDAo
                    TLSH:057501113BD8C03AE2FA0A3199FA976529B5BD364B30D0CF27D0799D0A30AD2E935757
                    File Content Preview:........................>......................................................................................................................................................................................................................................
                    Icon Hash:2d2e3797b32b2b99
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 25, 2024 10:47:26.357072115 CEST49675443192.168.2.4173.222.162.32
                    Apr 25, 2024 10:47:35.966362000 CEST49675443192.168.2.4173.222.162.32
                    Apr 25, 2024 10:47:48.810199976 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:48.810280085 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:48.810368061 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:48.812083006 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:48.812129021 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.269664049 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.269767046 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.273318052 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.273344994 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.273765087 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.325696945 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.683531046 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.724158049 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965398073 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965450048 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965468884 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965486050 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965517044 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.965527058 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965547085 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965549946 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.965575933 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965603113 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.965632915 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.965748072 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965817928 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.965842962 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.965962887 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.966065884 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.979201078 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.979237080 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:47:49.979264975 CEST49732443192.168.2.452.165.165.26
                    Apr 25, 2024 10:47:49.979280949 CEST4434973252.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:28.910095930 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:28.910185099 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:28.910285950 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:28.910759926 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:28.910794973 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.343679905 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.343822956 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:29.352567911 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:29.352602959 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.352817059 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.369484901 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:29.412143946 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.767426014 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.767457008 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.767471075 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.767612934 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:29.767653942 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.767688036 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.767714977 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.767759085 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.767765045 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:29.767865896 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:29.779992104 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:29.780030012 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:29.780060053 CEST49743443192.168.2.452.165.165.26
                    Apr 25, 2024 10:48:29.780075073 CEST4434974352.165.165.26192.168.2.4
                    Apr 25, 2024 10:48:43.826752901 CEST4972380192.168.2.4199.232.214.172
                    Apr 25, 2024 10:48:43.826853991 CEST4972480192.168.2.423.47.204.65
                    Apr 25, 2024 10:48:43.936372995 CEST8049723199.232.214.172192.168.2.4
                    Apr 25, 2024 10:48:43.936436892 CEST8049723199.232.214.172192.168.2.4
                    Apr 25, 2024 10:48:43.936474085 CEST804972423.47.204.65192.168.2.4
                    Apr 25, 2024 10:48:43.936496973 CEST4972380192.168.2.4199.232.214.172
                    Apr 25, 2024 10:48:43.936696053 CEST4972480192.168.2.423.47.204.65
                    Apr 25, 2024 10:52:24.594404936 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:24.594500065 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:24.594568014 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:24.594871044 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:24.594907045 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:24.981863976 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:24.981941938 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.001264095 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.001300097 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:25.001537085 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:25.001595974 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.002048016 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.002091885 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.002130032 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:25.126816988 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:25.127074003 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.224857092 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:25.224936962 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:25.224936008 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.224987984 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.225028992 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.225059032 CEST4434977220.42.65.94192.168.2.4
                    Apr 25, 2024 10:52:25.225081921 CEST49772443192.168.2.420.42.65.94
                    Apr 25, 2024 10:52:25.225107908 CEST49772443192.168.2.420.42.65.94
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 25, 2024 10:47:54.395257950 CEST138138192.168.2.4192.168.2.255
                    Apr 25, 2024 10:48:55.811685085 CEST5894053192.168.2.41.1.1.1
                    Apr 25, 2024 10:48:55.953551054 CEST53589401.1.1.1192.168.2.4
                    Apr 25, 2024 10:49:09.123240948 CEST5920953192.168.2.41.1.1.1
                    Apr 25, 2024 10:49:09.271899939 CEST53592091.1.1.1192.168.2.4
                    Apr 25, 2024 10:50:03.685446978 CEST6522653192.168.2.41.1.1.1
                    Apr 25, 2024 10:50:04.330130100 CEST53652261.1.1.1192.168.2.4
                    Apr 25, 2024 10:50:17.703218937 CEST6073853192.168.2.41.1.1.1
                    Apr 25, 2024 10:50:17.847084045 CEST53607381.1.1.1192.168.2.4
                    Apr 25, 2024 10:50:22.857733965 CEST5242353192.168.2.41.1.1.1
                    Apr 25, 2024 10:50:23.002460957 CEST53524231.1.1.1192.168.2.4
                    Apr 25, 2024 10:51:47.077300072 CEST5744553192.168.2.41.1.1.1
                    Apr 25, 2024 10:51:47.233153105 CEST53574451.1.1.1192.168.2.4
                    Apr 25, 2024 10:51:55.034885883 CEST138138192.168.2.4192.168.2.255
                    Apr 25, 2024 10:52:27.888819933 CEST5955953192.168.2.41.1.1.1
                    Apr 25, 2024 10:52:28.031111956 CEST53595591.1.1.1192.168.2.4
                    Apr 25, 2024 10:52:35.458952904 CEST6440353192.168.2.41.1.1.1
                    Apr 25, 2024 10:52:35.599688053 CEST53644031.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Apr 25, 2024 10:48:55.811685085 CEST192.168.2.41.1.1.10xb509Standard query (0)twinks234.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:49:09.123240948 CEST192.168.2.41.1.1.10x69b4Standard query (0)twinks234.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:50:03.685446978 CEST192.168.2.41.1.1.10x3a78Standard query (0)twinks234.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:50:17.703218937 CEST192.168.2.41.1.1.10xb636Standard query (0)twinks234.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:50:22.857733965 CEST192.168.2.41.1.1.10x80dcStandard query (0)twinks234.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:51:47.077300072 CEST192.168.2.41.1.1.10x9a25Standard query (0)twinks234.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:52:27.888819933 CEST192.168.2.41.1.1.10x1f88Standard query (0)twinks234.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:52:35.458952904 CEST192.168.2.41.1.1.10xa4e0Standard query (0)twinks234.duckdns.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Apr 25, 2024 10:48:55.953551054 CEST1.1.1.1192.168.2.40xb509Name error (3)twinks234.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:49:09.271899939 CEST1.1.1.1192.168.2.40x69b4Name error (3)twinks234.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:50:04.330130100 CEST1.1.1.1192.168.2.40x3a78Name error (3)twinks234.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:50:17.847084045 CEST1.1.1.1192.168.2.40xb636Name error (3)twinks234.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:50:23.002460957 CEST1.1.1.1192.168.2.40x80dcName error (3)twinks234.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:51:47.233153105 CEST1.1.1.1192.168.2.40x9a25Name error (3)twinks234.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:52:28.031111956 CEST1.1.1.1192.168.2.40x1f88Name error (3)twinks234.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Apr 25, 2024 10:52:35.599688053 CEST1.1.1.1192.168.2.40xa4e0Name error (3)twinks234.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    • slscr.update.microsoft.com
                    • self.events.data.microsoft.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.44973252.165.165.26443
                    TimestampBytes transferredDirectionData
                    2024-04-25 08:47:49 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=dp3LT5UDBFGklVa&MD=ECx2K67C HTTP/1.1
                    Connection: Keep-Alive
                    Accept: */*
                    User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                    Host: slscr.update.microsoft.com
                    2024-04-25 08:47:49 UTC560INHTTP/1.1 200 OK
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Content-Type: application/octet-stream
                    Expires: -1
                    Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                    ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                    MS-CorrelationId: b0e71776-0bd4-4ea6-9d26-7208b945f93c
                    MS-RequestId: 383cb0a1-9f37-40d9-887d-ee42ee00ec4c
                    MS-CV: 5dKKkv/7mUy4ElkH.0
                    X-Microsoft-SLSClientCache: 2880
                    Content-Disposition: attachment; filename=environment.cab
                    X-Content-Type-Options: nosniff
                    Date: Thu, 25 Apr 2024 08:47:49 GMT
                    Connection: close
                    Content-Length: 24490
                    2024-04-25 08:47:49 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                    Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                    2024-04-25 08:47:49 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                    Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.44974352.165.165.26443
                    TimestampBytes transferredDirectionData
                    2024-04-25 08:48:29 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=dp3LT5UDBFGklVa&MD=ECx2K67C HTTP/1.1
                    Connection: Keep-Alive
                    Accept: */*
                    User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                    Host: slscr.update.microsoft.com
                    2024-04-25 08:48:29 UTC560INHTTP/1.1 200 OK
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Content-Type: application/octet-stream
                    Expires: -1
                    Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                    ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_2160"
                    MS-CorrelationId: 549f4037-8c32-418c-b86d-760d162671f2
                    MS-RequestId: 925fdb06-43fc-43d5-81cc-9b1c9a057b4a
                    MS-CV: 4YOtuEDO+0mte0Sw.0
                    X-Microsoft-SLSClientCache: 2160
                    Content-Disposition: attachment; filename=environment.cab
                    X-Content-Type-Options: nosniff
                    Date: Thu, 25 Apr 2024 08:48:29 GMT
                    Connection: close
                    Content-Length: 25457
                    2024-04-25 08:48:29 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
                    Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
                    2024-04-25 08:48:29 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
                    Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


                    Session IDSource IPSource PortDestination IPDestination Port
                    2192.168.2.44977220.42.65.94443
                    TimestampBytes transferredDirectionData
                    2024-04-25 08:52:24 UTC828OUTPOST /OneCollector/1.0/ HTTP/1.1
                    Accept: */*
                    APIKey: cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521
                    AuthMsaDeviceTicket: t=GwAWAbuEBAAU2qcZHJoKGNizGOeyqM4OaIoSZ0MOZgAAEJanOM/f8BEauEo6GRqguxLgAJt0LBh1uWaBD08sPTthnLouxyOeqq8UXC40zxYtXUeuLL3jc98oc4sgTt8Qg5RgpVyPUGOqQCdIMU+jHj5jPNgpCOYLzgjk7/68jQbYqRpL5buJGDaKHJUU4Qzi5sjC1iwUwrkBZLfklCNSWdGai+iykzR0ELnFD4lJb88vZch+TXuihcRzjbZvJG6mFONQPa3ignNQpsSbQgkMM4xuASI/kaIM+YTU5dBQE1SH8k0CwZj5Yc3H1S94NyGSn+DeuALqccEE8gt3uchW9hnkYs9tmlAQt7GBc9BBk/kSpz+oHgE=&p=
                    Client-Id: NO_AUTH
                    Content-Encoding: deflate
                    Content-Type: application/bond-compact-binary
                    Expect: 100-continue
                    SDK-Version: EVT-Windows-C++-No-3.4.15.1
                    Upload-Time: 1714035143184
                    Host: self.events.data.microsoft.com
                    Content-Length: 7974
                    Connection: Keep-Alive
                    Cache-Control: no-cache
                    2024-04-25 08:52:24 UTC7974OUTData Raw: ed 7c 4b ac 5c 47 7a de a1 24 33 14 45 51 1c 49 a3 91 34 f2 88 26 34 93 91 d5 7d 53 ef 47 23 86 87 ba bc 33 e2 44 1c 2a bc 94 34 33 80 c1 9c ee 3e dd 7d c8 ee 3e 57 fd e0 43 f0 42 98 85 01 1b b1 11 1a 30 10 64 35 c8 22 b0 00 db 30 82 c9 22 5e 39 40 16 99 30 9b 20 4b 67 91 04 c8 c6 c8 c2 30 9c 6c 92 45 be aa 53 e7 9c ea e2 15 67 3c 18 08 1e 80 17 24 2f ff aa 3a f5 fc ff ef ff fe aa 3a e7 cd 27 f9 1e b9 2c ae 4e 26 e5 a8 b8 71 78 6f bd 29 16 e1 d7 3b 45 3e df cc ae 14 9b 7c 9c 6f f2 4b c5 6d 94 d8 af 96 eb 6a 5e 22 a1 18 7f f4 37 7f f9 d7 3f fa 9d 7f f7 af ff eb 17 3e bd 50 0d 46 63 c3 95 62 4a 51 3a 12 a3 3c cf cd 64 24 87 ac d0 cc 14 85 a1 e3 ff 7c f2 07 4f 3d f8 e2 e9 13 e5 99 0f ae dc c9 57 45 ef fc e5 e5 68 ef b7 4f d7 12 23 3d 9a 3d 78 e9 f4 89 ec c1
                    Data Ascii: |K\Gz$3EQI4&4}SG#3D*43>}>WCB0d5"0"^9@0 Kg0lESg<$/::',N&qxo);E>|oKmj^"7?>PFcbJQ:<d$|O=WEhO#==x
                    2024-04-25 08:52:25 UTC25INHTTP/1.1 100 Continue
                    2024-04-25 08:52:25 UTC443INHTTP/1.1 200 OK
                    Content-Length: 9
                    Content-Type: application/json
                    Server: Microsoft-HTTPAPI/2.0
                    Strict-Transport-Security: max-age=31536000
                    time-delta-millis: 1876
                    Access-Control-Allow-Headers: time-delta-millis
                    Access-Control-Allow-Methods: POST
                    Access-Control-Allow-Credentials: true
                    Access-Control-Allow-Origin: *
                    Access-Control-Expose-Headers: time-delta-millis
                    Date: Thu, 25 Apr 2024 08:52:24 GMT
                    Connection: close
                    {"acc":4}


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:10:47:29
                    Start date:25/04/2024
                    Path:C:\Windows\System32\msiexec.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Iu4csQ2rwX.msi"
                    Imagebase:0x7ff601ed0000
                    File size:69'632 bytes
                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:1
                    Start time:10:47:29
                    Start date:25/04/2024
                    Path:C:\Windows\System32\msiexec.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\msiexec.exe /V
                    Imagebase:0x7ff7699e0000
                    File size:69'632 bytes
                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:2
                    Start time:10:47:29
                    Start date:25/04/2024
                    Path:C:\Windows\SysWOW64\msiexec.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 49FA398F3E264BE26A418C8408A7EA4A
                    Imagebase:0x430000
                    File size:59'904 bytes
                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:3
                    Start time:10:47:30
                    Start date:25/04/2024
                    Path:C:\Windows\SysWOW64\icacls.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
                    Imagebase:0x910000
                    File size:29'696 bytes
                    MD5 hash:2E49585E4E08565F52090B144062F97E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:10:47:30
                    Start date:25/04/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:10:47:30
                    Start date:25/04/2024
                    Path:C:\Windows\SysWOW64\expand.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
                    Imagebase:0xd0000
                    File size:53'248 bytes
                    MD5 hash:544B0DBFF3F393BCE8BB9D815F532D51
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:6
                    Start time:10:47:30
                    Start date:25/04/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:7
                    Start time:10:47:31
                    Start date:25/04/2024
                    Path:C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\MW-bf5b098d-e722-4cb5-9ffe-2c0760c327a0\files\mafiachroom.exe"
                    Imagebase:0x7c0000
                    File size:1'289'216 bytes
                    MD5 hash:6E7EBD37B6095CB1A2F3FFA9D5598C81
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000007.00000002.4721202096.0000000000EE8000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000000.1669483984.00000000007C2000.00000002.00000001.01000000.00000005.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:6.2%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:58
                      Total number of Limit Nodes:6
                      execution_graph 15019 29f29c8 15020 29f2a0c SetWindowsHookExW 15019->15020 15022 29f2a52 15020->15022 15023 29f2848 15024 29f2857 15023->15024 15027 29f2862 15024->15027 15028 29f6b78 15024->15028 15032 29f6b68 15024->15032 15029 29f6b87 15028->15029 15036 29f62fc 15029->15036 15033 29f6b78 15032->15033 15034 29f62fc KiUserCallbackDispatcher 15033->15034 15035 29f6ba8 15034->15035 15035->15027 15037 29f6307 15036->15037 15040 29f7a5c 15037->15040 15039 29f852e 15039->15039 15041 29f7a67 15040->15041 15042 29f9054 15041->15042 15044 29fa8e0 15041->15044 15042->15039 15045 29fa901 15044->15045 15046 29fa925 15045->15046 15048 29faa90 15045->15048 15046->15042 15049 29faa9d 15048->15049 15050 29faad6 15049->15050 15052 29f8cdc 15049->15052 15050->15046 15053 29f8ce7 15052->15053 15055 29fab6f 15053->15055 15056 29f8d10 15053->15056 15057 29f8d1b 15056->15057 15060 29f8d20 15057->15060 15059 29fabb7 15059->15053 15061 29f8d2b 15060->15061 15066 29fb9f4 15061->15066 15063 29fc138 15063->15059 15064 29fa8e0 KiUserCallbackDispatcher 15064->15063 15065 29fbf10 15065->15063 15065->15064 15067 29fb9ff 15066->15067 15068 29fd31a 15067->15068 15070 29fd368 15067->15070 15068->15065 15071 29fd3bb 15070->15071 15072 29fd3c6 KiUserCallbackDispatcher 15071->15072 15073 29fd3f0 15071->15073 15072->15073 15073->15068 15074 29f7c80 15075 29f7cc6 GetCurrentProcess 15074->15075 15077 29f7d18 GetCurrentThread 15075->15077 15078 29f7d11 15075->15078 15079 29f7d4e 15077->15079 15080 29f7d55 GetCurrentProcess 15077->15080 15078->15077 15079->15080 15081 29f7d8b 15080->15081 15086 29f7e50 15081->15086 15089 29f7e60 15081->15089 15082 29f7db3 GetCurrentThreadId 15083 29f7de4 15082->15083 15092 29f785c 15086->15092 15090 29f7e8e 15089->15090 15091 29f785c DuplicateHandle 15089->15091 15090->15082 15091->15090 15093 29f7ec8 DuplicateHandle 15092->15093 15094 29f7e8e 15093->15094 15094->15082

                      Control-flow Graph

                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 029F7CFE
                      • GetCurrentThread.KERNEL32 ref: 029F7D3B
                      • GetCurrentProcess.KERNEL32 ref: 029F7D78
                      • GetCurrentThreadId.KERNEL32 ref: 029F7DD1
                      Memory Dump Source
                      • Source File: 00000007.00000002.4721659468.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_29f0000_mafiachroom.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 45d29d906790a5fd665320101dc2242021ecd3633f3636222e7e8fd2d570af73
                      • Instruction ID: a51891f713bb185ce8b9240f7ef7f9f619f8b344f2716e625d593f26daba166c
                      • Opcode Fuzzy Hash: 45d29d906790a5fd665320101dc2242021ecd3633f3636222e7e8fd2d570af73
                      • Instruction Fuzzy Hash: 035143B0900349CFDB54CFA9D548BEEFBF1AF48314F208459E519A72A0CB35A884CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 029F7CFE
                      • GetCurrentThread.KERNEL32 ref: 029F7D3B
                      • GetCurrentProcess.KERNEL32 ref: 029F7D78
                      • GetCurrentThreadId.KERNEL32 ref: 029F7DD1
                      Memory Dump Source
                      • Source File: 00000007.00000002.4721659468.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_29f0000_mafiachroom.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 7b16995db174f6a8dabeaad0c3bc10a57caee70afe0ef27d096516f6442947fb
                      • Instruction ID: 9557d37b2f0dc406dfe6fd3192e02611d74b43f87506813fbbb3d89bda5c0363
                      • Opcode Fuzzy Hash: 7b16995db174f6a8dabeaad0c3bc10a57caee70afe0ef27d096516f6442947fb
                      • Instruction Fuzzy Hash: 725143B0900349CFDB54CFA9D548BEEFBF1AF48314F20845AE519A72A0CB35A984CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 410 29f785c-29f7f5c DuplicateHandle 412 29f7f5e-29f7f64 410->412 413 29f7f65-29f7f82 410->413 412->413
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,029F7E8E,?,?,?,?,?), ref: 029F7F4F
                      Memory Dump Source
                      • Source File: 00000007.00000002.4721659468.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_29f0000_mafiachroom.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: a3b24e10c6efd6fee7eaceb9f00257b95e72af07194a7a152bc8f6691ba67619
                      • Instruction ID: 6a8e5047d39a755026639adc9ab5054d309c52a4251e1aa5bd2ad21834ce3271
                      • Opcode Fuzzy Hash: a3b24e10c6efd6fee7eaceb9f00257b95e72af07194a7a152bc8f6691ba67619
                      • Instruction Fuzzy Hash: AF2105B5900208EFDB50CF99D984ADEFFF4EB48320F14801AE958A7310D374A940CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 416 29f7ec0-29f7f5c DuplicateHandle 417 29f7f5e-29f7f64 416->417 418 29f7f65-29f7f82 416->418 417->418
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,029F7E8E,?,?,?,?,?), ref: 029F7F4F
                      Memory Dump Source
                      • Source File: 00000007.00000002.4721659468.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_29f0000_mafiachroom.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 9aae9dfa3dc0de8791984d6d784217a03eba69a922205352ed0c23325171e9d7
                      • Instruction ID: 1a366587cc05fb09cb9bdca3e524c636dfeebb535c137832686871ac4a2d84d5
                      • Opcode Fuzzy Hash: 9aae9dfa3dc0de8791984d6d784217a03eba69a922205352ed0c23325171e9d7
                      • Instruction Fuzzy Hash: 4021E3B5D00258DFDB10CFA9D984ADEBBF4EB48324F14801AE958A7310D374A950CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 421 29f29c3-29f2a12 424 29f2a1e-29f2a50 SetWindowsHookExW 421->424 425 29f2a14 421->425 426 29f2a59-29f2a7e 424->426 427 29f2a52-29f2a58 424->427 428 29f2a1c 425->428 427->426 428->424
                      APIs
                      • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 029F2A43
                      Memory Dump Source
                      • Source File: 00000007.00000002.4721659468.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_29f0000_mafiachroom.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: 2603b90c1b77bdd9b99872a5f1b86c26028d94bbb91aa4a94715cd0805839d19
                      • Instruction ID: f1ae6b5f479cf988de0d51538bf0c2cede08e348803bf1647e538190de15fc06
                      • Opcode Fuzzy Hash: 2603b90c1b77bdd9b99872a5f1b86c26028d94bbb91aa4a94715cd0805839d19
                      • Instruction Fuzzy Hash: C12135B1D002099FDB54DFA9C844BDEFBF5EB88324F148429D458A7250C774A940CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 432 29f29c8-29f2a12 434 29f2a1e-29f2a50 SetWindowsHookExW 432->434 435 29f2a14 432->435 436 29f2a59-29f2a7e 434->436 437 29f2a52-29f2a58 434->437 438 29f2a1c 435->438 437->436 438->434
                      APIs
                      • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 029F2A43
                      Memory Dump Source
                      • Source File: 00000007.00000002.4721659468.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_29f0000_mafiachroom.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: 6e03dfd290b90f9af8ba924fa368616cb25fb8b9b21c2ad5b54c2b88a074a7ee
                      • Instruction ID: c58136a29f7a62ce762b1fe15f88a6be6d09d849b5a55f6c92cf825ddfef4dd9
                      • Opcode Fuzzy Hash: 6e03dfd290b90f9af8ba924fa368616cb25fb8b9b21c2ad5b54c2b88a074a7ee
                      • Instruction Fuzzy Hash: 182135B1D002099FDB54DF99C844BDEFBF4AB88324F108429D458A7250C774A940CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 442 29fd368-29fd3c4 444 29fd3c6-29fd3ee KiUserCallbackDispatcher 442->444 445 29fd412-29fd42b 442->445 446 29fd3f7-29fd40b 444->446 447 29fd3f0-29fd3f6 444->447 446->445 447->446
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 029FD3DD
                      Memory Dump Source
                      • Source File: 00000007.00000002.4721659468.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_29f0000_mafiachroom.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: 478fa80e2ece88238dcb6d27c464f52187a30d6a639c728cd174177d88bba4ff
                      • Instruction ID: b48d665e27b531663950a29ba3474c8071557e85b1219381aead3e2f8ceae90a
                      • Opcode Fuzzy Hash: 478fa80e2ece88238dcb6d27c464f52187a30d6a639c728cd174177d88bba4ff
                      • Instruction Fuzzy Hash: 2711A9758043898ACB10CF99D9063EEBFF4AB05324F18805AE584A3281C778AA44CFA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000007.00000002.4721492874.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_137d000_mafiachroom.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce29d16a444d408bc73b7dd42741149030226440910affea18099bd32d8200a4
                      • Instruction ID: 6374591c26ab59b5d85524210c5599f223225b096ef5a9b973c1b2d6fd309c6a
                      • Opcode Fuzzy Hash: ce29d16a444d408bc73b7dd42741149030226440910affea18099bd32d8200a4
                      • Instruction Fuzzy Hash: 762145B1500204EFDB21DF58D9C0B66BF65FF88328F20C169E8091B656C73AE446C7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000007.00000002.4721521530.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_138d000_mafiachroom.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6873b187699cd8a39eb93d093f9ed5828e86566bab37412926bde3218a7740a5
                      • Instruction ID: 5db5fae831d5ee304ee522c7c999861fe74139cbb846264699579c1f44111add
                      • Opcode Fuzzy Hash: 6873b187699cd8a39eb93d093f9ed5828e86566bab37412926bde3218a7740a5
                      • Instruction Fuzzy Hash: 3D210471504304EFDB45EF58D9C4B26BBA5FF88318F20C56DD80A4B296C73AD446CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000007.00000002.4721492874.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_137d000_mafiachroom.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                      • Instruction ID: e84c33c8570341c9940b8f89567a2cfe4073950b37b4a6aa80bc703751cbc665
                      • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                      • Instruction Fuzzy Hash: 8311EE72404280CFCB12CF54D9C4B56BF72FF84328F24C6A9D8490B656C33AE45ACBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000007.00000002.4721521530.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_138d000_mafiachroom.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                      • Instruction ID: 839847d8b8b3443be57b0803e95191452638c7e0a902ff1fad243e6f84e87294
                      • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                      • Instruction Fuzzy Hash: 5911BB75504380DFDB06DF54D9C4B15BFA1FB84218F24C6AAD8094B296C33AD44ACB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000007.00000002.4721659468.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_29f0000_mafiachroom.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 61a8bbee9af54e39457bab50de75905475c1159752bb4bc3ff92883d0042d413
                      • Instruction ID: 4279fa16ec3c39e14aea80561e1bec7f579acb712ef9441c6c805c652881f6d4
                      • Opcode Fuzzy Hash: 61a8bbee9af54e39457bab50de75905475c1159752bb4bc3ff92883d0042d413
                      • Instruction Fuzzy Hash: 99527C31A00619CFCB95CF64C880BAEB7B6FF44304F5588A9EA59AB261D770FD85CB50
                      Uniqueness

                      Uniqueness Score: -1.00%