Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MTInstaller.exe

Overview

General Information

Sample name:MTInstaller.exe
Analysis ID:1431575
MD5:3a38166fc254e5630a73e765a5880fbd
SHA1:fde054010b649c93ee8599f61fb734ca2b2e2ad5
SHA256:0a340e8b88720ee6a908dc768de6210dced54bde6d491e91d6fbc9f66e905c44
Infos:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Uses Windows timers to delay execution
Allocates memory with a write watch (potentially for evading sandboxes)
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample may be VM or Sandbox-aware, try analysis on a native machine
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • MTInstaller.exe (PID: 3924 cmdline: "C:\Users\user\Desktop\MTInstaller.exe" MD5: 3A38166FC254E5630A73E765A5880FBD)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: MTInstaller.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: MTInstaller.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\uica.pdb source: MTInstaller.exe
Source: Binary string: E:\TeamCity-BuildAgent1\work\7ee93833781f805a\MT4\MT4Bootstrapper\obj\x86\Release\MTInstaller.pdb source: MTInstaller.exe
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\wixca.pdb source: MTInstaller.exe
Source: Binary string: E:\TeamCity-BuildAgent1\work\7ee93833781f805a\MT4\MT4Bootstrapper\obj\x86\Release\MTInstaller.pdbP source: MTInstaller.exe
Source: MTInstaller.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: MTInstaller.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: MTInstaller.exeString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: MTInstaller.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: MTInstaller.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: MTInstaller.exeString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: MTInstaller.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: MTInstaller.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: MTInstaller.exeString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
Source: MTInstaller.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: MTInstaller.exe, 00000000.00000002.3381107185.0000000004661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/MainWindow.xamld
Source: MTInstaller.exe, 00000000.00000002.3381107185.0000000004661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/MainWindow.xaml
Source: MTInstaller.exe, 00000000.00000002.3381107185.0000000004661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/mainwindow.baml
Source: MTInstaller.exe, 00000000.00000002.3381107185.0000000004661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/mainwindow.bamld
Source: MTInstaller.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: MTInstaller.exeString found in binary or memory: http://ocsp.digicert.com0K
Source: MTInstaller.exeString found in binary or memory: http://ocsp.digicert.com0N
Source: MTInstaller.exeString found in binary or memory: http://ocsp.digicert.com0O
Source: MTInstaller.exeString found in binary or memory: http://schemas.micr
Source: MTInstaller.exeString found in binary or memory: http://wixtoolset.org
Source: MTInstaller.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: MTInstaller.exe, 00000000.00000002.3378721998.000000000272E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MTInstaller.exe
Source: MTInstaller.exe, 00000000.00000000.2129581296.00000000020EC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs MTInstaller.exe
Source: MTInstaller.exe, 00000000.00000000.2129581296.00000000020EC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuica.dll\ vs MTInstaller.exe
Source: MTInstaller.exeBinary or memory string: OriginalFilenamewixca.dll\ vs MTInstaller.exe
Source: MTInstaller.exeBinary or memory string: OriginalFilenameuica.dll\ vs MTInstaller.exe
Source: MTInstaller.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus23.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\MTInstaller.exeMutant created: NULL
Source: MTInstaller.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: MTInstaller.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.91%
Source: C:\Users\user\Desktop\MTInstaller.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: MTInstaller.exeString found in binary or memory: ckFinish&Fertig stellenTopBannerUserExitDie [ProductName]-Installation wurde unterbrochen. Das System wurde nicht ver
Source: MTInstaller.exeString found in binary or memory: Das .NET-Installationsprogramm finden Sie an folgendem Speicherort:
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: msvcp140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: msctfui.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\MTInstaller.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: MTInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: MTInstaller.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: MTInstaller.exeStatic file information: File size 24748032 > 1048576
Source: MTInstaller.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1797c00
Source: MTInstaller.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: MTInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\uica.pdb source: MTInstaller.exe
Source: Binary string: E:\TeamCity-BuildAgent1\work\7ee93833781f805a\MT4\MT4Bootstrapper\obj\x86\Release\MTInstaller.pdb source: MTInstaller.exe
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\wixca.pdb source: MTInstaller.exe
Source: Binary string: E:\TeamCity-BuildAgent1\work\7ee93833781f805a\MT4\MT4Bootstrapper\obj\x86\Release\MTInstaller.pdbP source: MTInstaller.exe
Source: C:\Users\user\Desktop\MTInstaller.exeCode function: 0_2_02CA4290 push es; ret 0_2_02CA42A0
Source: C:\Users\user\Desktop\MTInstaller.exeCode function: 0_2_02CA51B0 push es; ret 0_2_02CA51C0
Source: C:\Users\user\Desktop\MTInstaller.exeCode function: 0_2_02CA0E35 pushfd ; iretd 0_2_02CA0E39
Source: C:\Users\user\Desktop\MTInstaller.exeCode function: 0_2_02CA2782 pushad ; iretd 0_2_02CA2791
Source: C:\Users\user\Desktop\MTInstaller.exeCode function: 0_2_02CA2792 pushfd ; iretd 0_2_02CA27C1
Source: C:\Users\user\Desktop\MTInstaller.exeCode function: 0_2_02CA7CF0 push eax; ret 0_2_02CA7CF1
Source: C:\Users\user\Desktop\MTInstaller.exeCode function: 0_2_02CA2C4A push esp; retf 0_2_02CA2C59
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\MTInstaller.exeUser Timer Set: Timeout: 1msJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeUser Timer Set: Timeout: 1msJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeUser Timer Set: Timeout: 1msJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeMemory allocated: 2CA0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeMemory allocated: 4660000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeMemory allocated: 4560000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\MTInstaller.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeQueries volume information: C:\Users\user\Desktop\MTInstaller.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\MTInstaller.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
111
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory111
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
MTInstaller.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://foo/MainWindow.xaml0%Avira URL Cloudsafe
http://defaultcontainer/MainWindow.xamld0%Avira URL Cloudsafe
http://foo/bar/mainwindow.bamld0%Avira URL Cloudsafe
http://foo/bar/mainwindow.baml0%Avira URL Cloudsafe
http://schemas.micr0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://foo/bar/mainwindow.bamlMTInstaller.exe, 00000000.00000002.3381107185.0000000004661000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
low
http://foo/bar/mainwindow.bamldMTInstaller.exe, 00000000.00000002.3381107185.0000000004661000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
low
http://defaultcontainer/MainWindow.xamldMTInstaller.exe, 00000000.00000002.3381107185.0000000004661000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
low
http://foo/MainWindow.xamlMTInstaller.exe, 00000000.00000002.3381107185.0000000004661000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
low
http://wixtoolset.orgMTInstaller.exefalse
    high
    http://schemas.micrMTInstaller.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1431575
    Start date and time:2024-04-25 13:27:24 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 12s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:MTInstaller.exe
    Detection:SUS
    Classification:sus23.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 16
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • VT rate limit hit for: MTInstaller.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):7.964915190145068
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.91%
    • Win32 Executable (generic) a (10002005/4) 49.86%
    • InstallShield setup (43055/19) 0.21%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:MTInstaller.exe
    File size:24'748'032 bytes
    MD5:3a38166fc254e5630a73e765a5880fbd
    SHA1:fde054010b649c93ee8599f61fb734ca2b2e2ad5
    SHA256:0a340e8b88720ee6a908dc768de6210dced54bde6d491e91d6fbc9f66e905c44
    SHA512:f29ecdd95e791aa503774f004335324994efe3d1deaffea9e85ccfcdaa7b9a9cc40ffac226f95745a10f0f1f88bc5172c45b42fa2858c9dbe8efc426a057eff9
    SSDEEP:393216:DA2n/0/BO89VUlhCfhppWLZScgwT/I27NTTzJg1YMe5S4COYJHslKLJZ37IS07://05OCVUDmhpML6wTDg2nCOYgKVK
    TLSH:E04722A97800439AD36253B49B22F1896D3BFC1414F58494B2EFF2BF247F994D2774A2
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...,..e..............0..|y.."......z.y.. ....y...@.. ........................y...........@................................
    Icon Hash:2d2e3797b32b2b99
    Entrypoint:0x1b99b7a
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x65B40B2C [Fri Jan 26 19:42:36 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:v4.0.30319
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1799b280x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x179a0000x1e18.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x179c0000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x17999f00x1c.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x1797b800x1797c00de2dc9af23c0c7e07a8dd0c09b2dd2f8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x179a0000x1e180x20002f8f94b680c2e842f551643265f7f7f8False0.333984375data4.707468534288696IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x179c0000xc0x200acdb30225f57218798794106f7b72d14False0.044921875data0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x179a1600x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.5675675675675675
    RT_ICON0x179a2980x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.4486994219653179
    RT_ICON0x179a8100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.4637096774193548
    RT_ICON0x179ab080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 11520.3935018050541516
    RT_GROUP_ICON0x179b3c00x3edata0.8387096774193549
    RT_VERSION0x179b4100x2f4data0.42724867724867727
    RT_MANIFEST0x179b7140x6ffXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4103852596314908
    DLLImport
    mscoree.dll_CorExeMain
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:13:28:15
    Start date:25/04/2024
    Path:C:\Users\user\Desktop\MTInstaller.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\MTInstaller.exe"
    Imagebase:0xb90000
    File size:24'748'032 bytes
    MD5 hash:3A38166FC254E5630A73E765A5880FBD
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:10.9%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:0%
      Total number of Nodes:7
      Total number of Limit Nodes:0
      execution_graph 6194 2ca9480 6195 2ca948f 6194->6195 6200 2ca906c 6195->6200 6198 2ca906c SendMessageA 6199 2ca9502 6198->6199 6201 2ca9720 SendMessageA 6200->6201 6203 2ca94f2 6201->6203 6203->6198

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 2ca906c-2ca9795 SendMessageA 3 2ca979e-2ca97b2 0->3 4 2ca9797-2ca979d 0->4 4->3
      APIs
      • SendMessageA.USER32(00000000,00000080,?,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 02CA9788
      Memory Dump Source
      • Source File: 00000000.00000002.3380821278.0000000002CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CA0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2ca0000_MTInstaller.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: ebc7f585eccc43d7612ba94c8094dd4f3eac678e1c30b4bbca5b38a1f2a4b53e
      • Instruction ID: 99f75a0e465b98e433524cbf26f07c74643db22e54081811d5f945dcd4f54e3f
      • Opcode Fuzzy Hash: ebc7f585eccc43d7612ba94c8094dd4f3eac678e1c30b4bbca5b38a1f2a4b53e
      • Instruction Fuzzy Hash: A21143B58003499FCB60CF9AC485BDEBBF8FF88324F208419E518A7210C3B5A944CFA1
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 6 2ca9718-2ca9795 SendMessageA 9 2ca979e-2ca97b2 6->9 10 2ca9797-2ca979d 6->10 10->9
      APIs
      • SendMessageA.USER32(00000000,00000080,?,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 02CA9788
      Memory Dump Source
      • Source File: 00000000.00000002.3380821278.0000000002CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CA0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2ca0000_MTInstaller.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: e1c14c93adc1e7e9aae65c0afd14a72af7045c328f6b83c0757d34fb189e7c3a
      • Instruction ID: b9df8b4c3325b09ee938749ca314781bec6fbf1f88b8e6036c0766cdac042107
      • Opcode Fuzzy Hash: e1c14c93adc1e7e9aae65c0afd14a72af7045c328f6b83c0757d34fb189e7c3a
      • Instruction Fuzzy Hash: D01102B58002499FCB20DF9AC985BDEBBF4FF88324F208419E558A7250C375A544CFA1
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 623 29fe1a8-29fe1ba 624 29fe276-29fe27d 623->624 625 29fe1c0 623->625 626 29fe1c2-29fe1ce 624->626 625->626 628 29fe1d4-29fe1f6 626->628 629 29fe282-29fe287 626->629 630 29fe28c-29fe2a1 628->630 631 29fe1fc-29fe23e 628->631 629->628 635 29fe258-29fe260 630->635 634 29fe246-29fe256 631->634 634->635 636 29fe2ae 634->636 637 29fe2a3-29fe2ac 635->637 638 29fe262-29fe273 635->638 637->638
      Memory Dump Source
      • Source File: 00000000.00000002.3380231717.00000000029FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029FD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29fd000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 505b7464ff958dc758dd7943e19e0bb139151166fe2a820fc66940b0293026e2
      • Instruction ID: 3810e605572d59fdb165e9b1a6e83a731bd74166e1f3cca83a10c0429add8356
      • Opcode Fuzzy Hash: 505b7464ff958dc758dd7943e19e0bb139151166fe2a820fc66940b0293026e2
      • Instruction Fuzzy Hash: 4D31F472100200EFDF859F44C9C0F567F66FB88310F248599EF490A22AC337C461DB91
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 640 29fe09c-29fe0ae 641 29fe0b4 640->641 642 29fe162-29fe169 640->642 643 29fe0b6-29fe0c2 641->643 642->643 644 29fe16e-29fe173 643->644 645 29fe0c8-29fe0ea 643->645 644->645 647 29fe178-29fe18d 645->647 648 29fe0f0-29fe12b 645->648 652 29fe144-29fe14c 647->652 651 29fe133-29fe142 648->651 651->652 653 29fe19a 651->653 654 29fe18f-29fe198 652->654 655 29fe14e-29fe15f 652->655 654->655
      Memory Dump Source
      • Source File: 00000000.00000002.3380231717.00000000029FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029FD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29fd000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d30c561611e093e7a04d8be7d87814c63342301bd871db6b0c489c02e45ea8b5
      • Instruction ID: f7e2a8162a944d556f95978f248f90ca6a0e307b81900e1d21713da66d1bbd14
      • Opcode Fuzzy Hash: d30c561611e093e7a04d8be7d87814c63342301bd871db6b0c489c02e45ea8b5
      • Instruction Fuzzy Hash: 9C31E372204200EFDF899F50C9C0F26BF66FB88314F248598EE494E266C337D465CB61
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 657 29feb70-29feb82 658 29feb88 657->658 659 29fec32-29fec39 657->659 660 29feb8a-29feb96 658->660 659->660 662 29fec3e-29fec43 660->662 663 29feb9c-29febbe 660->663 662->663 664 29fec48-29fec5d 663->664 665 29febc4-29febfa 663->665 670 29fec14-29fec1c 664->670 668 29fec02-29fec12 665->668 669 29fec6a 668->669 668->670 671 29fec5f-29fec68 670->671 672 29fec1e-29fec2f 670->672 671->672
      Memory Dump Source
      • Source File: 00000000.00000002.3380231717.00000000029FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029FD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29fd000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 50f978e15480596166c9cbc2ad319011bbae7f628abaf02bee9cefe236f70a0e
      • Instruction ID: 9ea814b3f18d6b43aa6cb030630c1c068ce901bad65eaf5570eb060db32ceb72
      • Opcode Fuzzy Hash: 50f978e15480596166c9cbc2ad319011bbae7f628abaf02bee9cefe236f70a0e
      • Instruction Fuzzy Hash: DE31E472104244EFDF869F54D9C0F26BF66FB88324F248598FE490A266C336D466CB61
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 674 29ed06c-29ed07e 675 29ed118-29ed11f 674->675 676 29ed084 674->676 677 29ed086-29ed092 675->677 676->677 678 29ed098-29ed0ba 677->678 679 29ed124-29ed129 677->679 681 29ed12e-29ed143 678->681 682 29ed0bc-29ed0e0 678->682 679->678 686 29ed0fa-29ed102 681->686 685 29ed0e8-29ed0f8 682->685 685->686 687 29ed150 685->687 688 29ed104-29ed115 686->688 689 29ed145-29ed14e 686->689 689->688
      Memory Dump Source
      • Source File: 00000000.00000002.3380112464.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29ed000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 478216f3ac9a77e86263ef1eb726d1a53c8d23ef8fd43373020f2a821dfd5904
      • Instruction ID: 3ef8ab091a1875824cfda8a06556618fedb188c057bd00f79b7930e73aee1de3
      • Opcode Fuzzy Hash: 478216f3ac9a77e86263ef1eb726d1a53c8d23ef8fd43373020f2a821dfd5904
      • Instruction Fuzzy Hash: 60210676504244EFDF1ADF10D9C0B26BFA9FB8C314F248569E90A0B256C33AD416CBB1
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380231717.00000000029FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029FD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29fd000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3176bf576800b69026fdc0f923396c919dcf5eff6a1adba0647f828927ce07f0
      • Instruction ID: c94d7f6908ef567eaee16734aebc9b5fe4fe9ef285c67724468defbe35550e6f
      • Opcode Fuzzy Hash: 3176bf576800b69026fdc0f923396c919dcf5eff6a1adba0647f828927ce07f0
      • Instruction Fuzzy Hash: 78212275604200EFDB94DF14D9C0B26BB65FB84314F28C96DEA0A4B692C77AD407CB71
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380231717.00000000029FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029FD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29fd000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6e84ce971fca43dca508a33c6959b806fedd4a8aab47db88c79755557b2c94d4
      • Instruction ID: dc642498576fb11602f0a9a7118951f9f00fcfd4d3f0e25c0f08622434b07daf
      • Opcode Fuzzy Hash: 6e84ce971fca43dca508a33c6959b806fedd4a8aab47db88c79755557b2c94d4
      • Instruction Fuzzy Hash: 37215E76500240EFCF969F84D9C0B55BF76FB88314F248299EE480A22AD337D466DF91
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380231717.00000000029FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029FD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29fd000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2087b8d63eadebed767397e5388f447d8a1407dda94bbe0d24585625ae7399b3
      • Instruction ID: c27b50dac49fc7e5e7094113ae112c35a18aeba8978f43e0fa76e24a6d12da3d
      • Opcode Fuzzy Hash: 2087b8d63eadebed767397e5388f447d8a1407dda94bbe0d24585625ae7399b3
      • Instruction Fuzzy Hash: 5E218076404284DFCF46CF50D9C0B56BF72FB88314F248299EE490A26AC336D466DF51
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380231717.00000000029FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029FD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29fd000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 545bc4a1e8e8af4fffe1e27e2b054ac3ba41b6c78fa149a98268901144a748e4
      • Instruction ID: ec5798dc36d0229edc469768b25b1a58b002933ff3ce8c8b4c650c6281a079c3
      • Opcode Fuzzy Hash: 545bc4a1e8e8af4fffe1e27e2b054ac3ba41b6c78fa149a98268901144a748e4
      • Instruction Fuzzy Hash: E7213A76500244EFCF86CF50D9C0B56BF72FB48314F2486A9EE494A26AC336D466DB51
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380231717.00000000029FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029FD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29fd000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b722fc69e9dbe203eecce26feec1e0e4a6e7849708387a9a23793f134d2619d9
      • Instruction ID: d574840bcf88b40edceb6476c9ebdf4a634d3cc13236b431cb7020330684e9ee
      • Opcode Fuzzy Hash: b722fc69e9dbe203eecce26feec1e0e4a6e7849708387a9a23793f134d2619d9
      • Instruction Fuzzy Hash: 6921A1755093C08FCB42CF24D990715BF71EB46214F28C5EAD9498F6A7C33AD80ACB62
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380112464.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29ed000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 83fb694dd1e91a6ea135483331fab76a04ef60c4faa8ae053019808facf22284
      • Instruction ID: 86e92178ebfc5c11ecf3a41ed5ae63f38075d553923f1ce513de0599ec2b966f
      • Opcode Fuzzy Hash: 83fb694dd1e91a6ea135483331fab76a04ef60c4faa8ae053019808facf22284
      • Instruction Fuzzy Hash: 68219D76504284DFCF0ACF10D9C4B1ABF76FB88318F2486A9D9490B256C33AD426CBA1
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380112464.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29ed000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0476fe6fb950b7296139180b0ef76111882698277cef2ccfa6f5d723e25d04e1
      • Instruction ID: dc1af2548214aaf0348705930dd7d4a1bfcaab54c38d111634c4cc122efc0c83
      • Opcode Fuzzy Hash: 0476fe6fb950b7296139180b0ef76111882698277cef2ccfa6f5d723e25d04e1
      • Instruction Fuzzy Hash: D501A7715093449AFB119B15C984766BF9CEF41334F18C95AED0A4A292C7789940C6B1
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380112464.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29ed000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 97f22a036eae045540926fcf38a1a9122cd1c90bc66f29ef2647a8d7e152f709
      • Instruction ID: 42f4de0c35ef11b9c4bd277358895b22a587dffece92d32249bafe4be77464c6
      • Opcode Fuzzy Hash: 97f22a036eae045540926fcf38a1a9122cd1c90bc66f29ef2647a8d7e152f709
      • Instruction Fuzzy Hash: 1D011A72100A00AFDB619F46C980C23FBFAFF88720355895DE94A4BA21C772F851DFA0
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380112464.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29ed000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5ab183ddd506022e7c79036c3a95c9e639fa8c72c8f8c2f0c4e8c5d0e09acc5c
      • Instruction ID: 0dfe648c22d3a0785ccdcb9c8839d47e882558869d43783d6b1a5fe7230af1eb
      • Opcode Fuzzy Hash: 5ab183ddd506022e7c79036c3a95c9e639fa8c72c8f8c2f0c4e8c5d0e09acc5c
      • Instruction Fuzzy Hash: A8010C75104A40AFD7228F55C940C63BFBAFF89620719898DE9864BA22C672F812DF60
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3380112464.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_29ed000_MTInstaller.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 754671f5a93710794e760d70e04522ceaf0447788ff5582fca45092e20592a29
      • Instruction ID: 17e56e104f64ad3dfeb444d721b7766e93a8671585110eecb3db5233c47f5840
      • Opcode Fuzzy Hash: 754671f5a93710794e760d70e04522ceaf0447788ff5582fca45092e20592a29
      • Instruction Fuzzy Hash: 6EF0C2714093449EEB118B05C984B62FFDCEB80634F18C55AED094F282C378A840CAB1
      Uniqueness

      Uniqueness Score: -1.00%