Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FACT64708.msi

Overview

General Information

Sample Name:FACT64708.msi
Analysis ID:876175
MD5:03fc44504a830c0bde2155d2343c07bd
SHA1:99927989853f4d8b4a1180f25c48c37a3c763f65
SHA256:6dfd76c513f8c4216b7c0efeab797f22db13bb265fafffbb69d735b64801c4a8
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
May check the online IP address of the machine
PE file contains section with special chars
Queries the volume information (name, serial number etc) of a device
Deletes files inside the Windows folder
Creates files inside the system directory
PE file contains sections with non-standard names
JA3 SSL client fingerprint seen in connection with other malware
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Entry point lies outside standard sections
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
PE file contains more sections than normal
Checks for available system drives (often done to infect USB drives)
Dropped file seen in connection with other malware

Classification

  • System is w10x64
  • msiexec.exe (PID: 6836 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\FACT64708.msi" MD5: 4767B71A318E201188A0D0A420C8B608)
  • msiexec.exe (PID: 6800 cmdline: C:\Windows\system32\msiexec.exe /V MD5: 4767B71A318E201188A0D0A420C8B608)
    • msiexec.exe (PID: 6920 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding EC16BF9ACD034E20C79A272C76FEE245 MD5: 12C17B5A5C2A7B97342C362CA467E9A2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: FACT64708.msiReversingLabs: Detection: 22%
Source: FACT64708.msiVirustotal: Detection: 20%Perma Link
Source: C:\Windows\Installer\MSI5D1B.tmpAvira: detection malicious, Label: HEUR/AGEN.1360814
Source: C:\Windows\Installer\MSI5D1B.tmpReversingLabs: Detection: 47%
Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.4:49692 version: TLS 1.2
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbg source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:
Source: C:\Windows\System32\msiexec.exeFile opened: x:
Source: C:\Windows\System32\msiexec.exeFile opened: v:
Source: C:\Windows\System32\msiexec.exeFile opened: t:
Source: C:\Windows\System32\msiexec.exeFile opened: r:
Source: C:\Windows\System32\msiexec.exeFile opened: p:
Source: C:\Windows\System32\msiexec.exeFile opened: n:
Source: C:\Windows\System32\msiexec.exeFile opened: l:
Source: C:\Windows\System32\msiexec.exeFile opened: j:
Source: C:\Windows\System32\msiexec.exeFile opened: h:
Source: C:\Windows\System32\msiexec.exeFile opened: f:
Source: C:\Windows\System32\msiexec.exeFile opened: b:
Source: C:\Windows\System32\msiexec.exeFile opened: y:
Source: C:\Windows\System32\msiexec.exeFile opened: w:
Source: C:\Windows\System32\msiexec.exeFile opened: u:
Source: C:\Windows\System32\msiexec.exeFile opened: s:
Source: C:\Windows\System32\msiexec.exeFile opened: q:
Source: C:\Windows\System32\msiexec.exeFile opened: o:
Source: C:\Windows\System32\msiexec.exeFile opened: m:
Source: C:\Windows\System32\msiexec.exeFile opened: k:
Source: C:\Windows\System32\msiexec.exeFile opened: i:
Source: C:\Windows\System32\msiexec.exeFile opened: g:
Source: C:\Windows\System32\msiexec.exeFile opened: e:
Source: C:\Windows\System32\msiexec.exeFile opened: c:
Source: C:\Windows\System32\msiexec.exeFile opened: a:

Networking

barindex
Source: C:\Windows\SysWOW64\msiexec.exeDNS query: name: ipinfo.io
Source: C:\Windows\SysWOW64\msiexec.exeDNS query: name: ipinfo.io
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
Source: global trafficHTTP traffic detected: GET /json HTTP/1.1Accept: */*Accept-Language: en-usAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ipinfo.ioConnection: Keep-Alive
Source: global trafficTCP traffic: 192.168.2.4:49693 -> 89.44.9.236:9911
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
Source: unknownTCP traffic detected without corresponding DNS query: 89.44.9.236
Source: unknownTCP traffic detected without corresponding DNS query: 89.44.9.236
Source: unknownTCP traffic detected without corresponding DNS query: 89.44.9.236
Source: unknownTCP traffic detected without corresponding DNS query: 89.44.9.236
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://ocsp.digicert.com0C
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://ocsp.digicert.com0O
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://t2.symcb.com0
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://tl.symcd.com0&
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: http://www.digicert.com/CPS0
Source: json[1].json.2.drString found in binary or memory: https://ipinfo.io/missingauth
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: https://www.advancedinstaller.com
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: https://www.digicert.com/CPS0
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: https://www.thawte.com/cps0/
Source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drString found in binary or memory: https://www.thawte.com/repository0W
Source: unknownDNS traffic detected: queries for: ipinfo.io
Source: global trafficHTTP traffic detected: GET /json HTTP/1.1Accept: */*Accept-Language: en-usAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ipinfo.ioConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.4:49692 version: TLS 1.2

System Summary

barindex
Source: MSI5D1B.tmp.1.drStatic PE information: section name: -)JCkFdG
Source: MSI5D1B.tmp.1.drStatic PE information: section name: tUKiKjI(
Source: MSI5D1B.tmp.1.drStatic PE information: section name: >FM3ptLM
Source: MSI5D1B.tmp.1.drStatic PE information: section name: o[K?gVK3
Source: MSI5D1B.tmp.1.drStatic PE information: section name: QX]dab$M
Source: MSI5D1B.tmp.1.drStatic PE information: section name: 3MpwCE=\
Source: MSI5D1B.tmp.1.drStatic PE information: section name: i%>mQ21J
Source: MSI5D1B.tmp.1.drStatic PE information: section name: zG.-OP"_
Source: MSI5D1B.tmp.1.drStatic PE information: section name: N/Q"D33i
Source: MSI5D1B.tmp.1.drStatic PE information: section name: /1Noi&/e
Source: MSI5D1B.tmp.1.drStatic PE information: section name: H)8.=c%s
Source: MSI5D1B.tmp.1.drStatic PE information: section name: ]K1?IQ),
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI5A28.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3e573a.msiJump to behavior
Source: FACT64708.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs FACT64708.msi
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: security.dll
Source: MSI5D1B.tmp.1.drStatic PE information: Number of sections : 12 > 10
Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI5A28.tmp 5316CFAE8B4D28AB7CBC5CAB60E27B0C0F5A3210A921A4B0560769C5021C911B
Source: FACT64708.msiReversingLabs: Detection: 22%
Source: FACT64708.msiVirustotal: Detection: 20%
Source: C:\Windows\SysWOW64\msiexec.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\FACT64708.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EC16BF9ACD034E20C79A272C76FEE245
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EC16BF9ACD034E20C79A272C76FEE245
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\52612023Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF0B319199736319C6.TMPJump to behavior
Source: classification engineClassification label: mal80.troj.evad.winMSI@4/13@1/2
Source: FACT64708.msiStatic file information: TRID: Microsoft Windows Installer (77509/1) 52.16%
Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\OdoRxkqMGqDlwzYxLLNSWKJJNPqGTKcQ
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: FACT64708.msiStatic file information: File size 6022656 > 1048576
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbg source: FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.dr
Source: MSI5D1B.tmp.1.drStatic PE information: section name: -)JCkFdG
Source: MSI5D1B.tmp.1.drStatic PE information: section name: tUKiKjI(
Source: MSI5D1B.tmp.1.drStatic PE information: section name: >FM3ptLM
Source: MSI5D1B.tmp.1.drStatic PE information: section name: o[K?gVK3
Source: MSI5D1B.tmp.1.drStatic PE information: section name: QX]dab$M
Source: MSI5D1B.tmp.1.drStatic PE information: section name: 3MpwCE=\
Source: MSI5D1B.tmp.1.drStatic PE information: section name: i%>mQ21J
Source: MSI5D1B.tmp.1.drStatic PE information: section name: zG.-OP"_
Source: MSI5D1B.tmp.1.drStatic PE information: section name: N/Q"D33i
Source: MSI5D1B.tmp.1.drStatic PE information: section name: /1Noi&/e
Source: MSI5D1B.tmp.1.drStatic PE information: section name: H)8.=c%s
Source: MSI5D1B.tmp.1.drStatic PE information: section name: ]K1?IQ),
Source: initial sampleStatic PE information: section where entry point is pointing to: H)8.=c%s
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5A28.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5AF4.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5D1B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5B53.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5BB2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5A28.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5AF4.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5D1B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5B53.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5BB2.tmpJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: D50007 value: E9 7B 4C 05 77
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 77DA4C80 value: E9 8E B3 FA 88
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: D60005 value: E9 FB BF FD 76
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 77D3C000 value: E9 0A 40 02 89
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 4580008 value: E9 AB E0 7F 73
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 77D7E0B0 value: E9 60 1F 80 8C
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 45A0005 value: E9 CB 5A 03 73
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 775D5AD0 value: E9 3A A5 FC 8C
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 45B0005 value: E9 5B B0 04 73
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 775FB060 value: E9 AA 4F FB 8C
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 45C0005 value: E9 DB F8 56 70
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 74B2F8E0 value: E9 2A 07 A9 8F
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 45E0005 value: E9 FB 42 57 70
Source: C:\Windows\SysWOW64\msiexec.exeMemory written: PID: 6920 base: 74B54300 value: E9 0A BD A8 8F
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5AF4.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5B53.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5BB2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation

Anti Debugging

barindex
Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebugger
Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebugger
Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugObjectHandle
Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugObjectHandle
Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugObjectHandle
Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPort
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Masquerading
1
Credential API Hooking
21
Security Software Discovery
1
Replication Through Removable Media
1
Credential API Hooking
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Ingress Tool Transfer
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
DLL Side-Loading
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer2
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size Limits13
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
System Network Configuration Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync12
System Information Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
FACT64708.msi22%ReversingLabsWin32.Trojan.Mekotio
FACT64708.msi20%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Windows\Installer\MSI5D1B.tmp100%AviraHEUR/AGEN.1360814
C:\Windows\Installer\MSI5D1B.tmp100%Joe Sandbox ML
C:\Windows\Installer\MSI5A28.tmp0%ReversingLabs
C:\Windows\Installer\MSI5A28.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI5AF4.tmp0%ReversingLabs
C:\Windows\Installer\MSI5AF4.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI5B53.tmp0%ReversingLabs
C:\Windows\Installer\MSI5B53.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI5BB2.tmp0%ReversingLabs
C:\Windows\Installer\MSI5BB2.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI5D1B.tmp48%ReversingLabsWin32.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
ipinfo.io
34.117.59.81
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://ipinfo.io/jsonfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://ipinfo.io/missingauthjson[1].json.2.drfalse
        high
        https://www.advancedinstaller.comFACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drfalse
          high
          https://www.thawte.com/cps0/FACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drfalse
            high
            https://www.thawte.com/repository0WFACT64708.msi, MSI5AF4.tmp.1.dr, MSI5A28.tmp.1.dr, MSI5B53.tmp.1.dr, MSI5BB2.tmp.1.dr, 3e573a.msi.1.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              34.117.59.81
              ipinfo.ioUnited States
              139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
              89.44.9.236
              unknownRomania
              9009M247GBfalse
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:876175
              Start date and time:2023-05-26 12:27:38 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 5m 31s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:FACT64708.msi
              Detection:MAL
              Classification:mal80.troj.evad.winMSI@4/13@1/2
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .msi
              • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
              TimeTypeDescription
              12:28:35API Interceptor1x Sleep call for process: msiexec.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\SysWOW64\msiexec.exe
              File Type:JSON data
              Category:dropped
              Size (bytes):291
              Entropy (8bit):4.8967469240357655
              Encrypted:false
              SSDEEP:6:t9zQZQYReWa6dmXJt9pff+LZTL9H5sh76W35jY:tSZQYReF6UJtb+LZTJ+hR5k
              MD5:040A92AD0D71B75A0D1B5A297F0494CB
              SHA1:7817841B5594768C433D5BA8C60219B512EBEF71
              SHA-256:4F216FD803061045D0E9B593D4C68F0AAFED3877110B4B3616503F1C359B3D58
              SHA-512:51EF832E7CC8DC4A4F043F75C28C2E80A56C8A01D5DA4F13A11619627F08E880A2D888F2305C5897B720EEACB4DD22C35266032D591B5FE33740D06BB0ED3504
              Malicious:false
              Reputation:low
              Preview:{. "ip": "84.17.52.45",. "hostname": "unn-84-17-52-45.cdn77.com",. "city": "Z.rich",. "region": "Zurich",. "country": "CH",. "loc": "47.3876,8.5207",. "org": "AS212238 Datacamp Limited",. "postal": "8005",. "timezone": "Europe/Zurich",. "readme": "https://ipinfo.io/missingauth".}
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {99C5E16F-1B9A-4372-8446-788EB651135D}, Number of Words: 10, Subject: window1, Author: window1, Name of Creating Application: Advanced Installer 18.1 build 4fb1edbd, Template: ;1033, Comments: window1, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
              Category:dropped
              Size (bytes):6022656
              Entropy (8bit):7.898523988528081
              Encrypted:false
              SSDEEP:98304:PYebmgplKxsvkwtfTZ6Of7Ok2NKJTNkcDW1FqjId56KahqOxYmNrwC8ICpqtMHA:ragplKxsvkwtfF56iTNkc6FqjId1OxbP
              MD5:03FC44504A830C0BDE2155D2343C07BD
              SHA1:99927989853F4D8B4A1180F25C48C37A3C763F65
              SHA-256:6DFD76C513F8C4216B7C0EFEAB797F22DB13BB265FAFFFBB69D735B64801C4A8
              SHA-512:6B12E4E6BC274722383F0148E80281C486B53EFB5EADF598359D8AFD2A9497CCFF3E459B7EA2608ABF5FB0DFF97426684DCC1920766680674A83AD9E571C6339
              Malicious:false
              Reputation:low
              Preview:......................>...................\...................................~...............................................................................................................................................................................................................................................................................................................................................L*..M*..N*..O*..P*..Q*......................................................................................a...............1...%........................................................................................... ...!..."...#...$.../...0...'...(...)...*...+...,...-...........2...6...@...3...4...5...8...7...>...9...:...;...<...=...J-..?...A...B...F...C...D...E...i-.._...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^.......`...b...s...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...t...E*..u...v...w...x...y...z...
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):385960
              Entropy (8bit):6.405611935418631
              Encrypted:false
              SSDEEP:6144:krDow+ZsrLg3bmfKlGzIqSqYf+SAO/VKEPM5TiyX:Mowv43bqKlRH1Vq9iyX
              MD5:E12C5BCC254C953B1A46D1434804F4D2
              SHA1:99F67ACF34AF1294F3C6E5EB521C862E1C772397
              SHA-256:5316CFAE8B4D28AB7CBC5CAB60E27B0C0F5A3210A921A4B0560769C5021C911B
              SHA-512:9A61AA00B651FC616CD09D28F4A6B872889A026C61D818595A82C58FDFF187E3AD57916C2B8690D1E7016D73A05435E13A85758917CFB89029B34C4A1685AA0B
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Virustotal, Detection: 0%, Browse
              Reputation:moderate, very likely benign file
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........{........................?.........................................................C......C.......C.............C.......Rich............PE..L....Y`.........."!................ZV..............................................m.....@.........................`l......4t..........0........................>..8...p...............................@............... ............................text...O........................... ..`.rdata..............................@..@.data................x..............@....rsrc...0...........................@..@.reloc...>.......@..................@..B........................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):385960
              Entropy (8bit):6.405611935418631
              Encrypted:false
              SSDEEP:6144:krDow+ZsrLg3bmfKlGzIqSqYf+SAO/VKEPM5TiyX:Mowv43bqKlRH1Vq9iyX
              MD5:E12C5BCC254C953B1A46D1434804F4D2
              SHA1:99F67ACF34AF1294F3C6E5EB521C862E1C772397
              SHA-256:5316CFAE8B4D28AB7CBC5CAB60E27B0C0F5A3210A921A4B0560769C5021C911B
              SHA-512:9A61AA00B651FC616CD09D28F4A6B872889A026C61D818595A82C58FDFF187E3AD57916C2B8690D1E7016D73A05435E13A85758917CFB89029B34C4A1685AA0B
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Virustotal, Detection: 0%, Browse
              Reputation:moderate, very likely benign file
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........{........................?.........................................................C......C.......C.............C.......Rich............PE..L....Y`.........."!................ZV..............................................m.....@.........................`l......4t..........0........................>..8...p...............................@............... ............................text...O........................... ..`.rdata..............................@..@.data................x..............@....rsrc...0...........................@..@.reloc...>.......@..................@..B........................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):385960
              Entropy (8bit):6.405611935418631
              Encrypted:false
              SSDEEP:6144:krDow+ZsrLg3bmfKlGzIqSqYf+SAO/VKEPM5TiyX:Mowv43bqKlRH1Vq9iyX
              MD5:E12C5BCC254C953B1A46D1434804F4D2
              SHA1:99F67ACF34AF1294F3C6E5EB521C862E1C772397
              SHA-256:5316CFAE8B4D28AB7CBC5CAB60E27B0C0F5A3210A921A4B0560769C5021C911B
              SHA-512:9A61AA00B651FC616CD09D28F4A6B872889A026C61D818595A82C58FDFF187E3AD57916C2B8690D1E7016D73A05435E13A85758917CFB89029B34C4A1685AA0B
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Virustotal, Detection: 0%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........{........................?.........................................................C......C.......C.............C.......Rich............PE..L....Y`.........."!................ZV..............................................m.....@.........................`l......4t..........0........................>..8...p...............................@............... ............................text...O........................... ..`.rdata..............................@..@.data................x..............@....rsrc...0...........................@..@.reloc...>.......@..................@..B........................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):385960
              Entropy (8bit):6.405611935418631
              Encrypted:false
              SSDEEP:6144:krDow+ZsrLg3bmfKlGzIqSqYf+SAO/VKEPM5TiyX:Mowv43bqKlRH1Vq9iyX
              MD5:E12C5BCC254C953B1A46D1434804F4D2
              SHA1:99F67ACF34AF1294F3C6E5EB521C862E1C772397
              SHA-256:5316CFAE8B4D28AB7CBC5CAB60E27B0C0F5A3210A921A4B0560769C5021C911B
              SHA-512:9A61AA00B651FC616CD09D28F4A6B872889A026C61D818595A82C58FDFF187E3AD57916C2B8690D1E7016D73A05435E13A85758917CFB89029B34C4A1685AA0B
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Virustotal, Detection: 0%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........{........................?.........................................................C......C.......C.............C.......Rich............PE..L....Y`.........."!................ZV..............................................m.....@.........................`l......4t..........0........................>..8...p...............................@............... ............................text...O........................... ..`.rdata..............................@..@.data................x..............@....rsrc...0...........................@..@.reloc...>.......@..................@..B........................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):1024
              Entropy (8bit):5.430964541776944
              Encrypted:false
              SSDEEP:12:EgkgwGcYGqVXjOvl/HdftEuzWot3DEaFVrHDFuyHoAnF9c2LCHMapUerHDkBF6z5:sg1jOvqu6aD3FGwFCOaZpUeuFP3gxP
              MD5:DFD2E812A18033D5509D6CF512ABDFA1
              SHA1:96BEA2FFD51F2F955B861202ED03CCA656AFD7C4
              SHA-256:349749063EF9F847A3B30DE5CDDA8FDD82B1BD70C212B0D44335091A65298C51
              SHA-512:901EC55D51CB0F063D9F73CF5D52E40B977539DE7F185C594804816D35293D2EBA6DC2168765AA9479D9EE586E2CDA594BDB254F66DC1098290A38ED3FD94285
              Malicious:false
              Preview:...@IXOS.@.....@.c.V.@.....@.....@.....@.....@.....@......&.{391D3F83-F57B-4C37-B67D-2C3B478539D3}..window1..FACT64708.msi.@.....@.....@.....@........&.{99C5E16F-1B9A-4372-8446-788EB651135D}.....@.....@.....@.....@.......@.....@.....@.......@......window1......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{834560BB-AEF7-41F4-8F91-5C709439D783}/.C:\Users\user\AppData\Roaming\window1\window1\.@.......@.....@.....@......&.{9AEF0A6B-1957-4029-A776-FFD21A9C24C0}$.01:\Software\window1\window1\Version.@.......@.....@.....@......&.{03700A98-4FE2-4FD5-B1F2-05F76E7E670A}..C:\ProgramData\5.txt.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]"./.C:\Users\user\AppData\Roaming\window1\window1\.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@.....@........C:\ProgramData\.. .1\COMMON~1\|CommonAppDataFolde
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:modified
              Size (bytes):5430272
              Entropy (8bit):7.959731815381645
              Encrypted:false
              SSDEEP:98304:QmgplKxsvkwtfTZ6Of7Ok2NKJTNkcDW1FqjId56KahqOxYmNrwC8ICp:pgplKxsvkwtfF56iTNkc6FqjId1Oxb8
              MD5:9736B1A5AC470116328B9584DF71F894
              SHA1:77AA1DDBC5CC4498E2E50AD6CE0E425F880BAC97
              SHA-256:4EF0B46B027AB3F1471ACAA34729ABEA1E510566004AD294AFAB6AA4A6486493
              SHA-512:6323297D872F608816F0ACBA675E441BB21011E1DAB979030EA903ACF6B8FBBAA9BC0EBF4A6713BFCA16846D370FD04854BC914EFE3A10930A5150F8A70E44FC
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 48%
              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....gnd.................<W.................PW...@..........................P......................................0y........}..............................0..$....................................................px.............................-)JCkFdG..V......................... ..`tUKiKjI(.;....W..................... ..`>FM3ptLM.....PW.....................@...o[K?gVK3.x...pX.........................QX]dab$M.7....X.....................@...3MpwCE=\.....0Y.....................@...i%>mQ21J.....@Y.....................@..@zG.-OP"_E....PY.....................@..@N/Q"D33it....`Y..................... ..`/1Noi&/e.....px.....................@...H)8.=c%s@.R...x...R................. ..`]K1?IQ),$....0........R.............@..B................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):49152
              Entropy (8bit):0.768760985100547
              Encrypted:false
              SSDEEP:12:JSbX72Fj5AGiLIlHVRpiBh/7777777777777777777777777vDHFGU1Lp7l0i8Q:JvQI5ASF
              MD5:6F1766C739CC71014660EDB94C55B05B
              SHA1:5B390204B4DCC92D44C79978A61AE33D1F8BE002
              SHA-256:762561EC2CE9C880B42035172C21BD53D34E9C4DFBE92C824D83D7D489C5B14C
              SHA-512:0E265EE873FB12D1CC31F87439BCC54CAB728EF424938E30E10C517CF36C39632A010EDE3D90F5ED66A0B8622F12F9116691CD30063AE21892D214376068CECC
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):1.223596486084734
              Encrypted:false
              SSDEEP:48:6oruDM+CFXJpT5NM4/tMSCWAECiCyaoG0MSCcT2:LrVRT4qi1ECTnB
              MD5:F091DDDBA714EF7B3D0C7E83A88DFC42
              SHA1:961D33CEDF0FD59C73A5E06177BEC29D145701D5
              SHA-256:81EF78D941207840609ABBF8BCB5DD24D7F9D22CC13BB72A8171BBD6EE9B842E
              SHA-512:F713A1BECE3889D095E5C0BAF8D3343C5C64AF0FD39DCA0EFE1D5DC374BA2D6C59E7DE1CD65E7AADC9BCC837F23E199AC4EAF9EDDE9B71B86119BDFF5FEE6E38
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):79122
              Entropy (8bit):5.2820991353412
              Encrypted:false
              SSDEEP:192:jmXs969ozNSkk3peTBYeHt0tfoI9qsjl0urmwYyi3:yXs9UogeWeH29qclhmwYyi3
              MD5:0F8E7E29DFD57561C000A643111249AA
              SHA1:AF9C1EF33092ED1FA7C83737AD4D5E625E8EB03D
              SHA-256:20E7D66BF3CC068B3CF33E3A439A3D9C675816C9DF6C1E14840084E8945850A6
              SHA-512:77665EC98BE582E70EEFBE6B3882BDA8B4445DABE1861B8FC0B84A3940C5B381C53A9FB924CE3739DFB4FEF0DD94641B77B049F5142453EF2F88EAC32329E1A2
              Malicious:false
              Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..07/23/2020 03:22:38.143 [320]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.Office.Tools.Outlook, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 03:22:38.159 [320]: ngen returning 0x00000000..07/23/2020 03:22:38.222 [3748]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.Office.Tools.Word, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 03:22:38.237 [3748]: ngen returning 0x00000000..07/23/2020 03:22:38.284 [64]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.Office.Tools.Common.Implementation, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 03:22:38.300 [64]:
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):81920
              Entropy (8bit):0.11032480089406914
              Encrypted:false
              SSDEEP:24:+pGSpYTxkrapWpUipVkrapWpGkrapWpUipVkrapWpeAEVkryjCyKpRV2BwGIArmQ:+CTeMSCpMSCWAECiCyaoGnq5
              MD5:0C3FD0990472F91DFE16EBEBD0223A9E
              SHA1:B7874C1367C579C0636B34F3AD102B8940206192
              SHA-256:D10108090EF28311493E15F235D747D5314030DDA129AE1C3CD53632D3718766
              SHA-512:6FF535D72D7A51124622A1DD17A7DF40086AC3158B7482C14A9DB1505E659E916AB23BD05ABA47B67D639AF14A59CF0C8FEF1F038747FFE7DD64DCD25303414C
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):0.07120612824116142
              Encrypted:false
              SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOG7PAZwQekDYtiVky6l7:2F0i8n0itFzDHFGU1Yb7
              MD5:233821E6E7EA055562D01EB0E131F060
              SHA1:AF8EA0EF631A62B57DE9B4FBA4958EED62441C0F
              SHA-256:B58A16F69A1AA9C80FBD02B0F282EBBCF9C3EE5497AF01DF15DF5EFE485ABF18
              SHA-512:B5432B9DCF7DF7608FD95C384ECF974A18D8C045063BE7E275DD3B1FCFAE7A7D9A88B6C30FF264DFD3CD925453937B72B9AEFFEAA71ECBD9B04201BCA8723862
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {99C5E16F-1B9A-4372-8446-788EB651135D}, Number of Words: 10, Subject: window1, Author: window1, Name of Creating Application: Advanced Installer 18.1 build 4fb1edbd, Template: ;1033, Comments: window1, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
              Entropy (8bit):7.898523988528081
              TrID:
              • Microsoft Windows Installer (77509/1) 52.16%
              • Windows SDK Setup Transform Script (63028/2) 42.42%
              • Generic OLE2 / Multistream Compound File (8008/1) 5.39%
              • Corel Photo Paint (41/41) 0.03%
              File name:FACT64708.msi
              File size:6022656
              MD5:03fc44504a830c0bde2155d2343c07bd
              SHA1:99927989853f4d8b4a1180f25c48c37a3c763f65
              SHA256:6dfd76c513f8c4216b7c0efeab797f22db13bb265fafffbb69d735b64801c4a8
              SHA512:6b12e4e6bc274722383f0148e80281c486b53efb5eadf598359d8afd2a9497ccff3e459b7ea2608abf5fb0dff97426684dcc1920766680674a83ad9e571c6339
              SSDEEP:98304:PYebmgplKxsvkwtfTZ6Of7Ok2NKJTNkcDW1FqjId56KahqOxYmNrwC8ICpqtMHA:ragplKxsvkwtfF56iTNkc6FqjId1OxbP
              TLSH:1156231279C686F5C0BE42B41A17BEAE35B56A34C3B140AB62C85EDF38F37D05671983
              File Content Preview:........................>...................\...................................~..............................................................................................................................................................................
              Icon Hash:2d2e3797b32b2b99
              TimestampSource PortDest PortSource IPDest IP
              May 26, 2023 12:28:35.433054924 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.433145046 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:35.434598923 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.439356089 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.439404011 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:35.514266968 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:35.514359951 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.694101095 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.694183111 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:35.695022106 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:35.695111990 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.696835995 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.744292974 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:35.832495928 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:35.832679987 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:35.833687067 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.836333036 CEST49692443192.168.2.434.117.59.81
              May 26, 2023 12:28:35.836369991 CEST4434969234.117.59.81192.168.2.4
              May 26, 2023 12:28:38.852535009 CEST496939911192.168.2.489.44.9.236
              May 26, 2023 12:28:38.885492086 CEST99114969389.44.9.236192.168.2.4
              May 26, 2023 12:28:38.885910988 CEST496939911192.168.2.489.44.9.236
              May 26, 2023 12:28:39.328989983 CEST99114969389.44.9.236192.168.2.4
              May 26, 2023 12:28:39.329049110 CEST99114969389.44.9.236192.168.2.4
              May 26, 2023 12:28:39.329176903 CEST496939911192.168.2.489.44.9.236
              May 26, 2023 12:28:39.881467104 CEST496939911192.168.2.489.44.9.236
              May 26, 2023 12:28:39.930834055 CEST99114969389.44.9.236192.168.2.4
              TimestampSource PortDest PortSource IPDest IP
              May 26, 2023 12:28:35.401787996 CEST5968353192.168.2.48.8.8.8
              May 26, 2023 12:28:35.424916983 CEST53596838.8.8.8192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              May 26, 2023 12:28:35.401787996 CEST192.168.2.48.8.8.80x62abStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              May 26, 2023 12:28:35.424916983 CEST8.8.8.8192.168.2.40x62abNo error (0)ipinfo.io34.117.59.81A (IP address)IN (0x0001)false
              • ipinfo.io

              Click to jump to process

              Target ID:0
              Start time:12:28:28
              Start date:26/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\FACT64708.msi"
              Imagebase:0x7ff7394b0000
              File size:66048 bytes
              MD5 hash:4767B71A318E201188A0D0A420C8B608
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:1
              Start time:12:28:29
              Start date:26/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\msiexec.exe /V
              Imagebase:0x7ff7394b0000
              File size:66048 bytes
              MD5 hash:4767B71A318E201188A0D0A420C8B608
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:2
              Start time:12:28:30
              Start date:26/05/2023
              Path:C:\Windows\SysWOW64\msiexec.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding EC16BF9ACD034E20C79A272C76FEE245
              Imagebase:0xd80000
              File size:59904 bytes
              MD5 hash:12C17B5A5C2A7B97342C362CA467E9A2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              No disassembly