MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8d115ee808b27598a031efdba144d7d46beb16b372c1d119805e47e1f13a40f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: c8d115ee808b27598a031efdba144d7d46beb16b372c1d119805e47e1f13a40f
SHA3-384 hash: 7a0c46e4ee53c0d8226e9a541edfa6a970c5561347d240e331f2987b7adfd55fce3d20dba9e7de4be74aa8c1f5458cd9
SHA1 hash: 765e337678f70f339e0034e0d75ed8ba076febf7
MD5 hash: 330b9975055968ae6448f4f444a22d71
humanhash: nebraska-white-double-nuts
File name:QCJXNDUD.msi
Download: download sample
File size:7'163'904 bytes
First seen:2025-04-09 12:24:05 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 196608:WN4ttidlicSYi7GzPFBKZVAM8aKzuXz4J4jZ:y4tkdlixmdlM8aDmu
TLSH T12C7633698B54B78BC051C338425F60B00E389E3AB3A57C7735A97BAD9134F2AB5E107D
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter JAMESWT_WT
Tags:booking cdn-jsdelivr-net lacukurk-it-com msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
shellcode spawn micro
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context expired-cert fingerprint installer keylogger packed wix
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
PE file has a writeable .text section
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1660750 Sample: QCJXNDUD.msi Startdate: 09/04/2025 Architecture: WINDOWS Score: 100 112 werito.cyou 2->112 114 velvet5nssrv.shop 2->114 116 4 other IPs or domains 2->116 142 Malicious sample detected (through community Yara rule) 2->142 144 Antivirus detection for URL or domain 2->144 146 PE file has a writeable .text section 2->146 11 msiexec.exe 82 42 2->11         started        14 msedge.exe 2->14         started        18 cmd.exe 2->18         started        20 msiexec.exe 3 2->20         started        signatures3 process4 dnsIp5 104 C:\Users\user\AppData\...\CamMenuMaker.exe, PE32 11->104 dropped 106 C:\Users\user\AppData\Local\...\msvcr100.dll, PE32 11->106 dropped 108 C:\Users\user\AppData\Local\...\msvcp100.dll, PE32 11->108 dropped 110 3 other files (none is malicious) 11->110 dropped 22 CamMenuMaker.exe 9 11->22         started        26 msiexec.exe 54 11->26         started        140 239.255.255.250 unknown Reserved 14->140 174 Creates multiple autostart registry keys 14->174 176 Maps a DLL or memory area into another process 14->176 28 msedge.exe 14->28         started        31 msedge.exe 14->31         started        33 msedge.exe 14->33         started        37 2 other processes 14->37 35 conhost.exe 18->35         started        file6 signatures7 process8 dnsIp9 82 C:\Users\user\AppData\...\CamMenuMaker.exe, PE32 22->82 dropped 84 C:\Users\user\AppData\...\msvcr100.dll, PE32 22->84 dropped 86 C:\Users\user\AppData\...\msvcp100.dll, PE32 22->86 dropped 94 3 other files (none is malicious) 22->94 dropped 162 Switches to a custom stack to bypass stack traces 22->162 164 Found direct / indirect Syscall (likely to bypass EDR) 22->164 39 CamMenuMaker.exe 4 22->39         started        88 C:\Users\user\AppData\Local\...\Start.exe, PE32+ 26->88 dropped 90 C:\Users\user\AppData\Local\...\ISBEW64.exe, PE32+ 26->90 dropped 92 C:\Users\user\AppData\Local\...\SbieDll.dll, PE32+ 26->92 dropped 96 2 other files (none is malicious) 26->96 dropped 43 Start.exe 26->43         started        45 ISBEW64.exe 26->45         started        47 ISBEW64.exe 26->47         started        49 8 other processes 26->49 130 sb.scorecardresearch.com 18.173.218.126, 443, 49773 MIT-GATEWAYSUS United States 28->130 132 ax-0003.ax-msedge.net 150.171.28.12, 443, 49775 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->132 134 29 other IPs or domains 28->134 file10 signatures11 process12 file13 98 C:\Users\user\AppData\...\updateBg_je2.exe, PE32+ 39->98 dropped 100 C:\Users\user\AppData\Local\Temp\ylyqaemehd, PE32+ 39->100 dropped 166 Found hidden mapped module (file has been removed from disk) 39->166 168 Maps a DLL or memory area into another process 39->168 170 Switches to a custom stack to bypass stack traces 39->170 172 Found direct / indirect Syscall (likely to bypass EDR) 39->172 51 updateBg_je2.exe 3 2 39->51         started        55 cmd.exe 3 39->55         started        102 C:\Users\user\AppData\Local\...\lsjuvhnakme, PE32+ 43->102 dropped 57 cmd.exe 43->57         started        59 cmd.exe 43->59         started        signatures14 process15 dnsIp16 118 velvet5nssrv.shop 172.67.145.221, 443, 49723, 49724 CLOUDFLARENETUS United States 51->118 120 werito.cyou 172.67.216.83, 443, 49726, 49860 CLOUDFLARENETUS United States 51->120 148 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 51->148 150 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 51->150 152 Tries to harvest and steal browser information (history, passwords, etc) 51->152 160 5 other signatures 51->160 61 chrome.exe 51->61         started        64 msiexec.exe 7 51->64         started        67 msedge.exe 51->67         started        154 Switches to a custom stack to bypass stack traces 55->154 69 conhost.exe 55->69         started        122 sonorous-horizon-cfd.cfd 104.21.16.1, 49761, 80 CLOUDFLARENETUS United States 57->122 156 Creates multiple autostart registry keys 57->156 158 Creates an autostart registry key pointing to binary in C:\Windows 57->158 71 conhost.exe 59->71         started        signatures17 process18 dnsIp19 136 192.168.2.4, 138, 443, 49176 unknown unknown 61->136 138 192.168.2.7 unknown unknown 61->138 73 chrome.exe 61->73         started        78 C:\Users\user\AppData\Local\...\MSI7F52.tmp, PE32 64->78 dropped 80 C:\Users\user\AppData\Local\...\MSI7CFF.tmp, PE32 64->80 dropped 76 msedge.exe 67->76         started        file20 process21 dnsIp22 124 www.google.com 142.250.80.4, 443, 49732, 49735 GOOGLEUS United States 73->124 126 plus.l.google.com 73->126 128 5 other IPs or domains 73->128
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery persistence privilege_escalation spyware stealer
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Installer Packages
Reads user/profile data of web browsers
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Enumerates connected drives
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
HijackLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Microsoft Software Installer (MSI) msi c8d115ee808b27598a031efdba144d7d46beb16b372c1d119805e47e1f13a40f

(this sample)

  
Delivery method
Distributed via web download

Comments