Analysis

  • max time kernel
    118s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 23:53

General

  • Target

    017ec336b7353316c642268cf527b913fd83b070468ce734c3bcdaf1217fc791.exe

  • Size

    249KB

  • MD5

    90ad3e213ded6ccd404cc306ae0283e8

  • SHA1

    8c04722c5cf1a93fd52a5d82779555d37e39630b

  • SHA256

    017ec336b7353316c642268cf527b913fd83b070468ce734c3bcdaf1217fc791

  • SHA512

    56cca2ecd32315e44d9149c3d0596c39585c0b0a50fac57a1f091a5a34e88f1d87133111340a85d545f1c5c71e65338ba893097784f4a5309378e8e046207a65

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5MMosZSsPszTQX6kkIjImYiqSy:h1OgLdaO9o6GbkRImYp

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\017ec336b7353316c642268cf527b913fd83b070468ce734c3bcdaf1217fc791.exe
    "C:\Users\Admin\AppData\Local\Temp\017ec336b7353316c642268cf527b913fd83b070468ce734c3bcdaf1217fc791.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\50df062354c45.exe
      .\50df062354c45.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Zoomex\50df062354c7f.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    4ce726120d4bae43192f3e640c3a159f

    SHA1

    98137c4f979aa197b13e42bf0ffbbbf0975158fd

    SHA256

    64a648c1b4570262f62742b0d7a659f256f32dc3530afc58ab814012a94f51e2

    SHA512

    d14c9609b29055a0458ac688922edafd7b534ed573192e86028c317df4b5edcb5fbeb50e79a5907897b6888e417ab470f1485cdf5164959a671cab849ca36ad2

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    02692e734baf89157b63880545a01c42

    SHA1

    87a40b8773aeec2b67071defb894cdc4b443f03d

    SHA256

    fff5e0dfffff299f770f0d56abdbe3c36be0207810adf5b3b5424e803e3c99c7

    SHA512

    4b44ae1478eeb4a49f399408688748999318550dd2e326d2ffdbc286949a9e6f3abb739db61cc592eae099349b9a12f568f7c050b86393521090d3b20198befc

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    46100ae46ddaea50fd47141cef98089f

    SHA1

    2bf0246ee8303be36ff1dc5958e360d4d3c23377

    SHA256

    9e75531ca57ab10319e33111ec6586a26625a1075677feba3981db6a58298066

    SHA512

    1bdf92e8600a19ca647e0eecfee615c5910c238438d1c12fd418c1c83c676a02da0a737edab8e13b8133191b6c79932aab72318d47b32e775f2fafc4274bc167

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    a14ee025836063109156146e9be11579

    SHA1

    a2a9c5a5b6eca6183b0d7ac739d7f59ad47c3f53

    SHA256

    b9b065f589f4da51ce9b40124cc33caa9353ef07798482a4ae2cf57f97301361

    SHA512

    1ff975bd541acaf6af61d02b316b45203d7019e3c44f343e659696795168a3817c22c4524a13a3e1097ebe5722ed334a9900d9d9373ea5aaadbaaae6d24b7d7c

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\[email protected]\install.rdf

    Filesize

    700B

    MD5

    d2f1409b34fee4690895d2e728f61924

    SHA1

    f29ad513a841175533bfe0242c0e5743bb39dadd

    SHA256

    a1c75067c9be052b6c61560d69770f1ecc99244e5034118c33755b713dfd5ef8

    SHA512

    da70f7912d6e841204e3a904b221fb1ac8160d83ee855a42678648497479190a89ad52f42dc6e21e81fb86c16dd973942afd20b51410137d2504b51eba9fceca

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\50df062354c45.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\50df062354c45.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\50df062354c7f.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\50df062354c7f.tlb

    Filesize

    2KB

    MD5

    096a65b8a695249d5d554776f1eeace3

    SHA1

    2f2506b886a59b4408b23653d8734004ec2dda6d

    SHA256

    a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568

    SHA512

    6e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\mabmmegmpngikkdfbibglgjkchijkopd.crx

    Filesize

    8KB

    MD5

    a4f2924dbf0e8dc9a6937b43764b88f2

    SHA1

    b058fe7ee3cb1c61fec9a7166fb7f1198f8f0c5b

    SHA256

    fe2f600fe8fd3f268ee432eb9f2efbfdc06af43a5d85c5b7739a3de6ce1796f8

    SHA512

    4bdb9349fe2418b8a5764d45d9db1c9389fccac34a9036cd2b6daf8354f41511a585def6830cdffd9cd4e29bb1deca43ab1168fea712f12901a19e1130538efc

  • C:\Users\Admin\AppData\Local\Temp\7zS65E3.tmp\settings.ini

    Filesize

    6KB

    MD5

    35463bb80ad751aea818c3c4293d28d5

    SHA1

    c1b537daad880dcb5dca7b01991fad7a05e42c6c

    SHA256

    2cf4755b7d5efaac71f0047d21962e5e461fda1bf6a7f06bd292c716b3818e57

    SHA512

    09068830d977a289fb84a0ac25802a1e16465e0d79ca574f42e4735b47a3021a063040535791c10ebe1f737f008e24b06d10c2ce466f457593c79436e0c49ca4

  • C:\Users\Admin\AppData\Local\Temp\nsm674B.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsm674B.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90