Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 07:14
Static task
static1
Behavioral task
behavioral1
Sample
c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe
Resource
win7-20221111-en
General
-
Target
c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe
-
Size
249KB
-
MD5
8b80f660c3b358f98d143d497d09a6a4
-
SHA1
aa78124ba55a6ec163b7295b6d28cd119f723bf1
-
SHA256
c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252
-
SHA512
60f3923d908dd7f12f66b4bdb941a5f87efea0bb6953d7e2b176fc9ad392dbf9f2df114fd4564bd3db9c2a271a70fb20dc559fc51943cf685234e5093957f332
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5rFH1EIt9XpTkIWcOejkoMM6q5sI6:h1OgLdaOrnEIt9XpTlhOJNiY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0006000000022e50-143.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3048 50ded0bb4199c.exe -
resource yara_rule behavioral2/files/0x0006000000022e50-143.dat upx behavioral2/memory/3048-147-0x0000000074BA0000-0x0000000074BAA000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 3048 50ded0bb4199c.exe 3048 50ded0bb4199c.exe 3048 50ded0bb4199c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F31E4894-0790-998B-5195-99714A518E47} 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F31E4894-0790-998B-5195-99714A518E47}\ = "Zoomex" 50ded0bb4199c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F31E4894-0790-998B-5195-99714A518E47}\NoExplorer = "1" 50ded0bb4199c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0006000000022e3c-133.dat nsis_installer_1 behavioral2/files/0x0006000000022e3c-133.dat nsis_installer_2 behavioral2/files/0x0006000000022e3c-134.dat nsis_installer_1 behavioral2/files/0x0006000000022e3c-134.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{F31E4894-0790-998B-5195-99714A518E47}\InProcServer32 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{F31E4894-0790-998B-5195-99714A518E47}\ProgID 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F31E4894-0790-998B-5195-99714A518E47}\ProgID\ = "Zoomex.1" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F31E4894-0790-998B-5195-99714A518E47}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\50ded0bb419d5.dll" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{F31E4894-0790-998B-5195-99714A518E47} 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F31E4894-0790-998B-5195-99714A518E47}\ = "Zoomex" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F31E4894-0790-998B-5195-99714A518E47}\InProcServer32\ThreadingModel = "Apartment" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\50ded0bb419d5.tlb" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50ded0bb4199c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50ded0bb4199c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3048 3044 c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe 80 PID 3044 wrote to memory of 3048 3044 c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe 80 PID 3044 wrote to memory of 3048 3044 c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe 80 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 50ded0bb4199c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{F31E4894-0790-998B-5195-99714A518E47} = "1" 50ded0bb4199c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe"C:\Users\Admin\AppData\Local\Temp\c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\50ded0bb4199c.exe.\50ded0bb4199c.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:3048
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD56696822add17061dc0bb8ee5b42cc2d4
SHA1d4622558ba366f2f94560da301a81c6c16f95a3c
SHA25673c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125
SHA5120f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099
-
C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5225bed7524015dbbccd81e41a1550d6d
SHA15315b46895a9bf66a1e0aa5ac278624822ded57f
SHA2560d5c2394c53675b790dd446a6319a934c58d4e86bc9c0b62e414624cd6ceaca2
SHA512827f881736a9ea117affab3b7e635ebdf44dd59bd06d12395697de78ad75e001d2cac8ae1541d0428a5c57100d0276f0df4747bc62062b9ee367615b8952f030
-
C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\chrome.manifest
Filesize116B
MD595e5346941206506d6a3e82849600ffc
SHA12792a69fccfc7c56f51de6504abbd86f521a3f25
SHA256066b64ab47e8d2e39d1c79e97f544df15d076136edaa6e8178ba2c006e244136
SHA5125ed77eb7ce2626ec7150bf963802cd578639c38cfa431d2932e10bd80f6188b3e7cc45dd84493c5091d39cb47af717056764f583a4caeb7de6a998d3c21832ff
-
C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\content\bg.js
Filesize8KB
MD5ad9252be56565ef9c539079c39d30f73
SHA185d339a1bbf1f8aef0d74e409f8bedb540aaba64
SHA256c1d6d0c49dd4e3e40dc03af9b36e9c68d1cf170bce2911b4e68323a946f3f9b9
SHA5121d4046dbe4f1595a1116f9b43670ef1953a8c26a99b4c9687a223673293d37b4886680dc950bd58ab77bdadf77c04bb7c7daee41fd42f44e655bc2380156e9c0
-
C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\content\zy.xul
Filesize225B
MD58fed08a21400902bcd6865419c849861
SHA10f495f88ea18390280d94ba83b1badd58194db33
SHA256b815bcff93b07f2908968c54b2c12433b54bb51dbc43c69d216ef29e37cfc6d0
SHA512c5a9711e8890388d01650ecbe5de3ae5a1a8ed4213de4d482fda27326308fcfa4adecdd3cc8c3c3774b75b553ef8b33c3713900d279fb917cf50bb73cf6e4f72
-
C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\install.rdf
Filesize700B
MD5a0da801843cf806a44b2d1e12b093e32
SHA1d7e0e86491ed7f532d35fd67ae96c0e11b747b66
SHA256df7daa435ee14933767f98e0564f09df99db379f0a6ec38bb060e0717d9b9e61
SHA5121683c6cd1adb2b9e624aa76139220c2bfa584774b8adf5240a7e64e1e045580a31b2d9e78101a621c325fb6a912145b9899478826e3c75b9b42d22915442519c
-
Filesize
70KB
MD5ebcc3eb1a7021aaead55fb677465a717
SHA13c8347f0fd520ee423a4aafea1112a0b06f4b6c8
SHA2565e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c
SHA5120f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995
-
Filesize
70KB
MD5ebcc3eb1a7021aaead55fb677465a717
SHA13c8347f0fd520ee423a4aafea1112a0b06f4b6c8
SHA2565e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c
SHA5120f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995
-
Filesize
115KB
MD56696822add17061dc0bb8ee5b42cc2d4
SHA1d4622558ba366f2f94560da301a81c6c16f95a3c
SHA25673c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125
SHA5120f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099
-
Filesize
2KB
MD5096a65b8a695249d5d554776f1eeace3
SHA12f2506b886a59b4408b23653d8734004ec2dda6d
SHA256a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568
SHA5126e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc
-
Filesize
8KB
MD58f17c2aad182b8623cebd110272a5da5
SHA14c3b176ad96c1a5a6a830d4c2fbe2fc5278a985e
SHA25694258747169ab81bbb18d5266e09026a975997a1a302b6dd3cd4d597416b7403
SHA51291357f885ceaa8271388cbcc42df987b5ef2706103cecc12614e852fdcdfc63e47f5ae9441e9d3477927955f7d75eed652659abaa883f7b383b4e10adc9be3ef
-
Filesize
6KB
MD578a4969edc60d5b2c920250d40c89496
SHA160643cdc9eb16f1e76482edada7c7986f4789d70
SHA2567612a3ac04b23ff701145015b143371e5f14da20c1fdbd39f62ef50962a3a1a1
SHA512aabade706d444fbdb969051f1b1d66b71137594205774e5a300c6bdfddeae5a5fff36135732ce4d6eb50429fc82369e226fba37a2bc224bf867ef0e3ce785d66
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90