Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 07:14

General

  • Target

    c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe

  • Size

    249KB

  • MD5

    8b80f660c3b358f98d143d497d09a6a4

  • SHA1

    aa78124ba55a6ec163b7295b6d28cd119f723bf1

  • SHA256

    c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252

  • SHA512

    60f3923d908dd7f12f66b4bdb941a5f87efea0bb6953d7e2b176fc9ad392dbf9f2df114fd4564bd3db9c2a271a70fb20dc559fc51943cf685234e5093957f332

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5rFH1EIt9XpTkIWcOejkoMM6q5sI6:h1OgLdaOrnEIt9XpTlhOJNiY

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe
    "C:\Users\Admin\AppData\Local\Temp\c1d4939cbc91e3f634ab1e96e7c9813b96b02928d310ef6e127fa4df016bb252.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\50ded0bb4199c.exe
      .\50ded0bb4199c.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:3048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Zoomex\50ded0bb419d5.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    225bed7524015dbbccd81e41a1550d6d

    SHA1

    5315b46895a9bf66a1e0aa5ac278624822ded57f

    SHA256

    0d5c2394c53675b790dd446a6319a934c58d4e86bc9c0b62e414624cd6ceaca2

    SHA512

    827f881736a9ea117affab3b7e635ebdf44dd59bd06d12395697de78ad75e001d2cac8ae1541d0428a5c57100d0276f0df4747bc62062b9ee367615b8952f030

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    95e5346941206506d6a3e82849600ffc

    SHA1

    2792a69fccfc7c56f51de6504abbd86f521a3f25

    SHA256

    066b64ab47e8d2e39d1c79e97f544df15d076136edaa6e8178ba2c006e244136

    SHA512

    5ed77eb7ce2626ec7150bf963802cd578639c38cfa431d2932e10bd80f6188b3e7cc45dd84493c5091d39cb47af717056764f583a4caeb7de6a998d3c21832ff

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    ad9252be56565ef9c539079c39d30f73

    SHA1

    85d339a1bbf1f8aef0d74e409f8bedb540aaba64

    SHA256

    c1d6d0c49dd4e3e40dc03af9b36e9c68d1cf170bce2911b4e68323a946f3f9b9

    SHA512

    1d4046dbe4f1595a1116f9b43670ef1953a8c26a99b4c9687a223673293d37b4886680dc950bd58ab77bdadf77c04bb7c7daee41fd42f44e655bc2380156e9c0

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    8fed08a21400902bcd6865419c849861

    SHA1

    0f495f88ea18390280d94ba83b1badd58194db33

    SHA256

    b815bcff93b07f2908968c54b2c12433b54bb51dbc43c69d216ef29e37cfc6d0

    SHA512

    c5a9711e8890388d01650ecbe5de3ae5a1a8ed4213de4d482fda27326308fcfa4adecdd3cc8c3c3774b75b553ef8b33c3713900d279fb917cf50bb73cf6e4f72

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\[email protected]\install.rdf

    Filesize

    700B

    MD5

    a0da801843cf806a44b2d1e12b093e32

    SHA1

    d7e0e86491ed7f532d35fd67ae96c0e11b747b66

    SHA256

    df7daa435ee14933767f98e0564f09df99db379f0a6ec38bb060e0717d9b9e61

    SHA512

    1683c6cd1adb2b9e624aa76139220c2bfa584774b8adf5240a7e64e1e045580a31b2d9e78101a621c325fb6a912145b9899478826e3c75b9b42d22915442519c

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\50ded0bb4199c.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\50ded0bb4199c.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\50ded0bb419d5.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\50ded0bb419d5.tlb

    Filesize

    2KB

    MD5

    096a65b8a695249d5d554776f1eeace3

    SHA1

    2f2506b886a59b4408b23653d8734004ec2dda6d

    SHA256

    a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568

    SHA512

    6e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\alcjgenbcmdihkhjelppmlcpplddbjpb.crx

    Filesize

    8KB

    MD5

    8f17c2aad182b8623cebd110272a5da5

    SHA1

    4c3b176ad96c1a5a6a830d4c2fbe2fc5278a985e

    SHA256

    94258747169ab81bbb18d5266e09026a975997a1a302b6dd3cd4d597416b7403

    SHA512

    91357f885ceaa8271388cbcc42df987b5ef2706103cecc12614e852fdcdfc63e47f5ae9441e9d3477927955f7d75eed652659abaa883f7b383b4e10adc9be3ef

  • C:\Users\Admin\AppData\Local\Temp\7zS9465.tmp\settings.ini

    Filesize

    6KB

    MD5

    78a4969edc60d5b2c920250d40c89496

    SHA1

    60643cdc9eb16f1e76482edada7c7986f4789d70

    SHA256

    7612a3ac04b23ff701145015b143371e5f14da20c1fdbd39f62ef50962a3a1a1

    SHA512

    aabade706d444fbdb969051f1b1d66b71137594205774e5a300c6bdfddeae5a5fff36135732ce4d6eb50429fc82369e226fba37a2bc224bf867ef0e3ce785d66

  • C:\Users\Admin\AppData\Local\Temp\nsj9ED6.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsj9ED6.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/3048-147-0x0000000074BA0000-0x0000000074BAA000-memory.dmp

    Filesize

    40KB