Analysis

  • max time kernel
    145s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 07:19

General

  • Target

    434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe

  • Size

    249KB

  • MD5

    ee77d395e9e278b47b54b941615e20b8

  • SHA1

    036b82b9ca5eef0638ca5c04327f8cde9d0a59af

  • SHA256

    434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3

  • SHA512

    b8f37b6f78cf556e4de279c80b55c9ce5de2c6cfc9d21d765b937d9dc4dfbf8ac01a4f1eca96a0cba09de80d887dffce2b9006a72ae70a63dfd13cb9f14697ff

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5GI5zgVVsL+0TYG:h1OgLdaO75F+0/

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe
    "C:\Users\Admin\AppData\Local\Temp\434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\50de1efba44ea.exe
      .\50de1efba44ea.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Zoomex\50de1efba4522.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    d27f4b1d6aeac029ee61df6b2ecf4786

    SHA1

    f30c1c9eb602c65ed5b114205bb5ff6fe37da77c

    SHA256

    3c09daca937f7b2a385e29b261e48536353f954268903ab9f979d460043ecc20

    SHA512

    f249172947c7b9fe7a910cd802d4c6eaaec86cd66e6e0893aece0236e721c9608ba096a68ea62187a24894a09253b63ff91821685335f89d2dfa03c602e90ea4

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    c8f2d5cdafeace30c82510d16915996f

    SHA1

    28f12c01ff6ca33328b7b7b244a3bd35e17baf26

    SHA256

    3e0ee3b0cfbed17be1d506d51337f4484b85ddf3a789907cf01fb7ac7ebb6f12

    SHA512

    bf646431dff4e4eb87b0c4bb62126ace39392d29972566844db25f119f992c7903253084b7f663b4dac6963bbcd32732cbd790888ef130c411c2d8d5e5cd67e9

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    559eb26be688437ef4ecac94660a9986

    SHA1

    a9ce27cb0378ee8140f3430948a2c00d79efc7fd

    SHA256

    1ea0d75700e7d050171ebb07f4478623c92009d027967a560f3310fa8535ba9b

    SHA512

    fec7987a935adbbafa28fea1cbea221ae68d08746e09ecbc197b55d73f3a9c8b50079d27e138589dfb3fbd29f2d8b002baff88e2419289a65eaa6e443ddf71f0

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    0cf86280a375e5f08519eb8710e720d5

    SHA1

    8eb0cdb61342fae7366f2f5167fbe3f04c0da255

    SHA256

    ace0f134561c7df6b7d6000e9caa9ada1b89cf3de559e135be2e3cd97221d310

    SHA512

    a6330672bb4533a54f16fe909806e31e4e26e08a9641ce5385ddbfbedfd74338d1ee7915ebdb42bc78fb29cb19e274717042c03cb91e6e99444dca7fc060bca5

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\install.rdf

    Filesize

    700B

    MD5

    591d2d08c87b48788f3cb4282661318c

    SHA1

    b758c8eb948eb2fa4c3e52d3f777bfeab93ea0a7

    SHA256

    3b3b5c05deee578765472f3768061ca897145da2dad1396f0876b1bc764ccc45

    SHA512

    7e531dcc8be67cab1862ff0f7036d37cfd1f206fc528b7a6d250b181ff026b008834991ea22abf2d87559e3ba0bf1bc6d9840fe2a307a425b494223a2b34f8cd

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\50de1efba44ea.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\50de1efba44ea.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\50de1efba4522.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\50de1efba4522.tlb

    Filesize

    2KB

    MD5

    096a65b8a695249d5d554776f1eeace3

    SHA1

    2f2506b886a59b4408b23653d8734004ec2dda6d

    SHA256

    a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568

    SHA512

    6e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\mjjpaphkiehglafjkbencdnmfafgjoea.crx

    Filesize

    8KB

    MD5

    cf60cae5e3eff857181c5cbbbd355d6d

    SHA1

    0c2f9fa47c82678fc6d9884bf0b4ea0c721328dc

    SHA256

    75231ea94ffc9029b3735e840c591840f9f8aaa7100f5b44ee6d5a3c6700f4dd

    SHA512

    da50277ccc2c7ac54f248c939f3c8b5f179253a8c8b22f723ba8a7caaa3881fbf958eef31e6d7f9c3c475adea3c45614ce6bcb90559c8aae8b3fb75e27648345

  • C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\settings.ini

    Filesize

    6KB

    MD5

    bdc4438b9067715a84f129c60c2b7a95

    SHA1

    f051d544c525a84c13a42159dc27055723ea5a0f

    SHA256

    b033d8a7985c89ffb6be8e482039789fd3179ed57acc3d61eb1c8239fe177654

    SHA512

    ca3f67ee22ef79a7006a0885e69a865a94872934841a4699bd56606303bba290c8e949cceb033b984f258a6b883495c77233f82759e2ed00f390c868997d1e3f

  • C:\Users\Admin\AppData\Local\Temp\nsb9986.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsb9986.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/4852-132-0x0000000000000000-mapping.dmp