Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe
Resource
win7-20220901-en
General
-
Target
434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe
-
Size
249KB
-
MD5
ee77d395e9e278b47b54b941615e20b8
-
SHA1
036b82b9ca5eef0638ca5c04327f8cde9d0a59af
-
SHA256
434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3
-
SHA512
b8f37b6f78cf556e4de279c80b55c9ce5de2c6cfc9d21d765b937d9dc4dfbf8ac01a4f1eca96a0cba09de80d887dffce2b9006a72ae70a63dfd13cb9f14697ff
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5GI5zgVVsL+0TYG:h1OgLdaO75F+0/
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0006000000022e88-143.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 4852 50de1efba44ea.exe -
resource yara_rule behavioral2/files/0x0006000000022e88-143.dat upx -
Loads dropped DLL 3 IoCs
pid Process 4852 50de1efba44ea.exe 4852 50de1efba44ea.exe 4852 50de1efba44ea.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B11367E9-95F5-8049-77E1-18E39C42A7DE} 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B11367E9-95F5-8049-77E1-18E39C42A7DE}\ = "Zoomex" 50de1efba44ea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B11367E9-95F5-8049-77E1-18E39C42A7DE}\NoExplorer = "1" 50de1efba44ea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0006000000022e74-133.dat nsis_installer_1 behavioral2/files/0x0006000000022e74-133.dat nsis_installer_2 behavioral2/files/0x0006000000022e74-134.dat nsis_installer_1 behavioral2/files/0x0006000000022e74-134.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B11367E9-95F5-8049-77E1-18E39C42A7DE}\ = "Zoomex" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B11367E9-95F5-8049-77E1-18E39C42A7DE}\ProgID\ = "Zoomex.1" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B11367E9-95F5-8049-77E1-18E39C42A7DE}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\50de1efba4522.dll" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B11367E9-95F5-8049-77E1-18E39C42A7DE}\InProcServer32\ThreadingModel = "Apartment" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{B11367E9-95F5-8049-77E1-18E39C42A7DE}\ProgID 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{B11367E9-95F5-8049-77E1-18E39C42A7DE} 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\50de1efba4522.tlb" 50de1efba44ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50de1efba44ea.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{B11367E9-95F5-8049-77E1-18E39C42A7DE}\InProcServer32 50de1efba44ea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4852 4960 434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe 81 PID 4960 wrote to memory of 4852 4960 434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe 81 PID 4960 wrote to memory of 4852 4960 434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe 81 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 50de1efba44ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{B11367E9-95F5-8049-77E1-18E39C42A7DE} = "1" 50de1efba44ea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe"C:\Users\Admin\AppData\Local\Temp\434aabdfad156add7c0f3874e9f299d49a722106bd95811b31e2d6de406c03e3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\50de1efba44ea.exe.\50de1efba44ea.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:4852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD56696822add17061dc0bb8ee5b42cc2d4
SHA1d4622558ba366f2f94560da301a81c6c16f95a3c
SHA25673c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125
SHA5120f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099
-
C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5d27f4b1d6aeac029ee61df6b2ecf4786
SHA1f30c1c9eb602c65ed5b114205bb5ff6fe37da77c
SHA2563c09daca937f7b2a385e29b261e48536353f954268903ab9f979d460043ecc20
SHA512f249172947c7b9fe7a910cd802d4c6eaaec86cd66e6e0893aece0236e721c9608ba096a68ea62187a24894a09253b63ff91821685335f89d2dfa03c602e90ea4
-
C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\chrome.manifest
Filesize116B
MD5c8f2d5cdafeace30c82510d16915996f
SHA128f12c01ff6ca33328b7b7b244a3bd35e17baf26
SHA2563e0ee3b0cfbed17be1d506d51337f4484b85ddf3a789907cf01fb7ac7ebb6f12
SHA512bf646431dff4e4eb87b0c4bb62126ace39392d29972566844db25f119f992c7903253084b7f663b4dac6963bbcd32732cbd790888ef130c411c2d8d5e5cd67e9
-
C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\content\bg.js
Filesize8KB
MD5559eb26be688437ef4ecac94660a9986
SHA1a9ce27cb0378ee8140f3430948a2c00d79efc7fd
SHA2561ea0d75700e7d050171ebb07f4478623c92009d027967a560f3310fa8535ba9b
SHA512fec7987a935adbbafa28fea1cbea221ae68d08746e09ecbc197b55d73f3a9c8b50079d27e138589dfb3fbd29f2d8b002baff88e2419289a65eaa6e443ddf71f0
-
C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\content\zy.xul
Filesize225B
MD50cf86280a375e5f08519eb8710e720d5
SHA18eb0cdb61342fae7366f2f5167fbe3f04c0da255
SHA256ace0f134561c7df6b7d6000e9caa9ada1b89cf3de559e135be2e3cd97221d310
SHA512a6330672bb4533a54f16fe909806e31e4e26e08a9641ce5385ddbfbedfd74338d1ee7915ebdb42bc78fb29cb19e274717042c03cb91e6e99444dca7fc060bca5
-
C:\Users\Admin\AppData\Local\Temp\7zS97E0.tmp\[email protected]\install.rdf
Filesize700B
MD5591d2d08c87b48788f3cb4282661318c
SHA1b758c8eb948eb2fa4c3e52d3f777bfeab93ea0a7
SHA2563b3b5c05deee578765472f3768061ca897145da2dad1396f0876b1bc764ccc45
SHA5127e531dcc8be67cab1862ff0f7036d37cfd1f206fc528b7a6d250b181ff026b008834991ea22abf2d87559e3ba0bf1bc6d9840fe2a307a425b494223a2b34f8cd
-
Filesize
70KB
MD5ebcc3eb1a7021aaead55fb677465a717
SHA13c8347f0fd520ee423a4aafea1112a0b06f4b6c8
SHA2565e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c
SHA5120f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995
-
Filesize
70KB
MD5ebcc3eb1a7021aaead55fb677465a717
SHA13c8347f0fd520ee423a4aafea1112a0b06f4b6c8
SHA2565e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c
SHA5120f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995
-
Filesize
115KB
MD56696822add17061dc0bb8ee5b42cc2d4
SHA1d4622558ba366f2f94560da301a81c6c16f95a3c
SHA25673c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125
SHA5120f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099
-
Filesize
2KB
MD5096a65b8a695249d5d554776f1eeace3
SHA12f2506b886a59b4408b23653d8734004ec2dda6d
SHA256a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568
SHA5126e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc
-
Filesize
8KB
MD5cf60cae5e3eff857181c5cbbbd355d6d
SHA10c2f9fa47c82678fc6d9884bf0b4ea0c721328dc
SHA25675231ea94ffc9029b3735e840c591840f9f8aaa7100f5b44ee6d5a3c6700f4dd
SHA512da50277ccc2c7ac54f248c939f3c8b5f179253a8c8b22f723ba8a7caaa3881fbf958eef31e6d7f9c3c475adea3c45614ce6bcb90559c8aae8b3fb75e27648345
-
Filesize
6KB
MD5bdc4438b9067715a84f129c60c2b7a95
SHA1f051d544c525a84c13a42159dc27055723ea5a0f
SHA256b033d8a7985c89ffb6be8e482039789fd3179ed57acc3d61eb1c8239fe177654
SHA512ca3f67ee22ef79a7006a0885e69a865a94872934841a4699bd56606303bba290c8e949cceb033b984f258a6b883495c77233f82759e2ed00f390c868997d1e3f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90