Analysis

  • max time kernel
    34s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 06:45

General

  • Target

    143a1a75574acd1a54156b1978743a0e31bdbbccb2c01653f454ada9f84296c9.exe

  • Size

    249KB

  • MD5

    cdc218446940149c29eb97706c1c9fc7

  • SHA1

    7d2d408f73334e4af774fc12b98fdf57754e2ef0

  • SHA256

    143a1a75574acd1a54156b1978743a0e31bdbbccb2c01653f454ada9f84296c9

  • SHA512

    bf5367faa04eb776f9b88234b13752d0b44aafdc503253e222878b65f82be238a5057eb92490380f8dc7e125c8929806f7b01610e1bf272bbff0552a6fe2e806

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5wZC4aO+6Ym37Ie2:h1OgLdaOwZ7aFgrI5

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\143a1a75574acd1a54156b1978743a0e31bdbbccb2c01653f454ada9f84296c9.exe
    "C:\Users\Admin\AppData\Local\Temp\143a1a75574acd1a54156b1978743a0e31bdbbccb2c01653f454ada9f84296c9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\50d95e8f86057.exe
      .\50d95e8f86057.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    db241a0afd741701dfc3ce46c3b71db1

    SHA1

    d80262addca015a5b3f48f4feaaed84c69408114

    SHA256

    446365eb007c6499642afa830fe28dffac947ec1fcfe8f52bdb4afcc0e6344ec

    SHA512

    69187c4f4707dfbb92d49299c436ea3ccd6d058f1610766c231aa9ff37dc3e5b0357942a11827229b533e8b8775944e4295527e06f153c64625100e4d6a25160

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    20def1137a1de9f7fe0358b5440b25d4

    SHA1

    6210b3765e20d88e385777a5fbc083c18b02249a

    SHA256

    25e7f02a8d7d6d48092af8b7210ff0ccfd2fa2daed4a4611bc7ad352142fcc8c

    SHA512

    b96655cb5b6d3697b1cd5f0fb78a3bcfd3170cd5fdf1718fec6c3cb67070d3b5ab4deabb826d00552c3489605acee339413b95bb641c52bfae696aae361dfc60

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    200672803ba05c8e090b723b2b140b7b

    SHA1

    2444971813f8b09c364fdd4f33b124228b9e2af4

    SHA256

    8113e3782bd442f76550a2828b5f54aa6f065bbe82d87ca234d7c0491aa8bcef

    SHA512

    91d24a302ffc8b5d75df5aeed249841af149589999a58a2d9e2264ada48d7dd5f0a991de5fd54275e4cf604d7911df68801ab0c630faa81d0ae5aaf29ea08672

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    2166ff347c20141f59eff4683f72ea3c

    SHA1

    165ebf23bd9bdf75374bb4bfe24675dcd64531ff

    SHA256

    fe67a609df89483d72bea36eb14d5be08626ee72bd1c53f67bafcc95aaeae330

    SHA512

    cdf88fd8834b7ff6e4269384a134bbed265dc03117a2e0fde887bdf4eb4abd275594ed262fdcb8bc77118779804b4c12a12f385a0b41f317fbf17d4a2a1110b9

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\[email protected]\install.rdf

    Filesize

    700B

    MD5

    cdb79ef8c53c01bb36096222ae1c2d34

    SHA1

    fc5a8782f1e9e5e28662738737b3f9369858b699

    SHA256

    d78e8fcc974977894021d22ce4d7f41937fef21d69e27f0a5d0ddf379450c937

    SHA512

    583fdc5bb755555d2c111a295c23fe36dd8ccc5da02967a1f5c90180f7b8dfc5ea2482593bba65672fe7299918905149ea48c4c40057fe9b809d2a61ad1f8c8a

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\50d95e8f86057.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\50d95e8f86057.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\50d95e8f8608f.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\50d95e8f8608f.tlb

    Filesize

    2KB

    MD5

    096a65b8a695249d5d554776f1eeace3

    SHA1

    2f2506b886a59b4408b23653d8734004ec2dda6d

    SHA256

    a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568

    SHA512

    6e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\aiblohkngicoiaanfmoondagljpcgphc.crx

    Filesize

    8KB

    MD5

    2c820f2acd1d3a9c2e913404e735e151

    SHA1

    f469d4005016cebb668999d7e5e428e34ab2f6b6

    SHA256

    77fd4efadd4baad51eec4d710b6143278a0733019083736402d2720f095558f5

    SHA512

    f2c75fdc595357920a4862bc65fb31daa999780511eda1bd5001d37940fceb3098ca2594758eb42a15aee94bebe2da00c67ae424847b7676716e09b03cbbbc60

  • C:\Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\settings.ini

    Filesize

    6KB

    MD5

    1dbf6a1ee6b18c0d0778da6da02cc480

    SHA1

    a30530d6011835e4792c25f4d636ef20866432fe

    SHA256

    811ca0f01e4c1c4dd70c08a7454416bc4e0cf9823125ad9f37d87fc734ed745f

    SHA512

    aa67ea77da7ec7fc3222bdd7f3769c6521c9fc108bd8dbb52037fc62a477a0ee432a805a4a5eb62ab8c58105f81bfd9f58395fd10637c974aac178942c252d4a

  • \ProgramData\Zoomex\50d95e8f8608f.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • \ProgramData\Zoomex\uninstall.exe

    Filesize

    48KB

    MD5

    e9c9582996a23b2a49a058dcaa3b5525

    SHA1

    f527cc64e759f06c011e5eeffbd217d5249c04df

    SHA256

    43c3e8d7aa00a299f084db17e384aa96de508565f82264ee88bd9c7647fa9fc9

    SHA512

    665613fc7f20e2c4ea40b7a8f39b4c2ea2a24c5119ee86ef072bbe29f606cd78a43081aa0a89b678a46d34e470e1ed10e31d590d3cb5447e1231707fea8e490f

  • \Users\Admin\AppData\Local\Temp\7zS5D9B.tmp\50d95e8f86057.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • \Users\Admin\AppData\Local\Temp\nsd68E2.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nsd68E2.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/1880-56-0x0000000000000000-mapping.dmp

  • memory/1880-69-0x0000000074E10000-0x0000000074E1A000-memory.dmp

    Filesize

    40KB

  • memory/1928-54-0x00000000762B1000-0x00000000762B3000-memory.dmp

    Filesize

    8KB