Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 17:36

General

  • Target

    7d888d9545876bb39b7dd8fdd5bc01f285f54fc542c4cf726bd56a196ba7dad8.exe

  • Size

    250KB

  • MD5

    52650caf6a995ba57348c7cb4314b20f

  • SHA1

    73cc032302ebff58fd0b9a720cc485f007190b1b

  • SHA256

    7d888d9545876bb39b7dd8fdd5bc01f285f54fc542c4cf726bd56a196ba7dad8

  • SHA512

    445928df124e2d308380bda81cf4b00656b2b55c9567cf199803b96c15cc75017469a1c66b19b94d0ce56231a3743454d5ef96bd4606533ea8a56e97ffc499e7

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5jvu+4To6kTOjuy:h1OgLdaOjvQc68y

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d888d9545876bb39b7dd8fdd5bc01f285f54fc542c4cf726bd56a196ba7dad8.exe
    "C:\Users\Admin\AppData\Local\Temp\7d888d9545876bb39b7dd8fdd5bc01f285f54fc542c4cf726bd56a196ba7dad8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\51181d9f6df9a.exe
      .\51181d9f6df9a.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:892

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\[email protected]\bootstrap.js

          Filesize

          2KB

          MD5

          6ce43d8682c3005f733f6ff7991af947

          SHA1

          70003024f9bb258e5217945d1b647c0591aa3026

          SHA256

          2dfc4418e8b47485e9741cb930c196b0c25d35cba4d176b558511d46c84f1002

          SHA512

          abf6b3cd586b744916e4555cebe99457ed57bc36fddbd64e573ee2e51d8fdf9950f36ca356d59ddc82d0866a4546c8f3afdeacf1246b37edd6d4b0b5c7016bc0

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\[email protected]\chrome.manifest

          Filesize

          116B

          MD5

          9a796dca9fbf9e0d8e06dd35c6c94412

          SHA1

          70914944fa13fa818923d6e63d52bb66cd981afd

          SHA256

          933664995059200dc8aeb992626a2c88f9ada8e7ca77335976f0ad537ad71235

          SHA512

          7c75cea13055bb822d5b54c93e5302fb64339ecb751fed22e7eb338d66d888ff8086ccac3606261037ddc00af94c96183e37108b26a95bf0a262c966c4d1a899

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\[email protected]\content\bg.js

          Filesize

          8KB

          MD5

          7bd0964e516e087322500c8da461a920

          SHA1

          b6a57e0e19e2fc02f4f6d4d8da4b8c240edeec8c

          SHA256

          148addca83ec5fd163d8d51e588401c68e324b6d3096b847befe795e22a0ad44

          SHA512

          d6e20ff386473887f4075e659c30ecff5d0e9ed35e2b5adeee00cff42116c1faf390f6977afd9179552a4812e04febffcfd41112371e9ae7ab0ad16210d5606e

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\[email protected]\content\zy.xul

          Filesize

          225B

          MD5

          8efae0173e081a450d27214243684e1d

          SHA1

          e22d2e4a1e2c5ae1221a6ba3ccea0818e0baf1af

          SHA256

          274e8fdb7424e2731963b6bad93494a389ab5989cf020cfa0aa6d4adc5f0ceb3

          SHA512

          030206add77f635d8f769f106638f99c10a050dddaeea9ca591bf78398f8f27e12afb92ae28680fb35fe930964506b0850d6d55135b094b29cef5c5128069671

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\[email protected]\install.rdf

          Filesize

          700B

          MD5

          f99110cdbc934a67f756b72abed13373

          SHA1

          008f04d1c7bcc1684d6d3cb3cb0f1dd659101523

          SHA256

          c811986342e9974b919e2aa183f1024eae5c0f3dc7c7491c036f512d21c983fc

          SHA512

          8ba9d26d8a807d5749404b5e4ab86a069fa5d7f1c03d79d42eb381ddace977324559bfb0c6f45ebdd7878d65937deea711558288930c618419072d9998408e8c

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\51181d9f6df9a.exe

          Filesize

          71KB

          MD5

          b78633fae8aaf5f7e99e9c736f44f9c5

          SHA1

          26fc60e29c459891ac0909470ac6c61a1eca1544

          SHA256

          d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

          SHA512

          3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\51181d9f6df9a.exe

          Filesize

          71KB

          MD5

          b78633fae8aaf5f7e99e9c736f44f9c5

          SHA1

          26fc60e29c459891ac0909470ac6c61a1eca1544

          SHA256

          d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

          SHA512

          3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\51181d9f6dfd3.dll

          Filesize

          118KB

          MD5

          44f1dc155d3d083b677f20ed0fab8404

          SHA1

          a696c5a0d50145afde3d3a71f70b1c3006ac2199

          SHA256

          67014a6fc8a77ae480dae9b09f800a1f40a40399ef967f86843a80eb4c9eb470

          SHA512

          04a7098abd589eb1a533af6f89d0d982d2faf9c4e7e29d02abaacf81635b789acfb5ca026f7a0c6b4a263934f0425c69f5225488c450e864f8dc8000ffbf94f6

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\51181d9f6dfd3.tlb

          Filesize

          2KB

          MD5

          c749bca713cf6481411b5c4eaac4506a

          SHA1

          539cb813dea7e37eff8c1b696eb0ab42c815ab62

          SHA256

          0a94d2086eb6ac57ba5ee365d3f6f64f33e7c8d18419f04715460bc04ebddf2d

          SHA512

          11b3b333b97b1bbbbbf01b6d367188698470877e180a3854ec9762f706755156136b404f2b95a7304a890686d8f5f697232e6c28497aca20e0aa76988b0f179a

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\gmpbecbhapcgagnijhliinfhecnppiae\51181d9f6ddad1.46655038.js

          Filesize

          4KB

          MD5

          a59add5363f2c07e07a2acf4e9007db6

          SHA1

          adf726e408cc941d043a53be06a39d466b77dd5c

          SHA256

          e33f7308c25e40c22b1057799bc413d68cefc3a75f1480371edfa06ee2a1fdef

          SHA512

          929fce8cd353499f0b17893fbecf792ae90e412a853ddd4f6323fc2033d03bae09d8ffd5b9ed66485850508bae552942c48db754a5e8dfaa1920bb63bb325bf9

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\gmpbecbhapcgagnijhliinfhecnppiae\background.html

          Filesize

          161B

          MD5

          367b439c0a5ff74a40959ec0cb2ef6c3

          SHA1

          b20984c41b1702c8b9451e52cc2e4b5997706218

          SHA256

          3ef2eeb9a5ff7ae073034fd817595e2a9a77d74ce5ba71f8fe72f066bf7f5642

          SHA512

          fc6f0b9edf89097893c20596be9e6098eb53d729ee3fef22556aeb9d1d4926f9c03de1ab7e1e196750a81db08d09bd0c7b0a802c3969c479fddaed9b7927e8b6

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\gmpbecbhapcgagnijhliinfhecnppiae\content.js

          Filesize

          197B

          MD5

          5f9891607f65f433b0690bae7088b2c1

          SHA1

          b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

          SHA256

          fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

          SHA512

          76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\gmpbecbhapcgagnijhliinfhecnppiae\lsdb.js

          Filesize

          559B

          MD5

          209b7ae0b6d8c3f9687c979d03b08089

          SHA1

          6449f8bff917115eef4e7488fae61942a869200f

          SHA256

          e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

          SHA512

          1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\gmpbecbhapcgagnijhliinfhecnppiae\manifest.json

          Filesize

          479B

          MD5

          d9670f9c069ec46aaff5a60a9608e885

          SHA1

          c15da079582c4bf21b06e934dc78f3bd8fbc5607

          SHA256

          a631255a7467449ff89bb97a8d97632411076d00bfb8dc84c19abd100e235e7c

          SHA512

          d7ead015d25cdf1d31ec3330020bd43c5ec702a148c130083fb5ee70a8a4691fe94db7f9390b93d7afbc083531c9c1f23d29bd607c22d7cb362a0cb299645ad3

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\gmpbecbhapcgagnijhliinfhecnppiae\sqlite.js

          Filesize

          1KB

          MD5

          b3d7747931c8b2467c0972bf372de101

          SHA1

          8eb46af7cbd6fb21725c813ff959d5b500e8288c

          SHA256

          f743eefb9e31756c9cc0382c2ce042d896805ea26e7753fcac76a7ffca7f2088

          SHA512

          8eaae339393eba5e79322d1c4383924720c424860dedc108a0e66a233606aadee9b793270feacaa01087fe1fa4354fd3b61ac5143ea1886395ecfb9aac8e9bfd

        • C:\Users\Admin\AppData\Local\Temp\7zSA4E.tmp\settings.ini

          Filesize

          6KB

          MD5

          cda54e591a6d9bf50048db803793566a

          SHA1

          5542138a9414918f43fd3c3e0cc0e324a1996536

          SHA256

          2ceef4a37132a763355724135e738be642d6d8eed5218fee5a6d433948548a38

          SHA512

          db22b4770f08a5c1abb724f4c3ac0d7be459b71b009d1865e1b377454b840b53b3e8b6a0a20b45f2865bb208f4a013163a6fcbf87f1b5778021825f2173a45ae

        • \ProgramData\Zoomex\51181d9f6dfd3.dll

          Filesize

          118KB

          MD5

          44f1dc155d3d083b677f20ed0fab8404

          SHA1

          a696c5a0d50145afde3d3a71f70b1c3006ac2199

          SHA256

          67014a6fc8a77ae480dae9b09f800a1f40a40399ef967f86843a80eb4c9eb470

          SHA512

          04a7098abd589eb1a533af6f89d0d982d2faf9c4e7e29d02abaacf81635b789acfb5ca026f7a0c6b4a263934f0425c69f5225488c450e864f8dc8000ffbf94f6

        • \ProgramData\Zoomex\uninstall.exe

          Filesize

          48KB

          MD5

          f3c79bda3fdf7c5dd24d60400a57cadb

          SHA1

          1adb606aaeedb246a371c8877c737f0f8c798625

          SHA256

          a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

          SHA512

          c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

        • \Users\Admin\AppData\Local\Temp\7zSA4E.tmp\51181d9f6df9a.exe

          Filesize

          71KB

          MD5

          b78633fae8aaf5f7e99e9c736f44f9c5

          SHA1

          26fc60e29c459891ac0909470ac6c61a1eca1544

          SHA256

          d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

          SHA512

          3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

        • \Users\Admin\AppData\Local\Temp\nsiBC5.tmp\UserInfo.dll

          Filesize

          4KB

          MD5

          7579ade7ae1747a31960a228ce02e666

          SHA1

          8ec8571a296737e819dcf86353a43fcf8ec63351

          SHA256

          564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

          SHA512

          a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

        • \Users\Admin\AppData\Local\Temp\nsiBC5.tmp\nsJSON.dll

          Filesize

          7KB

          MD5

          b9cd1b0fd3af89892348e5cc3108dce7

          SHA1

          f7bc59bf631303facfc970c0da67a73568e1dca6

          SHA256

          49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

          SHA512

          fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

        • memory/864-54-0x0000000075141000-0x0000000075143000-memory.dmp

          Filesize

          8KB