Analysis
-
max time kernel
142s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 06:50
Static task
static1
Behavioral task
behavioral1
Sample
0cc4e98207d123a797a35dbde6b32f5a.exe
Resource
win7-20231215-en
General
-
Target
0cc4e98207d123a797a35dbde6b32f5a.exe
-
Size
249KB
-
MD5
0cc4e98207d123a797a35dbde6b32f5a
-
SHA1
db550a355706db73fd6e38516f910e8d1822ebde
-
SHA256
3a6f1b561f54f1eda090bd02f5a3aaef3e974aeca9a6b68a648c20d7c9a1a2e6
-
SHA512
66345ec46bc9580ff027da2090792f7e79977c46d7c7fa391d003401d62dc16947375000a0cdfb8f133bb2c825cf01eaeae77b8e4d369be60a181bbab8fe6b76
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5Esu7odmT6cAoUQ1i:h1OgLdaOM7+mT67FQk
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0006000000023242-49.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1268 50d83e239b61c.exe -
Loads dropped DLL 3 IoCs
pid Process 1268 50d83e239b61c.exe 1268 50d83e239b61c.exe 1268 50d83e239b61c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0006000000023242-49.dat upx behavioral2/memory/1268-53-0x0000000074C30000-0x0000000074C3A000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8} 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8}\ = "Zoomex" 50d83e239b61c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8}\NoExplorer = "1" 50d83e239b61c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 6 IoCs
resource yara_rule behavioral2/files/0x0006000000023229-22.dat nsis_installer_1 behavioral2/files/0x0006000000023229-22.dat nsis_installer_2 behavioral2/files/0x0006000000023229-21.dat nsis_installer_1 behavioral2/files/0x0006000000023229-21.dat nsis_installer_2 behavioral2/files/0x0006000000023246-78.dat nsis_installer_1 behavioral2/files/0x0006000000023246-78.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8} 50d83e239b61c.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8}\ProgID 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8}\ = "Zoomex" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\50d83e239b654.dll" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8}\InProcServer32\ThreadingModel = "Apartment" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\50d83e239b654.tlb" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50d83e239b61c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50d83e239b61c.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8}\InProcServer32 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8}\ProgID\ = "Zoomex.1" 50d83e239b61c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1268 1684 0cc4e98207d123a797a35dbde6b32f5a.exe 88 PID 1684 wrote to memory of 1268 1684 0cc4e98207d123a797a35dbde6b32f5a.exe 88 PID 1684 wrote to memory of 1268 1684 0cc4e98207d123a797a35dbde6b32f5a.exe 88 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 50d83e239b61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{E7A2D067-E32D-8C49-46BC-D0FA52A7EED8} = "1" 50d83e239b61c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cc4e98207d123a797a35dbde6b32f5a.exe"C:\Users\Admin\AppData\Local\Temp\0cc4e98207d123a797a35dbde6b32f5a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\7zS2CA9.tmp\50d83e239b61c.exe.\50d83e239b61c.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD586abf08580b0560dd92822ef999c37e8
SHA1598ef5b9baf6f865aecff05af8b81218498170b7
SHA256d67c95d13b87b8d3e8ecc41447c79a4ac3fd0b066fad81a75ae990163deb16be
SHA51274ab53e2a2ddfcef952586d759733f4cc5cc266965ea7f835db5eccc2c37f37c579595ae1bc8f8860cf8518514df31fd73cb02972946dc013b0121b37f415923
-
Filesize
115KB
MD56696822add17061dc0bb8ee5b42cc2d4
SHA1d4622558ba366f2f94560da301a81c6c16f95a3c
SHA25673c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125
SHA5120f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099
-
Filesize
48KB
MD5e9c9582996a23b2a49a058dcaa3b5525
SHA1f527cc64e759f06c011e5eeffbd217d5249c04df
SHA25643c3e8d7aa00a299f084db17e384aa96de508565f82264ee88bd9c7647fa9fc9
SHA512665613fc7f20e2c4ea40b7a8f39b4c2ea2a24c5119ee86ef072bbe29f606cd78a43081aa0a89b678a46d34e470e1ed10e31d590d3cb5447e1231707fea8e490f
-
C:\Users\Admin\AppData\Local\Temp\7zS2CA9.tmp\[email protected]\bootstrap.js
Filesize2KB
MD54cc86687908257873f457df9761f2b09
SHA137222c9bfedd4bc14d36f1de9d4edd6a1ef5b086
SHA256899e4fb14b05ce1e5c1c70e145f30747576e9afda8d56da0a04947f3a8a8b983
SHA51223c666b51dc9282c699c676d3f35096ef5d0fa9b3502e94e3575f674701f5a4c22a62ff78ad0614d3f1421046c3f701cde9e21c2ac4d7b1e9600686cbcc719c3
-
C:\Users\Admin\AppData\Local\Temp\7zS2CA9.tmp\[email protected]\chrome.manifest
Filesize116B
MD59147c8267a0dc08d71a1a23e4d0ae6f3
SHA147c8586c437a53cba707da4f9b433767a588782d
SHA2564254c1de9d5da04bc3fb73bbe787356f254689e98aae4b93d6d6d70ebc1bff26
SHA512095bde79b47d39f78127d352f45610fcaab6ad3b7fb62189f2acb76ee0b72f2414dddd57b974365e37bd6da8d945e83b3d6ade0c6371042ee853089393bf8911
-
C:\Users\Admin\AppData\Local\Temp\7zS2CA9.tmp\[email protected]\content\bg.js
Filesize8KB
MD50244f8ce9e54f56802c10967e198e2cf
SHA14c3f1d12f1d08282d7836af7cd18198c79ffb92d
SHA2567a67050c746c18e3ff8a3737d3f3d72a1ed1f047a54ff790e9b8b9e9e445966d
SHA512789fb3ff62c180ca08036a268705740c4a1439adc90b953da73d86292c6384009451a3b5f406c09b5de0ffa9e91d9eb6f989fd3b823096fa09df0a14f0e48970
-
C:\Users\Admin\AppData\Local\Temp\7zS2CA9.tmp\[email protected]\content\zy.xul
Filesize225B
MD54e6ddca37d552af50a4eb2b4ea18664f
SHA1516b4fd7059e27705e5b55211618055df8db9ce9
SHA256ea1fd6f22193e1cc952a2430d30ce22eff101eed9cd3f976bab3492bb3fd51a2
SHA5123e6977e95fa052dff22b624fa7d4ecb67392413e21aa04d21be5e521846e391da883c7a5e924c700cd07ced86550f5d02531513fe0de1c099383a651cb63d3d0
-
C:\Users\Admin\AppData\Local\Temp\7zS2CA9.tmp\[email protected]\install.rdf
Filesize700B
MD5cbbbc29cbbbdeefd921d7938308d20d2
SHA1a35c9a6bb2279d080f21c2a59023e8b8deb33d9f
SHA256acf9cd12839ac45c2a838e1b87b9689e700fc4f99dc2c8b8839f7f374ee5ef7c
SHA5124c9684508a902d188d9cfada0e8664368a4af86c2856bbb840c19d2dd7680c73b0e1ced6aad51d437125e37d84fcf3ed2108171678445a2e632e6876e6e3f6e0
-
Filesize
70KB
MD5ebcc3eb1a7021aaead55fb677465a717
SHA13c8347f0fd520ee423a4aafea1112a0b06f4b6c8
SHA2565e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c
SHA5120f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995
-
Filesize
108KB
MD507d2778e75869c137957eaf013168cf2
SHA124feabced4a97dd6d84b781f1d6f36a10def63cd
SHA25607e76089447840f7ab0fa4cba71d44efed0295c115e572edf998abb15f1e490b
SHA512db69f90f3508a2b8387a63b07016b2b7a6620e712193567d38b272b78886a1905f7692660a748bc3aed3950c51197b5d55ce4daa5e78e343cd8efdb8934580fc
-
Filesize
2KB
MD5096a65b8a695249d5d554776f1eeace3
SHA12f2506b886a59b4408b23653d8734004ec2dda6d
SHA256a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568
SHA5126e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc
-
Filesize
8KB
MD501de84bac4502cd845e4a5711fbac27d
SHA142369f1c8e0c0ed6afdfc6b35bcd740afa9bcdda
SHA2567a33fad9a0e2bd603363940083fede7b0b19063538b499a82ee62ada096bcb8d
SHA5124aac2a7309cb31220f26124c696c2f27b0b9015fb66c0d9ef148b1339305d1c7fdd548d54f799b8e36dc2ccdbe3bb961a5d0c731dcb58901edb629a4101dac88
-
Filesize
6KB
MD5c70a94e6b52bf34ab8e95cd17b2ab034
SHA1297656b6331613b05cf506054b87be91c5855bd5
SHA256305c0d55425361309ee75c0e071b7f6cd295150fb26e52392684842c23f2a722
SHA5128c45304d9ff8c6057426047245f0313767bb385f22fccc6a446b75627dc1a29dfdc16067a4d1d94c3339ed1e2709f002012dbec3cf2d1de205cc25919c07bb26
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90