Analysis

  • max time kernel
    122s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 08:01

General

  • Target

    10a72de1a4d6908b409d0ac37e28085c.exe

  • Size

    249KB

  • MD5

    10a72de1a4d6908b409d0ac37e28085c

  • SHA1

    fcf6939d3d1fe93bcfee5b89204512590629ee65

  • SHA256

    4a41f1d49734560ee52209a42ab89223dfbbca398a3745667a93ce803284bcbc

  • SHA512

    31900e234639cc9ebc86052d4c9cebc2d4ced07192a5168477c068144b357a643f47f6a6ed2656d2bd1520e10cd6806ea3edc14167c0c8c335d2dc57d6b91e41

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5n9W4HtveOmtfsRT0flc:h1OgLdaOn9TeOjRoflc

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10a72de1a4d6908b409d0ac37e28085c.exe
    "C:\Users\Admin\AppData\Local\Temp\10a72de1a4d6908b409d0ac37e28085c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\50dd84aeeefa6.exe
      .\50dd84aeeefa6.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Zoomex\uninstall.exe

    Filesize

    48KB

    MD5

    e9c9582996a23b2a49a058dcaa3b5525

    SHA1

    f527cc64e759f06c011e5eeffbd217d5249c04df

    SHA256

    43c3e8d7aa00a299f084db17e384aa96de508565f82264ee88bd9c7647fa9fc9

    SHA512

    665613fc7f20e2c4ea40b7a8f39b4c2ea2a24c5119ee86ef072bbe29f606cd78a43081aa0a89b678a46d34e470e1ed10e31d590d3cb5447e1231707fea8e490f

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    9744cda0cb8cf77f1f440602b2395a34

    SHA1

    b3bcfea19c5824ceadcd3a9f459cccc769a69bdb

    SHA256

    502c136225eb50733608f927405449d9d8a73e0a11df782d56e5bf61cefb11ea

    SHA512

    ff2636923f241bc4d7e7b4cd739eb810c6a034761e1131adad1da78df297bc2a8d7c4ea652cc799a2dacc5a101266dc7aa04d55c458e8a9ca27d5f8afdf8350d

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    d51529ca8333e667032ce9068f215944

    SHA1

    97d64352626b9f250be31da4703e58e5043e82a3

    SHA256

    06ba462a57ce6ce83caeefc7b2e58884a2799f5bd0da1f7a8219c7063e7ef9ec

    SHA512

    cd8484115bdf5e025b53e0335bd0a3313d8a495792c62be4204cb04c3096cc0a808e4c5079e81a3493c5b78a58d3b748759f91e9c5ee2321290caeda1e99f955

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    098129fbaa7f60c57efd87aea7a64016

    SHA1

    55cb2b7521647153b26c3616463eb870d0a5a730

    SHA256

    d568df108f794b9993237f6051bb5769b191e8a8b2c672e2b4c2343869e222e2

    SHA512

    b4b4590f56d37a67f250095eb453f9ec4c7a73cdcd95f8bb28db429598dcbaceb948ea5733f2d3bbf7d730ba94ee542307f3d215d8c682cb218258661606b9f8

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    af0a7792aec2da2a58ee85f16c56f731

    SHA1

    ca4a3b919953a0bc340132da45d3114a3350268a

    SHA256

    57e9eb32585dd0a862efd43dc5f6b642c2d12fd547b886ab79c06100092b591d

    SHA512

    bdc0a2980d2079b716ac1248a0133d2a0abb213596c619fbb0aeaf08b7b93c667c57cbf58da838cede7ec32e6ab4eb1662ed9cb0c9bf498a82917ea3846c31f0

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\install.rdf

    Filesize

    700B

    MD5

    a51dc48c9c23f17ef94af2e749d4f817

    SHA1

    ec886fc836d0b7177f3d782073e18e8c910d37db

    SHA256

    3feec79706358b461bf390b590258180155042dee6e3453403730b7298015e24

    SHA512

    b9ba42ddaa0f611f85399f00244e2c7a3af6694a6960ed3944f370d184d246e37aa1610bd4f266ef152411137b3f9538fd77da69f95d2bc269e8b3ea975a8c28

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\50dd84aeeefdd.dll

    Filesize

    115KB

    MD5

    6696822add17061dc0bb8ee5b42cc2d4

    SHA1

    d4622558ba366f2f94560da301a81c6c16f95a3c

    SHA256

    73c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125

    SHA512

    0f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\50dd84aeeefdd.tlb

    Filesize

    2KB

    MD5

    096a65b8a695249d5d554776f1eeace3

    SHA1

    2f2506b886a59b4408b23653d8734004ec2dda6d

    SHA256

    a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568

    SHA512

    6e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\bdkjnaopnidiolinpnabldifkncmhdli.crx

    Filesize

    8KB

    MD5

    7cf975aff4785c77bf86d094552dc0c6

    SHA1

    08fd8a7cf74b410ac380c677678a08baead118a6

    SHA256

    22d3b79d7e8147d9d6e94f737d4578ed6132d010d8d228f229bc826aac15c4c2

    SHA512

    b4cf3d64aedf17b600b1772419c1d84c6adb9f6d771788182b7972f029610a1a5397d011093a7278daab34a4d2e8b2b9fbf37db6c6fbe0d4925e5c3bc75bfac1

  • C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\settings.ini

    Filesize

    6KB

    MD5

    c5034b8f078e231d3af529accfd3b1e1

    SHA1

    3f2e17ce2b95e7ac5203382ad85ec59cdaa91524

    SHA256

    46351fe97e772d18a836d5ed05f463555d27475ae12598f8d3d08aac9effb2d6

    SHA512

    551a5cf4692018e48083569067b94b6124f03f0fe507b0c3c247b1946c2204a6656b21efec0e18bb06e92ec99840fb8c6ca89962f4a77c653c1abca3a67d01c6

  • \Users\Admin\AppData\Local\Temp\7zS44EC.tmp\50dd84aeeefa6.exe

    Filesize

    70KB

    MD5

    ebcc3eb1a7021aaead55fb677465a717

    SHA1

    3c8347f0fd520ee423a4aafea1112a0b06f4b6c8

    SHA256

    5e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c

    SHA512

    0f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995

  • \Users\Admin\AppData\Local\Temp\nst873A.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nst873A.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/2652-54-0x00000000748F0000-0x00000000748FA000-memory.dmp

    Filesize

    40KB

  • memory/2652-88-0x00000000748F0000-0x00000000748F9000-memory.dmp

    Filesize

    36KB