Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
10a72de1a4d6908b409d0ac37e28085c.exe
Resource
win7-20231215-en
General
-
Target
10a72de1a4d6908b409d0ac37e28085c.exe
-
Size
249KB
-
MD5
10a72de1a4d6908b409d0ac37e28085c
-
SHA1
fcf6939d3d1fe93bcfee5b89204512590629ee65
-
SHA256
4a41f1d49734560ee52209a42ab89223dfbbca398a3745667a93ce803284bcbc
-
SHA512
31900e234639cc9ebc86052d4c9cebc2d4ced07192a5168477c068144b357a643f47f6a6ed2656d2bd1520e10cd6806ea3edc14167c0c8c335d2dc57d6b91e41
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5n9W4HtveOmtfsRT0flc:h1OgLdaOn9TeOjRoflc
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000600000001644a-52.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2652 50dd84aeeefa6.exe -
Loads dropped DLL 5 IoCs
pid Process 1788 10a72de1a4d6908b409d0ac37e28085c.exe 2652 50dd84aeeefa6.exe 2652 50dd84aeeefa6.exe 2652 50dd84aeeefa6.exe 2652 50dd84aeeefa6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2652-54-0x00000000748F0000-0x00000000748FA000-memory.dmp upx behavioral1/files/0x000600000001644a-52.dat upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92} 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92}\ = "Zoomex" 50dd84aeeefa6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92}\NoExplorer = "1" 50dd84aeeefa6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x00090000000152c7-20.dat nsis_installer_1 behavioral1/files/0x00090000000152c7-20.dat nsis_installer_2 behavioral1/files/0x0006000000016adc-74.dat nsis_installer_1 behavioral1/files/0x0006000000016adc-74.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92}\InProcServer32 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\50dd84aeeefdd.dll" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92}\ProgID\ = "Zoomex.1" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92}\InProcServer32\ThreadingModel = "Apartment" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92} 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92}\ProgID 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\50dd84aeeefdd.tlb" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92}\ = "Zoomex" 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50dd84aeeefa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50dd84aeeefa6.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2652 1788 10a72de1a4d6908b409d0ac37e28085c.exe 29 PID 1788 wrote to memory of 2652 1788 10a72de1a4d6908b409d0ac37e28085c.exe 29 PID 1788 wrote to memory of 2652 1788 10a72de1a4d6908b409d0ac37e28085c.exe 29 PID 1788 wrote to memory of 2652 1788 10a72de1a4d6908b409d0ac37e28085c.exe 29 PID 1788 wrote to memory of 2652 1788 10a72de1a4d6908b409d0ac37e28085c.exe 29 PID 1788 wrote to memory of 2652 1788 10a72de1a4d6908b409d0ac37e28085c.exe 29 PID 1788 wrote to memory of 2652 1788 10a72de1a4d6908b409d0ac37e28085c.exe 29 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 50dd84aeeefa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{88C45EC2-C1A6-8DBD-153F-22EDBCD32C92} = "1" 50dd84aeeefa6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a72de1a4d6908b409d0ac37e28085c.exe"C:\Users\Admin\AppData\Local\Temp\10a72de1a4d6908b409d0ac37e28085c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\50dd84aeeefa6.exe.\50dd84aeeefa6.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5e9c9582996a23b2a49a058dcaa3b5525
SHA1f527cc64e759f06c011e5eeffbd217d5249c04df
SHA25643c3e8d7aa00a299f084db17e384aa96de508565f82264ee88bd9c7647fa9fc9
SHA512665613fc7f20e2c4ea40b7a8f39b4c2ea2a24c5119ee86ef072bbe29f606cd78a43081aa0a89b678a46d34e470e1ed10e31d590d3cb5447e1231707fea8e490f
-
C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\bootstrap.js
Filesize2KB
MD59744cda0cb8cf77f1f440602b2395a34
SHA1b3bcfea19c5824ceadcd3a9f459cccc769a69bdb
SHA256502c136225eb50733608f927405449d9d8a73e0a11df782d56e5bf61cefb11ea
SHA512ff2636923f241bc4d7e7b4cd739eb810c6a034761e1131adad1da78df297bc2a8d7c4ea652cc799a2dacc5a101266dc7aa04d55c458e8a9ca27d5f8afdf8350d
-
C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\chrome.manifest
Filesize116B
MD5d51529ca8333e667032ce9068f215944
SHA197d64352626b9f250be31da4703e58e5043e82a3
SHA25606ba462a57ce6ce83caeefc7b2e58884a2799f5bd0da1f7a8219c7063e7ef9ec
SHA512cd8484115bdf5e025b53e0335bd0a3313d8a495792c62be4204cb04c3096cc0a808e4c5079e81a3493c5b78a58d3b748759f91e9c5ee2321290caeda1e99f955
-
C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\content\bg.js
Filesize8KB
MD5098129fbaa7f60c57efd87aea7a64016
SHA155cb2b7521647153b26c3616463eb870d0a5a730
SHA256d568df108f794b9993237f6051bb5769b191e8a8b2c672e2b4c2343869e222e2
SHA512b4b4590f56d37a67f250095eb453f9ec4c7a73cdcd95f8bb28db429598dcbaceb948ea5733f2d3bbf7d730ba94ee542307f3d215d8c682cb218258661606b9f8
-
C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\content\zy.xul
Filesize225B
MD5af0a7792aec2da2a58ee85f16c56f731
SHA1ca4a3b919953a0bc340132da45d3114a3350268a
SHA25657e9eb32585dd0a862efd43dc5f6b642c2d12fd547b886ab79c06100092b591d
SHA512bdc0a2980d2079b716ac1248a0133d2a0abb213596c619fbb0aeaf08b7b93c667c57cbf58da838cede7ec32e6ab4eb1662ed9cb0c9bf498a82917ea3846c31f0
-
C:\Users\Admin\AppData\Local\Temp\7zS44EC.tmp\[email protected]\install.rdf
Filesize700B
MD5a51dc48c9c23f17ef94af2e749d4f817
SHA1ec886fc836d0b7177f3d782073e18e8c910d37db
SHA2563feec79706358b461bf390b590258180155042dee6e3453403730b7298015e24
SHA512b9ba42ddaa0f611f85399f00244e2c7a3af6694a6960ed3944f370d184d246e37aa1610bd4f266ef152411137b3f9538fd77da69f95d2bc269e8b3ea975a8c28
-
Filesize
115KB
MD56696822add17061dc0bb8ee5b42cc2d4
SHA1d4622558ba366f2f94560da301a81c6c16f95a3c
SHA25673c44d8943947e3cf9ecabdeea4d9a37652614f5490a1f972816be4123795125
SHA5120f1946ce002441d010f67156f67b9d18e01ba35edfeb66ce8096467d3126b547e5040032253275b173f2dba9bce983775f360d83ec026986b55cb85e4b63f099
-
Filesize
2KB
MD5096a65b8a695249d5d554776f1eeace3
SHA12f2506b886a59b4408b23653d8734004ec2dda6d
SHA256a602c790bcf424c154a082a88a495b256dd5456f627943568c358c74f606c568
SHA5126e832caff1951b4fdb489997af5736fdbafa1de5573f629fc6798666bffd0ca0715311ce6590202cc970cce4492d94994a588547bb579bf70bc264683bc45cdc
-
Filesize
8KB
MD57cf975aff4785c77bf86d094552dc0c6
SHA108fd8a7cf74b410ac380c677678a08baead118a6
SHA25622d3b79d7e8147d9d6e94f737d4578ed6132d010d8d228f229bc826aac15c4c2
SHA512b4cf3d64aedf17b600b1772419c1d84c6adb9f6d771788182b7972f029610a1a5397d011093a7278daab34a4d2e8b2b9fbf37db6c6fbe0d4925e5c3bc75bfac1
-
Filesize
6KB
MD5c5034b8f078e231d3af529accfd3b1e1
SHA13f2e17ce2b95e7ac5203382ad85ec59cdaa91524
SHA25646351fe97e772d18a836d5ed05f463555d27475ae12598f8d3d08aac9effb2d6
SHA512551a5cf4692018e48083569067b94b6124f03f0fe507b0c3c247b1946c2204a6656b21efec0e18bb06e92ec99840fb8c6ca89962f4a77c653c1abca3a67d01c6
-
Filesize
70KB
MD5ebcc3eb1a7021aaead55fb677465a717
SHA13c8347f0fd520ee423a4aafea1112a0b06f4b6c8
SHA2565e74f0e710c067ad82301c7c14ed6afb138f974f351042cfe0ecd275cea2612c
SHA5120f18c22e6eff8ec90ccc616e62f32701d046185311e01e5f506778fae0c31f35123c3ce756ff2c0eef6f23e06e280f870b80080d11dc6da3aa25901f5a92d995
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90