Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 06:02

General

  • Target

    2b0c150d2ec089378f222a440b0447f7.exe

  • Size

    250KB

  • MD5

    2b0c150d2ec089378f222a440b0447f7

  • SHA1

    81279b6a4d1240d018407b8c7905c4c4eb5869f3

  • SHA256

    48d8dd45db1ab87ba07ed4f42626549bf954d2cca718bdbfa3f41f00821f4808

  • SHA512

    f408103d1cf8351037dc49205b25c3d89ba6c457bc7e3249a9d2488ac2922fe7ec43ebb22667f5da69d00fc2af07b899992b232b42c5f2defc00617e4218c1d8

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5Hyc6O4+E1sQqPQMu/n1:h1OgLdaOHy73+2sQqPQMu/1

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b0c150d2ec089378f222a440b0447f7.exe
    "C:\Users\Admin\AppData\Local\Temp\2b0c150d2ec089378f222a440b0447f7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\50f965ffba1c2.exe
      .\50f965ffba1c2.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Zoomex\uninstall.exe

    Filesize

    48KB

    MD5

    f3c79bda3fdf7c5dd24d60400a57cadb

    SHA1

    1adb606aaeedb246a371c8877c737f0f8c798625

    SHA256

    a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

    SHA512

    c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    10c61544cd04e6a56b0127cff10801c5

    SHA1

    124ab2bf46b9c2bf120d30a48f0263cd0042579e

    SHA256

    4fdf090c221bdb6bbac837a7a9705ea12b6baa2fdbf13fe3fa6988913ebfb24e

    SHA512

    cdbd92bc0e551960e97e8c8ac42969e2fd569e143ac16d4fbf82404d72f210bcc5ba574d6ce14ab1e72b58ac210bc80cb775052e9965afefe6aa9b5bc7285428

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    96ecd1b0d19f282775e35593a21caf3d

    SHA1

    74cd6b2e67488f00a47ef79d88d3a9bd14ddb891

    SHA256

    ed6a4805f83414c05507810e41b4473d90c0ab30a89b2254c6f0fe090252a15b

    SHA512

    61d55ff5ef06636159de0c10e14cc81d4ae73dc8b6a4c4623b4615280772b987271eae61bb222b000b5da2950d6015cfb717bad55a4b39ab006d7ce20c7ce60f

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    d662c35f0a050a068d72f23466b99f2b

    SHA1

    f9199f28b723791bef666e0cd0afdc19cbde4b27

    SHA256

    0b84fc71a373ec4dd34a1f3351c18b581abac648dc23dd57a5cef0e5718fa897

    SHA512

    54870248ff0e79690ab1b559cbbfa4f85b8e20107f95e5f99662e5cb35896bc934b41f4545f16a91107003c5e3a15b5629ccf5419ec9b9ac4f4ceccb0011bbd9

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    8aecd56d80ee4200d37ab2a0ceb54b42

    SHA1

    91e9d1b040cf59e6e248cfe13705a0da755880d0

    SHA256

    5f4a0c2ff04fa6dea3e21db1c2a57623e3b8525d2f1e24fd126c723c00f71529

    SHA512

    7e0b4aab1fad8d643ee5b9eb5ea92ccf236a8dbf683ee025ba46f7a38732e49b718d70211d477adb42b80f71610029b39bab4be4420ac09010408265550c42e6

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\[email protected]\install.rdf

    Filesize

    700B

    MD5

    5ec1b101c1b35c2b61ea259700215d1f

    SHA1

    167674b965f7ca8bb69a7eb4ddb8f47a066f9c49

    SHA256

    c0ee586c14afab4323aee6a525c6e6d28fe65a01215b9d988295ff1a1266d360

    SHA512

    97d49d4a303784e73623378653eee77f0c9acb2cf8a2717b66c9446b9508332e8b9376955ff5a911de60023dfe74fb945b9e708797a3501e5aa2bc72f690d38a

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\50f965ffba1fb.dll

    Filesize

    116KB

    MD5

    da161da8bcb9b8032908cc303602f2ee

    SHA1

    8a2d5e5b32376a40f33d6c9881001425ec025205

    SHA256

    0648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e

    SHA512

    39e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\50f965ffba1fb.tlb

    Filesize

    2KB

    MD5

    1f14de44d0d63a79f91d3fe90badb5fc

    SHA1

    7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e

    SHA256

    bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c

    SHA512

    86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\efdegoifnmkkcncipgdoobfhmfhdcglc\50f965ffb9fdb4.48333404.js

    Filesize

    4KB

    MD5

    be8276dfd3f4125d4ce70f922d978bb4

    SHA1

    698fce86ef038125a52401375859a208bd66fc47

    SHA256

    ecfec57477e451641376bd60183a6ae70a12292e5103e27b4503dc90b7d2348b

    SHA512

    ea2db065923abe0fe79faebe684aacc31f85f147f3197d3ab696dc4fac13da53c349570ad147beefd57409187701e0c15ce229b1947a12a2d64ecc477e2220db

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\efdegoifnmkkcncipgdoobfhmfhdcglc\background.html

    Filesize

    161B

    MD5

    b04f30ed440419840877f86e75180672

    SHA1

    5716a1f2ad477ef01f27252c4aa4576dec69b843

    SHA256

    6051663b6619dec6df2f1333b1ad126924530be4d6c98ee857a546611f890724

    SHA512

    65555d7fd6c63a3191bad191b606ddddf34462230f6e64962ab7dad88030d85d407bebef7c1569ffdeeaae13264c7667da6d35a572ac3e84d260f47e372ff1a9

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\efdegoifnmkkcncipgdoobfhmfhdcglc\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\efdegoifnmkkcncipgdoobfhmfhdcglc\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\efdegoifnmkkcncipgdoobfhmfhdcglc\manifest.json

    Filesize

    475B

    MD5

    95b6b9aa3a3730d6d373a68eb5b411c9

    SHA1

    05cc71bfa2d2a2a18e169def790cca29f757dd3e

    SHA256

    5ac43caaa60d48d2c5bc8059dc845eb344b31c088207c8da714f7a36d500c69e

    SHA512

    5a178056071d0c94d2cfdf72a60403fbf9703cc28abe560f1f04fc2e073188f595c6bb3b687c7e2654899e103a229fe123c41af8aebbe189c9854ed71d8c672e

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\efdegoifnmkkcncipgdoobfhmfhdcglc\sqlite.js

    Filesize

    1KB

    MD5

    a3fe7deef9abed250abaded89f480a01

    SHA1

    bce2f6cf2154b06e7e6110d2deaef37011279f95

    SHA256

    a2c99cb8943dad7c8338b362d59a96d059e4a0f63dc48df3a218f067285b02cd

    SHA512

    8bea266c6b1318798d1c6fd0333b2c12d2b186ebaa09e8fafc2cf7cdce764fcd21d601dd128b2a1a1845246ad355795fa79797d63e20856766bba20bd8fd5eb8

  • C:\Users\Admin\AppData\Local\Temp\7zS8047.tmp\settings.ini

    Filesize

    6KB

    MD5

    d5611b49933d1cfebf12f5fc23060aa8

    SHA1

    0af5d627d99336989757572e0493e9cb225acaa7

    SHA256

    23887e6c71a89663b2eafbf9d9554591d1cd11fe609a78f216f6d976d8e5b655

    SHA512

    42c46e9339693d8936150da49a73090a92302500e7663cf1b0e20a9843dcd9ffa6ebead325efedddd02fbe8241b829b1bbc6c473d8b343b1952684b02fc46a47

  • \Users\Admin\AppData\Local\Temp\7zS8047.tmp\50f965ffba1c2.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • \Users\Admin\AppData\Local\Temp\nst821C.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nst821C.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/2716-79-0x0000000074840000-0x000000007484A000-memory.dmp

    Filesize

    40KB