Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
ZoomSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ZoomSetup.exe
Resource
win10v2004-20240426-en
General
-
Target
ZoomSetup.exe
-
Size
44.9MB
-
MD5
fdc3b66311cd19524c14db567bc9b140
-
SHA1
9299b013e7a72d1638e0381ba1ef1a89f8e1bab9
-
SHA256
e257cf8c1fc5332bf81f85408123762457a698709f745da15607dc594742019f
-
SHA512
f866ed7e7a27d9c6da484ec8dff8b0b0545cab261cb86d77186ee1287e367f89517bd2a195905599ab2288b67eb2e6db0ff6a0d6cfe133f1b0a8ad417caf2d52
-
SSDEEP
786432:BrVP72qAVPQhBbH4vgIud86Ja3eqIus6fcrNddM51SmLYuG3Ova8Vi7:ZLOPQhBb2VuCjuqILdu5RYVMa6i7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ZoomSetup.tmppid process 2596 ZoomSetup.tmp -
Loads dropped DLL 4 IoCs
Processes:
ZoomSetup.exeZoomSetup.tmppid process 2244 ZoomSetup.exe 2596 ZoomSetup.tmp 2596 ZoomSetup.tmp 2596 ZoomSetup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ZoomSetup.exedescription pid process target process PID 2244 wrote to memory of 2596 2244 ZoomSetup.exe ZoomSetup.tmp PID 2244 wrote to memory of 2596 2244 ZoomSetup.exe ZoomSetup.tmp PID 2244 wrote to memory of 2596 2244 ZoomSetup.exe ZoomSetup.tmp PID 2244 wrote to memory of 2596 2244 ZoomSetup.exe ZoomSetup.tmp PID 2244 wrote to memory of 2596 2244 ZoomSetup.exe ZoomSetup.tmp PID 2244 wrote to memory of 2596 2244 ZoomSetup.exe ZoomSetup.tmp PID 2244 wrote to memory of 2596 2244 ZoomSetup.exe ZoomSetup.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZoomSetup.exe"C:\Users\Admin\AppData\Local\Temp\ZoomSetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\is-LDRKN.tmp\ZoomSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-LDRKN.tmp\ZoomSetup.tmp" /SL5="$7011E,46576118,140800,C:\Users\Admin\AppData\Local\Temp\ZoomSetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2596
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
1.4MB
MD5c0a9bf6505dde3b00b516443f54742cb
SHA1212110fe7230ac702d56fa38e3b2b907131893b8
SHA256decf9c7aaee458a9671efe6fb1a6defb2f6a121d06112a24a433a412af94af68
SHA5125fbc72c1ebff450ba8f91811628dfd579ab946752cdd8c54eaa968be0ad02d4591b53a22a4a9436ab91dc0d9b0b0d039bf80700be48ea92554a5dfe21b9aa21a