Analysis

  • max time kernel
    148s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 13:12

General

  • Target

    ZoomInstallerFull.exe

  • Size

    85.3MB

  • MD5

    0ad91ce888ace42b95ca1c9bb5b47a75

  • SHA1

    1c3b3205f99cd54640a0eedee9e689bb8acb6ca9

  • SHA256

    4c582dd6e6b21ff8f9bbd470876ebe06f008505ed498abb38c34038cd5c1c3d7

  • SHA512

    58ae442e2224e07824d4443cbb0c3c43f555b3f84c59f49e85eecdff7f11204729165ad678c433d9102ef73d28aaf70157dbec7a031d589eb028cca4704d8945

  • SSDEEP

    1572864:KaDXhgywVFx7XC9US6K8Xotmi4PEC+KuzGQ+CHM2+A2e2cAaXs9:KMXNqz7XCCVi4PEC+KO55s2f2cF0

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZoomInstallerFull.exe
    "C:\Users\Admin\AppData\Local\Temp\ZoomInstallerFull.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Program Files (x86)\Zoom\Zoom.exe
      "C:\Program Files (x86)\Zoom\Zoom.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:912
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1624
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
      • C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\OWFlMWIyMD.exe
        "C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\OWFlMWIyMD.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
          "C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\OWFlMWIyMD.exe"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:1668
      • C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\ZGNkNGFkNT.exe
        "C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\ZGNkNGFkNT.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
          "C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\ZGNkNGFkNT.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Zoom\mscorrc.dll

    Filesize

    133KB

    MD5

    53e03d5e3bffa02fbc7fb1420ac8e858

    SHA1

    36c44c9ff39815aa167f341c286c5cd1514f771f

    SHA256

    23a433398be5135222ee14bb1de6334e7b22bad1a38664a83f1cf19dfbddd960

    SHA512

    f6aca16b90f6b4efa413dc9a8f1d05e83c1e3791b2cb988f9bce69d5272a0077c1edcae4111a494d166b5e3ab4e25956dead4e93ee1e43417c2b7bb082292170

  • C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\OWFlMWIyMD.exe

    Filesize

    935KB

    MD5

    70eb44eb0dd30b93164e79141f484bac

    SHA1

    7142ca3672c89611b5276f7e7840ba15df4b823b

    SHA256

    73dc36c220221e46ee9bd34e6bd6ae0cb567dc27b8434174dbe70998322aadf9

    SHA512

    b9e33050d8b1019ee513c5d5481e954027bc3caa92f2dc653b5062e90b357cbc890a19445314959c0166857cf72af78d4195c845a9d89a3761b6c0da51acbb86

  • C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\ZGNkNGFkNT.exe

    Filesize

    1.1MB

    MD5

    93171815851f50223dc6e4343ee82e56

    SHA1

    2bbe250758e5d1b8f4f0ad34911f82da69e018f1

    SHA256

    8a537682c8a328cd7f6220525e3cb63adf0323985fe4b109a3ff2df6fc228133

    SHA512

    966581c6da0007bf2b212536f682bdda14b777396c9035455bfc05935baca2e557eda63b27c114ab21b598a8b2b932e3f25d910072a9258f9c63c77b507f7b2d

  • C:\Users\Admin\AppData\Local\Temp\Cab3B3E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    b386a4a55a6c7998272f5a4bfd28c4ff

    SHA1

    e0651e191c16f565c30fe64b5034fb7430499bfb

    SHA256

    7b7fb473fdc1265d5916539ee42d1e4dd90b439c583905be5c4bece5e1c7bf26

    SHA512

    9b4d13a505e2f33871f628297dac8bb6972fd7f7313d6b0e716fad7ec273353b7feee7c2ceebd97a6a5086dacb8c7a153e24124a1e7d975ebfe351001af7af91

  • \Program Files (x86)\Zoom\D3DCompiler_47_cor3.dll

    Filesize

    4.7MB

    MD5

    03a60a6652caf4f49ea5912ce4e1b33c

    SHA1

    a0d949d4af7b1048dc55e39d1d1260a1e0660c4f

    SHA256

    b23e7b820ed5c6ea7dcd77817e2cd79f1cec9561d457172287ee634a8bd658c3

    SHA512

    6711d40d171ea200c92d062226a69f33eb41e9232d74291ef6f0202de73cf4dc54fbdd769104d2bb3e89dc2d81f2f2f3479e4258a5d6a54c545e56b07746b4c4

  • \Program Files (x86)\Zoom\PresentationNative_cor3.dll

    Filesize

    1.2MB

    MD5

    274761a595f86982214221b5685b3218

    SHA1

    b908013028cb07fb799de2e48b6492404add6069

    SHA256

    6d5910c0a0a4e3ee8863e4dadc73662d28ae9bfcda4a52960e26c1237386851a

    SHA512

    3f9cf3d8e428619b798374f2e2a6ef9cf4213428277a74306978552772aae1a4a9ae7247c2dc893c0054d480dda871bbd74b0bc4afd65b0f584958d501ed8867

  • \Program Files (x86)\Zoom\wpfgfx_cor3.dll

    Filesize

    1.9MB

    MD5

    627ecf139beed59b4e1b26caac8f68e4

    SHA1

    9747fe073aed451c936a66f8ad112bbb1a8c31c8

    SHA256

    0a01412b64e6889ace8933dd2f559d186b693aefe31e6b084e2d435b1737af39

    SHA512

    25bdb740039c867ce0cc1347493cf456e32d767c898a683da1306992ae77ed3605612c804c2eae483320f18f2cd0850c17226ef21e09fe07997aa47679b6030e

  • \ProgramData\mozglue.dll

    Filesize

    593KB

    MD5

    c8fd9be83bc728cc04beffafc2907fe9

    SHA1

    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

    SHA256

    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

    SHA512

    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

  • \ProgramData\nss3.dll

    Filesize

    2.0MB

    MD5

    1cc453cdf74f31e4d913ff9c10acdde2

    SHA1

    6e85eae544d6e965f15fa5c39700fa7202f3aafe

    SHA256

    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

    SHA512

    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

  • memory/912-689-0x0000000002410000-0x0000000002418000-memory.dmp

    Filesize

    32KB

  • memory/912-688-0x000000001B7A0000-0x000000001BA82000-memory.dmp

    Filesize

    2.9MB

  • memory/1624-696-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

    Filesize

    32KB

  • memory/1624-695-0x000000001B5B0000-0x000000001B892000-memory.dmp

    Filesize

    2.9MB

  • memory/2360-509-0x0000000002510000-0x0000000002560000-memory.dmp

    Filesize

    320KB

  • memory/2360-533-0x0000000008A40000-0x0000000008A60000-memory.dmp

    Filesize

    128KB

  • memory/2360-483-0x000000013FD1D000-0x000000013FD1E000-memory.dmp

    Filesize

    4KB

  • memory/2360-501-0x0000000006E50000-0x0000000007050000-memory.dmp

    Filesize

    2.0MB

  • memory/2360-525-0x00000000089B0000-0x00000000089D0000-memory.dmp

    Filesize

    128KB

  • memory/2360-521-0x0000000008920000-0x00000000089B0000-memory.dmp

    Filesize

    576KB

  • memory/2360-529-0x0000000008A00000-0x0000000008A10000-memory.dmp

    Filesize

    64KB

  • memory/2360-636-0x000000000AF50000-0x000000000AF5A000-memory.dmp

    Filesize

    40KB

  • memory/2360-635-0x000000000AF50000-0x000000000AF5A000-memory.dmp

    Filesize

    40KB

  • memory/2360-646-0x000000013FD1D000-0x000000013FD1E000-memory.dmp

    Filesize

    4KB

  • memory/2360-647-0x000000000AF50000-0x000000000AF5A000-memory.dmp

    Filesize

    40KB

  • memory/2360-517-0x0000000008050000-0x0000000008880000-memory.dmp

    Filesize

    8.2MB

  • memory/2360-537-0x0000000008AB0000-0x0000000008AD0000-memory.dmp

    Filesize

    128KB

  • memory/2360-541-0x0000000008AF0000-0x0000000008B10000-memory.dmp

    Filesize

    128KB

  • memory/2360-545-0x0000000008B30000-0x0000000008B50000-memory.dmp

    Filesize

    128KB

  • memory/2360-513-0x00000000047C0000-0x0000000004800000-memory.dmp

    Filesize

    256KB

  • memory/2360-505-0x0000000001CF0000-0x0000000001D30000-memory.dmp

    Filesize

    256KB

  • memory/2360-496-0x0000000004660000-0x00000000047C0000-memory.dmp

    Filesize

    1.4MB

  • memory/2360-492-0x0000000006930000-0x0000000006B60000-memory.dmp

    Filesize

    2.2MB

  • memory/2360-488-0x00000000057A0000-0x0000000006700000-memory.dmp

    Filesize

    15.4MB

  • memory/2360-484-0x0000000003390000-0x0000000004030000-memory.dmp

    Filesize

    12.6MB