analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://us04web.zoom.us/j/825676553

Full analysis: https://app.any.run/tasks/9bf098db-6f6a-4be8-8274-37c3aa9e295a
Verdict: Malicious activity
Analysis date: March 31, 2020, 08:45:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

77672C80F5BE3AA0D44F6721B50FC5FC

SHA1:

0B810051294F2BEC8C412BF89EF9A3FDCD7B92DB

SHA256:

3F6CB59CF5EC92E03E41703320FC281ED35EF53031964D0CD49D27947F306055

SSDEEP:

3:N8VeKILQN4G6Wn:2j94G9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
      • Installer.exe (PID: 680)
      • Installer.exe (PID: 1684)
      • zm5BD1.tmp (PID: 1684)
      • Zoom.exe (PID: 2608)
      • Zoom.exe (PID: 3548)
      • Zoom.exe (PID: 2816)
      • Zoom.exe (PID: 572)
    • Loads dropped or rewritten executable

      • Installer.exe (PID: 680)
      • Zoom.exe (PID: 2608)
      • Zoom.exe (PID: 3548)
      • Zoom.exe (PID: 2816)
      • Zoom.exe (PID: 572)
    • Changes settings of System certificates

      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3616)
      • iexplore.exe (PID: 1720)
      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
      • Installer.exe (PID: 680)
    • Reads Internet Cache Settings

      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
    • Creates files in the user directory

      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
      • Installer.exe (PID: 680)
      • Zoom.exe (PID: 2608)
      • Zoom.exe (PID: 2816)
      • Zoom.exe (PID: 3548)
      • Zoom.exe (PID: 572)
    • Modifies the open verb of a shell class

      • Installer.exe (PID: 680)
    • Creates a software uninstall entry

      • Installer.exe (PID: 680)
    • Changes IE settings (feature browser emulation)

      • Installer.exe (PID: 680)
    • Application launched itself

      • Installer.exe (PID: 680)
      • Zoom.exe (PID: 2608)
    • Starts itself from another location

      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
    • Starts application with an unusual extension

      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
    • Adds / modifies Windows certificates

      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
  • INFO

    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1720)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3616)
      • iexplore.exe (PID: 1720)
    • Changes internet zones settings

      • iexplore.exe (PID: 1720)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3616)
    • Creates files in the user directory

      • iexplore.exe (PID: 3616)
      • iexplore.exe (PID: 1720)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1720)
      • Installer.exe (PID: 680)
      • Zoom.exe (PID: 572)
      • Zoom_o42l8sofizku_59e256195ef91dfb.exe (PID: 2492)
    • Dropped object may contain Bitcoin addresses

      • Installer.exe (PID: 680)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1720)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1720)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
10
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start iexplore.exe iexplore.exe zoom_o42l8sofizku_59e256195ef91dfb.exe installer.exe installer.exe zoom.exe zm5bd1.tmp no specs zoom.exe zoom.exe no specs zoom.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1720"C:\Program Files\Internet Explorer\iexplore.exe" "https://us04web.zoom.us/j/825676553"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3616"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1720 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2492"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\Zoom_o42l8sofizku_59e256195ef91dfb.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\Zoom_o42l8sofizku_59e256195ef91dfb.exe
iexplore.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Opener
Exit code:
0
Version:
4,6,19178,0323
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\6z2bcoul\zoom_o42l8sofizku_59e256195ef91dfb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
680"C:\Users\admin\AppData\Roaming\Zoom\ZoomDownload\Installer.exe" ZInstaller --conf.mode=silent --ipc_wnd=262536C:\Users\admin\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
Zoom_o42l8sofizku_59e256195ef91dfb.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Installer
Exit code:
0
Version:
4,6,19178,0323
Modules
Images
c:\users\admin\appdata\roaming\zoom\zoomdownload\installer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1684"C:\Users\admin\AppData\Roaming\Zoom\ZoomDownload\Installer.exe" /addfwexception --bin_home="C:\Users\admin\AppData\Roaming\Zoom\bin"C:\Users\admin\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
Installer.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
HIGH
Description:
Zoom Installer
Exit code:
0
Version:
4,6,19178,0323
Modules
Images
c:\users\admin\appdata\roaming\zoom\zoomdownload\installer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2608"C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe" "--url=zoommtg://win.launch?action=join&browser=msie&confid=dXNzPTU2NWNlNWI3LnhXUUdIRjV6NnlzaGFPdmdLVGlPRTZsZkdjcWNsWkJPcXlnOGNCUHRiRmYwbnVMd3RJTjBKb2REWDlmNDdBazZSdkwxWkpzRHZYUmxFczEyUUg1S0ZBJTNEJTNEJnRpZD03NmVmNDFhNDM2YzI0MDgwOGRjZmJiODhjZWJmYjExZg%3D%3D&confno=825676553&mcv=0.92.11227.0929&zc=0"C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe
Zoom_o42l8sofizku_59e256195ef91dfb.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom
Exit code:
0
Version:
4,6,19178,0323
Modules
Images
c:\users\admin\appdata\roaming\zoom\bin\zoom.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\roaming\zoom\bin\dllsafecheck.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1684"C:\Users\admin\AppData\Local\Temp\zm5BD1.tmp" -DAF8C715436E44649F1312698287E6A5=C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\Zoom_o42l8sofizku_59e256195ef91dfb.exeC:\Users\admin\AppData\Local\Temp\zm5BD1.tmpZoom_o42l8sofizku_59e256195ef91dfb.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Opener
Exit code:
0
Version:
4,6,19178,0323
Modules
Images
c:\windows\system32\firewallapi.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\msctf.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\user32.dll
3548C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe --action=join --runaszvideo=TRUE C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe
Zoom.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom
Exit code:
0
Version:
4,6,19178,0323
Modules
Images
c:\users\admin\appdata\roaming\zoom\bin\zoom.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\roaming\zoom\bin\dllsafecheck.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2816Zoom.exe --action=uploadFeedbackC:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exeZoom.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom
Exit code:
0
Version:
4,6,19178,0323
Modules
Images
c:\users\admin\appdata\roaming\zoom\bin\zoom.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\roaming\zoom\bin\dllsafecheck.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
572Zoom.exe --action=uploadFeedbackC:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exeZoom.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom
Exit code:
0
Version:
4,6,19178,0323
Modules
Images
c:\users\admin\appdata\roaming\zoom\bin\zoom.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\roaming\zoom\bin\dllsafecheck.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
11 263
Read events
2 364
Write events
0
Delete events
0

Modification events

No data
Executable files
91
Suspicious files
76
Text files
69
Unknown types
39

Dropped files

PID
Process
Filename
Type
1720iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab965C.tmp
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar965D.tmp
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\I62BBKP0.txt
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\4IT734EV.txt
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\137XNXRM.txt
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\PEY6WIWY.txt
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5FD5BF0CE6372B1CAFE381FD0BC969Cbinary
MD5:8BB78ADEB4493D4FA9839CF7F4F1BFD3
SHA256:D34A3AA1D7414A06C49ACAD55BBD576E9A683B56FA2FAA6EA22B0DF0473F2288
3616iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771binary
MD5:8CBE18BF78B0B557F6297168DD355EC3
SHA256:DE38E82F56134942EE4CBF523283A332A28DA66EC299B932822571C8D62D1332
3616iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\launch.min[1].csstext
MD5:105594F2452FE32A3B15D9D6AFF6F21F
SHA256:5475EB29505EBB24CFBB837CE642F063923EB8572075A8A09E7E2558CBD7A2DD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
77
DNS requests
39
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3616
iexplore.exe
GET
200
172.217.23.131:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
3616
iexplore.exe
GET
200
52.222.149.213:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
3616
iexplore.exe
GET
200
52.222.149.213:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
3616
iexplore.exe
GET
200
192.124.249.41:80
http://crl.godaddy.com/gdroot.crl
US
der
429 b
whitelisted
3616
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEQC5UUQDFilM79r2jgo50n2A
US
der
472 b
whitelisted
3616
iexplore.exe
GET
200
52.222.149.182:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
3616
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
US
der
727 b
whitelisted
3616
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.godaddy.com//MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQdI2%2BOBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc%3D
US
der
1.69 Kb
whitelisted
3616
iexplore.exe
GET
200
52.222.149.213:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
1720
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1720
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3616
iexplore.exe
192.124.249.41:80
ocsp.godaddy.com
Sucuri
US
suspicious
3616
iexplore.exe
3.235.82.211:443
us04web.zoom.us
US
unknown
3616
iexplore.exe
52.222.158.54:443
us04st1.zoom.us
Amazon.com, Inc.
US
malicious
3616
iexplore.exe
104.18.72.113:443
static.zdassets.com
Cloudflare Inc
US
shared
3616
iexplore.exe
52.222.158.107:443
us04st1.zoom.us
Amazon.com, Inc.
US
whitelisted
3616
iexplore.exe
52.222.158.77:443
us04st1.zoom.us
Amazon.com, Inc.
US
whitelisted
3616
iexplore.exe
151.139.128.14:80
ocsp.usertrust.com
Highwinds Network Group, Inc.
US
suspicious
3616
iexplore.exe
172.217.23.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3616
iexplore.exe
216.58.210.14:443
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
us04web.zoom.us
  • 3.235.82.211
whitelisted
ocsp.godaddy.com
  • 192.124.249.41
  • 192.124.249.23
  • 192.124.249.36
  • 192.124.249.22
  • 192.124.249.24
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
crl.godaddy.com
  • 192.124.249.41
  • 192.124.249.31
  • 192.124.249.36
whitelisted
us04st1.zoom.us
  • 52.222.158.54
  • 52.222.158.77
  • 52.222.158.174
  • 52.222.158.107
whitelisted
us04st2.zoom.us
  • 52.222.158.54
  • 52.222.158.174
  • 52.222.158.107
  • 52.222.158.77
whitelisted
us04st3.zoom.us
  • 52.222.158.77
  • 52.222.158.174
  • 52.222.158.54
  • 52.222.158.107
whitelisted
static.ada.support
  • 52.222.158.107
  • 52.222.158.118
  • 52.222.158.204
  • 52.222.158.126
whitelisted
static.zdassets.com
  • 104.18.72.113
  • 104.18.74.113
  • 104.18.73.113
  • 104.18.70.113
  • 104.18.71.113
whitelisted

Threats

No threats detected
Process
Message
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\zoom_install_src
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\zoom_install_src
Installer.exe
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is:
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\uninstall
Installer.exe
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is:
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\bin
Installer.exe
Installer.exe
[CZoomProductPathHelper::RecursiveRemoveDirA] Path is: