analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ZoomInstaller.exe

Full analysis: https://app.any.run/tasks/dacacacd-c8f4-4fc6-aba7-eb1cd4d27911
Verdict: Malicious activity
Analysis date: January 17, 2020, 16:13:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

68E3AC1B4C91B50F1EF48543613233AC

SHA1:

BE603B49027083AA567D1C07FABE0A063525410A

SHA256:

41688258076D37322F77A149AD1B9F051FE3C47CE0E17045CE144920A7A897E8

SSDEEP:

196608:BcC+OpLwbGyodbqEdM4/HZ/jHr3aIiviME/izbQWiJ+4W4tR59DrdgkTOf:BcHO2GyopH5b2IRv/KEWT94tb9RgkTOf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Installer.exe (PID: 2828)
      • Installer.exe (PID: 2144)
      • Zoom.exe (PID: 2816)
      • Zoom.exe (PID: 2264)
    • Loads dropped or rewritten executable

      • Zoom.exe (PID: 2264)
      • Installer.exe (PID: 2828)
      • Zoom.exe (PID: 2816)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • ZoomInstaller.exe (PID: 3960)
      • Installer.exe (PID: 2828)
    • Application launched itself

      • Installer.exe (PID: 2828)
      • Zoom.exe (PID: 2264)
    • Changes IE settings (feature browser emulation)

      • Installer.exe (PID: 2828)
    • Modifies the open verb of a shell class

      • Installer.exe (PID: 2828)
    • Creates a software uninstall entry

      • Installer.exe (PID: 2828)
    • Creates files in the user directory

      • Zoom.exe (PID: 2264)
      • Zoom.exe (PID: 2816)
      • Installer.exe (PID: 2828)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • Installer.exe (PID: 2828)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:05:07 09:59:30+02:00
PEType: PE32
LinkerVersion: 9
CodeSize: 94720
InitializedDataSize: 65024
UninitializedDataSize: -
EntryPoint: 0x16526
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 4.4.0.0
ProductVersionNumber: 4.4.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: Zoom Meetings Installer
CompanyName: Zoom Video Communications, Inc.
FileDescription: Zoom Meetings Installer
FileVersion: 4,4,0,0
InternalName: Zoom Meetings Installer
LegalCopyright: © Zoom Video Communications, Inc. All rights reserved.
LegalTrademarks: Zoom Meetings Installer
OriginalFileName: Zoom Meetings Installer
ProductName: Zoom Meetings Installer
ProductVersion: 4,4,0,0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 07-May-2019 07:59:30
Detected languages:
  • English - United States
Comments: Zoom Meetings Installer
CompanyName: Zoom Video Communications, Inc.
FileDescription: Zoom Meetings Installer
FileVersion: 4,4,0,0
InternalName: Zoom Meetings Installer
LegalCopyright: © Zoom Video Communications, Inc. All rights reserved.
LegalTrademarks: Zoom Meetings Installer
OriginalFilename: Zoom Meetings Installer
ProductName: Zoom Meetings Installer
ProductVersion: 4,4,0,0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 07-May-2019 07:59:30
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0001714B
0x00017200
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.61764
.rdata
0x00019000
0x00005AAA
0x00005C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.33209
.data
0x0001F000
0x000030A4
0x00000C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.48997
.rsrc
0x00023000
0x00009518
0x00009600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.83519

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.28531
1470
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.64547
2440
Latin 1 / Western European
English - United States
RT_ICON
3
4.615
4264
Latin 1 / Western European
English - United States
RT_ICON
4
4.56645
9640
Latin 1 / Western European
English - United States
RT_ICON
5
4.37223
16936
Latin 1 / Western European
English - United States
RT_ICON
97
3.04857
184
Latin 1 / Western European
English - United States
RT_DIALOG
101
2.79808
76
Latin 1 / Western European
English - United States
RT_GROUP_ICON
188
2.17822
84
Latin 1 / Western European
English - United States
RT_STRING
207
1.43775
52
Latin 1 / Western European
English - United States
RT_STRING

Imports

KERNEL32.dll
MSVCR90.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
5
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start zoominstaller.exe installer.exe installer.exe zoom.exe zoom.exe

Process information

PID
CMD
Path
Indicators
Parent process
3960"C:\Users\admin\Desktop\ZoomInstaller.exe" C:\Users\admin\Desktop\ZoomInstaller.exe
explorer.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Meetings Installer
Exit code:
0
Version:
4,4,0,0
2828.\Installer.exeC:\Users\admin\AppData\Local\Temp\7zS87FD81B9\Installer.exe
ZoomInstaller.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Meetings Installer
Exit code:
0
Version:
4,6,14747,1216
2144"C:\Users\admin\AppData\Local\Temp\7zS87FD81B9\Installer.exe" /addfwexception --bin_home="C:\Users\admin\AppData\Roaming\Zoom\bin"C:\Users\admin\AppData\Local\Temp\7zS87FD81B9\Installer.exe
Installer.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
HIGH
Description:
Zoom Meetings Installer
Exit code:
0
Version:
4,6,14747,1216
2264"C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe" C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exeC:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe
Installer.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Meetings
Version:
4,6,14747,1216
2816C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe --action=preload --runaszvideo=TRUE C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe
Zoom.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Meetings
Version:
4,6,14747,1216
Total events
899
Read events
824
Write events
0
Delete events
0

Modification events

No data
Executable files
86
Suspicious files
27
Text files
14
Unknown types
6

Dropped files

PID
Process
Filename
Type
3960ZoomInstaller.exeC:\Users\admin\AppData\Local\Temp\7zS87FD81B9\Zoom.msi
MD5:
SHA256:
2828Installer.exeC:\Users\admin\AppData\Roaming\Zoom\zoom_install_src\crashrpt_lang.initext
MD5:3BE1F13A7A5C5490D4669F3051CC5572
SHA256:9F124594495B209908D79CECADD63EE55D2282D763212C0FCD0930A5F858CA8C
2828Installer.exeC:\Users\admin\AppData\Roaming\Zoom\zoom_install_src\ZoomInstall.xmlxml
MD5:AB594EA42197C8AB9F6529179BE76DC1
SHA256:486B9A60F3AB253045AB6B0174E0E76B82097C51EF6472BF77ABB1AE820211A4
2828Installer.exeC:\Users\admin\AppData\Roaming\Zoom\zoom_install_src\leave.pcmbinary
MD5:A514D84D4D3F013FEA537579E29F0B64
SHA256:193EDFF4D2D499751CB6180697EAE74A57170BECCFDEFEB1DDE89DAF2DFCB0F0
2828Installer.exeC:\Users\admin\AppData\Roaming\Zoom\zoom_install_src\duilib_license.txttext
MD5:7FAEC2006BB231D14B794A9F31769448
SHA256:7ED2ACCA31A243BA107D8C12FDDECD52462FD326D3D2C73B04D4CF10C76765FF
3960ZoomInstaller.exeC:\Users\admin\AppData\Local\Temp\7zS87FD81B9\Installer.exeexecutable
MD5:E4369C1AA1153649A2A36852A7DDACCB
SHA256:FF45EBC89A47524D767A85B9DD1D7D515E05F167D1BA5F0DFAECEE7CB0054B37
2828Installer.exeC:\Users\admin\AppData\Roaming\Zoom\zoom_install_src\aomagent.dllexecutable
MD5:6B58D5840973DA44BB4CEEA786FA3428
SHA256:EDAF2036D56008258A588F1E10ACDD3CD0DC498F138B7EECAA421E7AB79E2AEE
2828Installer.exeC:\Users\admin\AppData\Roaming\Zoom\zoom_install_src\ring.pcmbinary
MD5:5D7DAED4B6DFCD8EEA1B035CB39CBDDA
SHA256:9A1E3A951410CF6248058368A67173FC1A7833E117A576713D6F21A501296709
2828Installer.exeC:\Users\admin\AppData\Roaming\Zoom\zoom_install_src\dingdong.pcmbinary
MD5:10EB823CC0568855A2A18CE0D3CAE0FD
SHA256:5E3D90F49C47036B8D86BAE3AC4191E37960357CFA7223B084957FAC142A0124
2828Installer.exeC:\Users\admin\AppData\Roaming\Zoom\zoom_install_src\annoter.dllexecutable
MD5:E7DED27C5D622CA3E3E8F4C2C46C453F
SHA256:CD211BA6EC5036DCA3B8EA4D6585FEC390E3D9EAEA74A952B691BE848385B337
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
5
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2828
Installer.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAPxtOFfOoLxFJZ4s9fYR1w%3D
US
der
471 b
whitelisted
2828
Installer.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSPwl%2BrBFlJbvzLXU1bGW08VysJ2wQUj%2Bh%2B8G0yagAFI8dwl2o6kP9r6tQCEAUQxrL%2FercceG71ciObEkM%3D
US
der
471 b
whitelisted
2828
Installer.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEAb9%2BQOWA63qAArrPye7uhs%3D
US
der
471 b
whitelisted
2828
Installer.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSFDxAmS5JEAmWxO0Ue9OdQ9z7zPAQUFQASKxOYspkH7R7for5XDStnAs0CEAMBmgI6%2F1ixa9bV6uYX8GY%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
50.239.203.19:3479
Comcast Cable Communications, LLC
US
unknown
2828
Installer.exe
72.21.91.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2264
Zoom.exe
52.202.62.235:443
zoom.us
Amazon.com, Inc.
US
suspicious
50.239.203.19:3478
Comcast Cable Communications, LLC
US
unknown

DNS requests

Domain
IP
Reputation
ocsp.digicert.com
  • 72.21.91.29
whitelisted
zoom.us
  • 52.202.62.235
whitelisted

Threats

No threats detected
Process
Message
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is:
Installer.exe
Installer.exe
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is:
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\uninstall
Installer.exe
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is:
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\bin
Installer.exe
Installer.exe
[CZoomProductPathHelper::RecursiveRemoveDirA] Path is: