| URL: | http://zoomtext2020.vfo.digital/2020.2008.19.400/1CDB6BAA-03D8-4CCB-B00C-DA79ACBC6231/ZT2020.2008.19.400.exe |
| Full analysis: | https://app.any.run/tasks/52678c2c-56a2-40d2-a071-f066b55ae61c |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | September 01, 2020, 10:31:24 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | C9278589F639FE040A3E273C818E9019 |
| SHA1: | 5A3EBAD872E9DB6FF9C47F32C4F6B8AD1B9C6360 |
| SHA256: | 6DFBB03CEE8B3448DF3FBCDB77D3801FAAB77497DA22D7EE6B68D763613FD27E |
| SSDEEP: | 3:N1KEuRATtFD3EsVjVJtPWrtI8LIAmnvvZJtkA:CEuRctrYlIDnHZkA |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 180 | "C:\Users\admin\AppData\Local\Temp\{F60A61ED-AA56-414D-BDBF-A886FF3BB70D}\.be\ZoomTextSetupPackage.exe" -q -burn.elevated BurnPipe.{63F067B6-D224-4A32-B146-E7728DF2073E} {43AFECAF-880E-43EA-B798-CB3728E8645B} 3272 | C:\Users\admin\AppData\Local\Temp\{F60A61ED-AA56-414D-BDBF-A886FF3BB70D}\.be\ZoomTextSetupPackage.exe | ZT2020.2008.19.400.exe | ||||||||||||
User: admin Company: Freedom Scientific Integrity Level: HIGH Description: Freedom Scientific ZoomText 2020 Exit code: 0 Version: 14.9.7.0 Modules
| |||||||||||||||
| 316 | C:\Windows\system32\MsiExec.exe -Embedding CD591B9B6F3015028F593CE57DB7DB0D M Global\MSI0000 | C:\Windows\system32\MsiExec.exe | — | msiexec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 556 | "C:\ProgramData\Package Cache\DF7F0A73BFA077E483E51BFB97F5E2ECEEDFB6A3\vcredist_x86.exe" /q /norestart | C:\ProgramData\Package Cache\DF7F0A73BFA077E483E51BFB97F5E2ECEEDFB6A3\vcredist_x86.exe | ZoomTextSetupPackage.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 Exit code: 0 Version: 12.0.30501.0 Modules
| |||||||||||||||
| 776 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x717fa9d0,0x717fa9e0,0x717fa9ec | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 860 | rundll32.exe "C:\Windows\Installer\MSIA016.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_1875921 165 EvernixCustomActions!EvernixCustomActions.CustomActions.RegisterCOM | C:\Windows\system32\rundll32.exe | MsiExec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 956 | DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{1ed7b7cd-90e2-69eb-a586-f556e3110974}\sntnlusb.inf" "0" "6dd04a27f" "00000274" "WinSta0\Default" "0000058C" "208" "C:\Program Files\Common Files\SafeNet Sentinel\Sentinel System Driver" | C:\Windows\system32\DrvInst.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1012 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=960,17846854760000487691,17415750168138690022,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=16391995784805606667 --mojo-platform-channel-handle=3556 /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1248 | "C:\Windows\System32\regsvr32.exe" /s AutomationManager.dll | C:\Windows\System32\regsvr32.exe | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1256 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=960,17846854760000487691,17415750168138690022,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=16178833647773763552 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1264 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=960,17846854760000487691,17415750168138690022,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=2923470292620478024 --mojo-platform-channel-handle=500 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| (PID) Process: | (3220) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 3172-13243429898630375 |
Value: 259 | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 2832-13239195546717773 |
Value: 0 | |||
| (PID) Process: | (3172) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\455f9b28-a44d-4374-a77c-5646bf50aaf4.tmp | — | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp | — | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old | — | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old | text | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF1931a5.TMP | text | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old~RF19328f.TMP | text | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RF1933c8.TMP | — | |
MD5:— | SHA256:— | |||
| 3172 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old~RF1932ce.TMP | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3272 | ZT2020.2008.19.400.exe | HEAD | 200 | 2.16.186.58:80 | http://components.vfo.digital/vcredist2013_x86/{464E1B3D-11E1-43CA-8D35-4DC136D80792}/vcredist2013_x86.exe | unknown | — | — | whitelisted |
3272 | ZT2020.2008.19.400.exe | HEAD | 200 | 2.16.186.82:80 | http://zoomtext2020.vfo.digital/2020.2008.19.400/1CDB6BAA-03D8-4CCB-B00C-DA79ACBC6231/enu/x86/fsElevation.msi | unknown | — | — | suspicious |
180 | ZoomTextSetupPackage.exe | GET | 200 | 2.16.186.74:80 | http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl | unknown | der | 781 b | whitelisted |
180 | ZoomTextSetupPackage.exe | GET | 200 | 23.37.43.27:80 | http://sv.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQe6LNDJdqx%2BJOp7hVgTeaGFJ%2FCQgQUljtT8Hkzl699g%2B8uK8zKt4YecmYCEBdSvVOf1M8T%2BYFeDw2YHzk%3D | NL | der | 1.57 Kb | shared |
180 | ZoomTextSetupPackage.exe | GET | 200 | 23.37.43.27:80 | http://ts-ocsp.ws.symantec.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRi82PVYYKWGJWdgVNyePy5kYTdqQQUX5r1blzMzHSa1N197z%2Fb7EyALt0CEA7P9DjI%2Fr81bgTYapgbGlA%3D | NL | der | 1.43 Kb | whitelisted |
3272 | ZT2020.2008.19.400.exe | HEAD | 200 | 2.16.186.82:80 | http://zoomtext2020.vfo.digital/2020.2008.19.400/1CDB6BAA-03D8-4CCB-B00C-DA79ACBC6231/enu/x86/KeyboardManager.msi | unknown | executable | 9.02 Mb | suspicious |
180 | ZoomTextSetupPackage.exe | GET | 200 | 23.37.43.27:80 | http://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQJ1TBLBrQ9OnPHXPVaWb87MxkNlgQUwu79F9f%2Btw%2FGciJ7fvbA4gIz7D4CEH6T6%2Ft8xk5Z6kuad9QG%2FDs%3D | NL | der | 1.30 Kb | whitelisted |
3272 | ZT2020.2008.19.400.exe | GET | 200 | 2.16.186.82:80 | http://zoomtext2020.vfo.digital/2020.2008.19.400/1CDB6BAA-03D8-4CCB-B00C-DA79ACBC6231/enu/x86/fsElevation.msi | unknown | executable | 116 Kb | suspicious |
180 | ZoomTextSetupPackage.exe | GET | 200 | 23.37.43.27:80 | http://s2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCED141%2Fl2SWCyYX308B7Khio%3D | NL | der | 1.71 Kb | whitelisted |
3272 | ZT2020.2008.19.400.exe | GET | 200 | 2.16.186.82:80 | http://zoomtext2020.vfo.digital/2020.2008.19.400/1CDB6BAA-03D8-4CCB-B00C-DA79ACBC6231/enu/x86/Authorization.msi | unknown | executable | 9.02 Mb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2924 | chrome.exe | 216.58.205.228:443 | www.google.com | Google Inc. | US | whitelisted |
2924 | chrome.exe | 216.58.205.227:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
2924 | chrome.exe | 216.58.212.131:443 | www.gstatic.com | Google Inc. | US | whitelisted |
2924 | chrome.exe | 216.58.212.173:443 | accounts.google.com | Google Inc. | US | whitelisted |
2924 | chrome.exe | 172.217.23.99:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
180 | ZoomTextSetupPackage.exe | 2.16.186.74:80 | crl.microsoft.com | Akamai International B.V. | — | whitelisted |
2924 | chrome.exe | 2.16.186.82:80 | zoomtext2020.vfo.digital | Akamai International B.V. | — | whitelisted |
180 | ZoomTextSetupPackage.exe | 93.184.220.29:80 | crl.verisign.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
3936 | MDDInstaller32.exe | 93.184.220.29:80 | crl.verisign.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
3936 | MDDInstaller32.exe | 23.37.43.27:80 | s2.symcb.com | Akamai Technologies, Inc. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
clientservices.googleapis.com |
| whitelisted |
zoomtext2020.vfo.digital |
| suspicious |
accounts.google.com |
| shared |
www.google.com |
| malicious |
ssl.gstatic.com |
| whitelisted |
sb-ssl.google.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
components.vfo.digital |
| whitelisted |
crl.microsoft.com |
| whitelisted |
s2.symcb.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2924 | chrome.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3272 | ZT2020.2008.19.400.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3272 | ZT2020.2008.19.400.exe | Misc activity | ET INFO Packed Executable Download |
2924 | chrome.exe | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
Process | Message |
|---|---|
MsiExec.exe | AddInboundFirewallRule: Entered.
|
MsiExec.exe | AddInboundFirewallRule: Entered AddInboundFirewallRule helper.
|
MsiExec.exe | AddInboundFirewallRule: AppFriendlyName: Client Activator.
|
MsiExec.exe | AddInboundFirewallRule: ExeFullPath: C:\Program Files\Freedom Scientific\Shared\Authorization Tools\6.0\fsClientActivator.exe.
|
MsiExec.exe | AddInboundFirewallRule: CoInitializeEx succeeded.
|
MsiExec.exe | AddInboundFirewallRule: WindowsFirewallInitialize succeeded
|
MsiExec.exe | AddInboundFirewallRule: Authorized application C:\Program Files\Freedom Scientific\Shared\Authorization Tools\6.0\fsClientActivator.exe is disabled in the firewall.
|
MsiExec.exe | AddInboundFirewallRule: Authorized application C:\Program Files\Freedom Scientific\Shared\Authorization Tools\6.0\fsClientActivator.exe is now enabled in the firewall.
|
MsiExec.exe | AddInboundFirewallRule: WindowsFirewallAddApp succeeded
|
MsiExec.exe | AddInboundFirewallRule: WindowsFirewallCleanup returned.
|