analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://meetmarigold.zoom.us/j/91402417282

Full analysis: https://app.any.run/tasks/6bba3c59-a15b-4e9b-836f-f686c7408444
Verdict: Malicious activity
Analysis date: March 31, 2023, 20:37:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MD5:

D6EEC338FEFE3774C086E39A2CD3F0E0

SHA1:

65249406F0790F3BADFD7D8E8E18EE086A151381

SHA256:

DDCD8859A051354B48B3729A3F535F8E82CCF3F01EE4C95C89FB62E52592993F

SSDEEP:

3:N8YYp3NiLXdX:2YgijdX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe (PID: 2768)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe (PID: 2768)
  • INFO

    • Reads the machine GUID from the registry

      • Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe (PID: 2768)
    • The process checks LSA protection

      • Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe (PID: 2768)
    • Checks proxy server information

      • Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe (PID: 2768)
    • Reads the computer name

      • Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe (PID: 2768)
    • Checks supported languages

      • Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe (PID: 2768)
    • The process uses the downloaded file

      • iexplore.exe (PID: 1732)
    • Creates files or folders in the user directory

      • Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe (PID: 2768)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 1732)
      • iexplore.exe (PID: 1752)
    • Create files in a temporary directory

      • iexplore.exe (PID: 1732)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
30
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe zoom_cm_frkkwrsu5xv8bz9vvrzo4_mdvtsmmycn+wugirxxugqolgjpp+niywx9mpw@duhknhdtl6gaxfuj_kd46be2e3a15876bd_.exe

Process information

PID
CMD
Path
Indicators
Parent process
1732"C:\Program Files\Internet Explorer\iexplore.exe" "https://meetmarigold.zoom.us/j/91402417282"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
1752"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:267521 /prefetch:2C:\Program Files (x86)\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files (x86)\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
2768"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2U1WPAC\Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2U1WPAC\Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe
iexplore.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Opener
Version:
5,10,3,4851
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\d2u1wpac\zoom_cm_frkkwrsu5xv8bz9vvrzo4_mdvtsmmycn+wugirxxugqolgjpp+niywx9mpw@duhknhdtl6gaxfuj_kd46be2e3a15876bd_.exe
c:\windows\system32\wow64.dll
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
9 668
Read events
9 450
Write events
218
Delete events
0

Modification events

(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
3
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
659226608
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30902802
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
959230748
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30902802
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1732) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000008B000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
6
Suspicious files
8
Text files
58
Unknown types
0

Dropped files

PID
Process
Filename
Type
1752iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\ADNKYPOE.txttext
MD5:332015FB7E8BFA2F85FF554229EE98EA
SHA256:DC6119C556DCB164E3EE06FC3741C4D1C02E90F6A5D402D94B3DCA6596D09CE4
1752iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UJFUX3OG\91402417282[1].htmhtml
MD5:461B52DAE874C0E8FA49F6B3EDDA08EF
SHA256:F98BA57011999261327168B43F0BD926DFDF8E7C768071A2ADF9A5D8316D67DE
1752iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\A80DPWVW.txttext
MD5:75FA83A55A0F39B9DD39E63EFF8AB277
SHA256:8DACBE62E34AF03E5D5945B9944BAC78B1B4C3272E26F4C0087955EBAB5D330C
1752iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\7GF3MDB8.txttext
MD5:0DF54E8C878DE333EF79168FE2F2CCBA
SHA256:98D94C0323EFAE61C160AFFC18A82D087CFB77F9290FEFEA03247E4EC05846EF
1752iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\SLRNP3YJ.txttext
MD5:3E2F1AD7FCCD7F2FB90A94E6A0AE7ED1
SHA256:1012AECE3FE699662C2456B939427AEF2885025B02615750E3FBBD4026541DC2
1752iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\38B5GPAW.txttext
MD5:B278935528473C6BA8241643BC5A3627
SHA256:5AF43D8F1D346B3A6CB6963F5664C372332494D1645DA0A33AE99B415F39F6CF
1752iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\5Z1826EE.txttext
MD5:545EA85CB77C2F5445F9EAF814FCFC24
SHA256:4B6430080535B4D2C3F8F613088225831608F19520F4CECA067FF16461207705
1752iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XLWA6BPE\meeting.63c5f21c827d535767da[1].jstext
MD5:E37C4B788EE938CC63A3E61A3FB0F2B4
SHA256:75365276F06FE70EC3750D91D986BBE0699560844F1A106C3C8EC5B5568D2436
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\favicon[2].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
32
DNS requests
17
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1752
iexplore.exe
170.114.52.2:443
meetmarigold.zoom.us
US
suspicious
1752
iexplore.exe
18.66.130.242:443
st3.zoom.us
AMAZON-02
US
unknown
18.66.147.60:443
static.ada.support
AMAZON-02
US
suspicious
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
18.66.130.242:443
st3.zoom.us
AMAZON-02
US
unknown
34.98.108.207:443
cdn.solvvy.com
GOOGLE
US
unknown
2768
Zoom_cm_frkkwrsu5xv8bZ9vvrZo4_mDvtsMMyCn+wuGIRxXuGQOlgJpp+niYWx9mPW@DuhKnhdTL6GaXfuj_kd46be2e3a15876bd_.exe
170.114.52.2:443
meetmarigold.zoom.us
US
suspicious
54.227.249.145:443
log-gateway.zoom.us
AMAZON-AES
US
unknown
1732
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1752
iexplore.exe
18.66.147.95:443
static.ada.support
AMAZON-02
US
suspicious

DNS requests

Domain
IP
Reputation
meetmarigold.zoom.us
  • 170.114.52.2
suspicious
static.ada.support
  • 18.66.147.60
  • 18.66.147.95
  • 18.66.147.121
  • 18.66.147.113
whitelisted
cdn.solvvy.com
  • 34.98.108.207
shared
st3.zoom.us
  • 18.66.130.242
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
st1.zoom.us
  • 18.66.130.242
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
log-gateway.zoom.us
  • 54.227.249.145
  • 54.235.192.240
unknown
cdn.cookielaw.org
  • 104.19.187.97
  • 104.19.188.97
whitelisted

Threats

PID
Process
Class
Message
1752
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1752
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1752
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1752
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1752
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1752
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1752
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1752
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1732
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
1732
iexplore.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
No debug info