Analysis

  • max time kernel
    1564s
  • max time network
    1565s
  • platform
    windows7_x64
  • resource
    win7-20240220-de
  • resource tags

    arch:x64arch:x86image:win7-20240220-delocale:de-deos:windows7-x64systemwindows
  • submitted
    11-03-2024 15:08

General

  • Target

    ZC-AIO/modules/__pycache__/config.cpython-312.pyc

  • Size

    6KB

  • MD5

    04c3b054ba72c8a5b1dcb7f208f7bea0

  • SHA1

    c94b10d2fab7cd41edca4688bfcfc14aae5f184d

  • SHA256

    458154e623dd2a234ec190a790ecd36c4d23ae69e09b7e33fd9501f1b626a2c2

  • SHA512

    0ca97c95d325d1e59655aa90ebbbbce02de56f4cb52be40432e46edf309d84a9b904e3c18ec38d95d07c4d88e1468c66db3f4b43f0ed78eb95eb9a6eb06dc089

  • SSDEEP

    192:ghIa21Efgvf1NKQao4tHq+sbjcbREQvqyWMTd:pamagYhHq9j2h

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ZC-AIO\modules\__pycache__\config.cpython-312.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZC-AIO\modules\__pycache__\config.cpython-312.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ZC-AIO\modules\__pycache__\config.cpython-312.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    375b44e9832b7e342398721c83beb3a5

    SHA1

    57629799161fc523a9ebb5cb421874d3baabaa27

    SHA256

    4ad294f8c1f051802e306fb31422716c463079cb2f05db9a85a91c0880ba59a5

    SHA512

    135cdb3d91b71f2c4c77261d4612d6d1d16574fcf95ca0a40d4d91fc9b748172eba67027b3e08c1714e20a15e86cb65c77f89f58430d444bf0eb6d263abfe56a