Analysis

  • max time kernel
    1552s
  • max time network
    1559s
  • platform
    windows7_x64
  • resource
    win7-20240221-de
  • resource tags

    arch:x64arch:x86image:win7-20240221-delocale:de-deos:windows7-x64systemwindows
  • submitted
    11-03-2024 15:08

General

  • Target

    ZC-AIO/modules/__pycache__/functions.cpython-312.pyc

  • Size

    28KB

  • MD5

    9aa1d15d2cee1acaf9aaec8076754982

  • SHA1

    f012ca8598620ffcb94c6ccadef8177d135e3014

  • SHA256

    d2b973d697ed7c295dba22bc2db9728224321934afde74aaadcd0578763a2858

  • SHA512

    5bc1f08b13af5a2eba2194d993c6d2c6a41dcd996577cd4e67b30968e4e6bf2537f3b41beb6f42f0cf4c5bbb79c25d20d4cedb86ce4b5caa1c6ea5cc6805dcb3

  • SSDEEP

    384:M6dCCZHDHy1S2FqWdrhJrBipPW3lYI6HgMpL7fjXTwL8tmVRVAyIz:7zH7y1S2Xp3BiQVYI6HgMZbTwgti1Iz

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ZC-AIO\modules\__pycache__\functions.cpython-312.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZC-AIO\modules\__pycache__\functions.cpython-312.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ZC-AIO\modules\__pycache__\functions.cpython-312.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    20494133d21c51a54b68f1c5dd918dc1

    SHA1

    e0f50bb6c5783230e115824cd5540e86539b7cbf

    SHA256

    753e50ae1d8ae7c166dc8060a72ca0b1c82d583d63e750e4e410ac728fb88bd2

    SHA512

    b9fce0c9dde8210b1234995b5a5bf2f3cb6e5150c5570ec73c31cf3c6297e3d452e7d42fa8a3b055e0b785fbaca3e1217a877b23019983604f32aebf7131b966