Analysis

  • max time kernel
    1695s
  • max time network
    1511s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    11-03-2024 15:08

General

  • Target

    ZC-AIO/modules/checkers/__pycache__/bonk_io.cpython-312.pyc

  • Size

    3KB

  • MD5

    83180c2d14797481b5c1f5b591f14013

  • SHA1

    66dc41f6ff728d5ba3ce2f59c6b103e1818c0a32

  • SHA256

    70be6555be5dc07a106c9262fbb09f7d907436362e2106d21cd6bcd851f15c94

  • SHA512

    43d32be98dbc5d0c81780766d83243bb2f729fa2e0107035739eedc4e8ce8d2e9c68088a1f25334304fdba1700f60b9282f53831793a1f1bea15661129f556be

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ZC-AIO\modules\checkers\__pycache__\bonk_io.cpython-312.pyc
    1⤵
    • Modifies registry class
    PID:1092
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:320
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:1036
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      c86e46c51924aefe52b6927c060dbb3a

      SHA1

      ef3280e6ebe8922ba9f32003ef6bef41ea7a6904

      SHA256

      1140c094be63cec0d2e290e376b1cdc8164094fcf1431ff89c2d57ab9b75ab71

      SHA512

      a4ce2da8c380a1ba4e6b09dc78a067b735260f3f2b8e11bec3a5df8fdb31dabe29915c2891244edfcb0e279545fa0ab812ce9317403b84d2128f5eae1c8e903b

    • memory/4780-49-0x0000024D72A50000-0x0000024D72A51000-memory.dmp

      Filesize

      4KB

    • memory/4780-38-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-33-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-52-0x0000024D72990000-0x0000024D72991000-memory.dmp

      Filesize

      4KB

    • memory/4780-35-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-36-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-37-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-16-0x0000024D6A840000-0x0000024D6A850000-memory.dmp

      Filesize

      64KB

    • memory/4780-39-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-40-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-41-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-42-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-43-0x0000024D72A60000-0x0000024D72A61000-memory.dmp

      Filesize

      4KB

    • memory/4780-64-0x0000024D72B90000-0x0000024D72B91000-memory.dmp

      Filesize

      4KB

    • memory/4780-46-0x0000024D72A60000-0x0000024D72A61000-memory.dmp

      Filesize

      4KB

    • memory/4780-0-0x0000024D6A740000-0x0000024D6A750000-memory.dmp

      Filesize

      64KB

    • memory/4780-34-0x0000024D72E40000-0x0000024D72E41000-memory.dmp

      Filesize

      4KB

    • memory/4780-32-0x0000024D72E10000-0x0000024D72E11000-memory.dmp

      Filesize

      4KB

    • memory/4780-44-0x0000024D72A50000-0x0000024D72A51000-memory.dmp

      Filesize

      4KB

    • memory/4780-66-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-68-0x0000024D72CB0000-0x0000024D72CB1000-memory.dmp

      Filesize

      4KB

    • memory/4780-67-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-69-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-70-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-71-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-72-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-73-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-74-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-75-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-76-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-77-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-78-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB

    • memory/4780-79-0x0000024D72BA0000-0x0000024D72BA1000-memory.dmp

      Filesize

      4KB