Overview
overview
3Static
static
1Zero-attac...ain.py
windows7-x64
3Zero-attac...ain.py
windows10-2004-x64
3Zero-attac...dos.py
windows7-x64
3Zero-attac...dos.py
windows10-2004-x64
3Zero-attac...ber.py
windows7-x64
3Zero-attac...ber.py
windows10-2004-x64
3Zero-attac...ber.py
windows7-x64
3Zero-attac...ber.py
windows10-2004-x64
3Zero-attac...kup.py
windows7-x64
3Zero-attac...kup.py
windows10-2004-x64
3Zero-attac...dex.js
windows7-x64
1Zero-attac...dex.js
windows10-2004-x64
1Zero-attac...ain.py
windows7-x64
3Zero-attac...ain.py
windows10-2004-x64
3Zero-attac...tor.py
windows7-x64
3Zero-attac...tor.py
windows10-2004-x64
3Zero-attac...ner.py
windows7-x64
3Zero-attac...ner.py
windows10-2004-x64
3Zero-attac...ain.py
windows7-x64
3Zero-attac...ain.py
windows10-2004-x64
3Zero-attac...ool.py
windows7-x64
3Zero-attac...ool.py
windows10-2004-x64
3Zero-attac...nfo.py
windows7-x64
3Zero-attac...nfo.py
windows10-2004-x64
3Zero-attac...ll.bat
windows7-x64
1Zero-attac...ll.bat
windows10-2004-x64
1Zero-attac...rt.bat
windows7-x64
1Zero-attac...rt.bat
windows10-2004-x64
1Zero-attac...ool.py
windows7-x64
3Zero-attac...ool.py
windows10-2004-x64
3Zero-attac...ero.py
windows7-x64
3Zero-attac...ero.py
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
Zero-attacker-Zero-attacker/Zero-Tool/Subdirectory-scanner/main.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Zero-attacker-Zero-attacker/Zero-Tool/Subdirectory-scanner/main.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Zero-attacker-Zero-attacker/Zero-Tool/ddos.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Zero-attacker-Zero-attacker/Zero-Tool/ddos.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Zero-attacker-Zero-attacker/Zero-Tool/discord-token-grabber.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Zero-attacker-Zero-attacker/Zero-Tool/discord-token-grabber.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Zero-attacker-Zero-attacker/Zero-Tool/email-bomber.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Zero-attacker-Zero-attacker/Zero-Tool/email-bomber.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Zero-attacker-Zero-attacker/Zero-Tool/ip-lookup.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Zero-attacker-Zero-attacker/Zero-Tool/ip-lookup.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Zero-attacker-Zero-attacker/Zero-Tool/nuke-bot/index.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Zero-attacker-Zero-attacker/Zero-Tool/nuke-bot/index.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Zero-attacker-Zero-attacker/Zero-Tool/nuke-bot/main.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Zero-attacker-Zero-attacker/Zero-Tool/nuke-bot/main.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Zero-attacker-Zero-attacker/Zero-Tool/phone-locator.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Zero-attacker-Zero-attacker/Zero-Tool/phone-locator.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Zero-attacker-Zero-attacker/Zero-Tool/port-scanner.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Zero-attacker-Zero-attacker/Zero-Tool/port-scanner.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Zero-attacker-Zero-attacker/Zero-Tool/subdomain/main.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Zero-attacker-Zero-attacker/Zero-Tool/subdomain/main.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Zero-attacker-Zero-attacker/Zero-Tool/zero-tool.py
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Zero-attacker-Zero-attacker/Zero-Tool/zero-tool.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Zero-attacker-Zero-attacker/info.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Zero-attacker-Zero-attacker/info.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Zero-attacker-Zero-attacker/install.bat
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Zero-attacker-Zero-attacker/install.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Zero-attacker-Zero-attacker/start.bat
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
Zero-attacker-Zero-attacker/start.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Zero-attacker-Zero-attacker/zero-tool.py
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Zero-attacker-Zero-attacker/zero-tool.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Zero-attacker-Zero-attacker/zero.py
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Zero-attacker-Zero-attacker/zero.py
Resource
win10v2004-20240226-en
General
-
Target
Zero-attacker-Zero-attacker/zero.py
-
Size
2KB
-
MD5
29156f1420c9b5facda6e5b08d605399
-
SHA1
91b7600c7493c9e3e9dbdc26185d8ccfd0a817d2
-
SHA256
20c5b067169dfc85d6b007af0f4db406908062c80e145ab889048ca65b37271e
-
SHA512
0bd18ec5188bef93239963a922a5562b87045a8ccc296d2ce637a1d73dc1995de5687f50abc8b9875390346b601ea150792550dd84b57495a128022228fbd5dc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2360 AcroRd32.exe 2360 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2564 2912 cmd.exe 29 PID 2912 wrote to memory of 2564 2912 cmd.exe 29 PID 2912 wrote to memory of 2564 2912 cmd.exe 29 PID 2564 wrote to memory of 2360 2564 rundll32.exe 30 PID 2564 wrote to memory of 2360 2564 rundll32.exe 30 PID 2564 wrote to memory of 2360 2564 rundll32.exe 30 PID 2564 wrote to memory of 2360 2564 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Zero-attacker-Zero-attacker\zero.py1⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Zero-attacker-Zero-attacker\zero.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Zero-attacker-Zero-attacker\zero.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59a3f592d81bf860a28520961d923fdca
SHA1b3809b9148ad57b3e7e95d4402003d6f46ad9d67
SHA256d050f8a42785f81a0ec2dcbbe31fdef0531b69d77d6bf7c02c0e59f0e4f2a601
SHA512d0fb30a6acf93b9daae3fe73f6123baa9782e47fd98f9517de70bb050c1b23c2a2110def6b3746ae3c6c6d0493ce93ca3fcc18b0298e5676a49dfb6762ff7179