Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
Mody.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
ZOD-master/42.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ZOD-master/README.md
Resource
win10v2004-20240226-en
General
-
Target
ZOD-master/README.md
-
Size
1KB
-
MD5
6e4616e9582ad27dadf48c5b62b53cca
-
SHA1
49c76a22735223a85cca9f46c62b346c7e74db78
-
SHA256
e6452e165b2c3e6056191326033ddcf8fcab36907bc6fe417954d5cb818a54e0
-
SHA512
86763d4487f75e182fd329c58b400a86c9fcbd5476748ee321a10d493b9898cabc96855d1f5a04a2258db149aa79ee870f2f2fcf351cfdce843ff497f025e3d0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4620 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3400 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 4620 OpenWith.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe 3400 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 3400 4620 OpenWith.exe 100 PID 4620 wrote to memory of 3400 4620 OpenWith.exe 100 PID 4620 wrote to memory of 3400 4620 OpenWith.exe 100 PID 3400 wrote to memory of 4500 3400 AcroRd32.exe 102 PID 3400 wrote to memory of 4500 3400 AcroRd32.exe 102 PID 3400 wrote to memory of 4500 3400 AcroRd32.exe 102 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4152 4500 RdrCEF.exe 103 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104 PID 4500 wrote to memory of 4904 4500 RdrCEF.exe 104
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ZOD-master\README.md1⤵
- Modifies registry class
PID:4904
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ZOD-master\README.md"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E4DC0789B50F184389A21B9156BDE7A7 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4152
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=585F0377F11464DA14EBFA4BD534CF77 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=585F0377F11464DA14EBFA4BD534CF77 --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:14⤵PID:4904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=319A6752496CFC9D17EC473581C68DA5 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1588
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3024138F521E74DB1CB13B5A1E3CB28B --mojo-platform-channel-handle=1912 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1340
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=01B21C5659E6E68515EE3737C50C610E --mojo-platform-channel-handle=2016 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3604
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A57F9E4F8ECDCEFC6C49E3D172FFFAB4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A57F9E4F8ECDCEFC6C49E3D172FFFAB4 --renderer-client-id=8 --mojo-platform-channel-handle=2360 --allow-no-sandbox-job /prefetch:14⤵PID:3200
-
-
-