Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
vajalik avada.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
vajalik avada.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
ZOD-master/42.zip
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
ZOD-master/42.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
ZOD-master/README.md
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ZOD-master/README.md
Resource
win10v2004-20240412-en
General
-
Target
ZOD-master/README.md
-
Size
1KB
-
MD5
6e4616e9582ad27dadf48c5b62b53cca
-
SHA1
49c76a22735223a85cca9f46c62b346c7e74db78
-
SHA256
e6452e165b2c3e6056191326033ddcf8fcab36907bc6fe417954d5cb818a54e0
-
SHA512
86763d4487f75e182fd329c58b400a86c9fcbd5476748ee321a10d493b9898cabc96855d1f5a04a2258db149aa79ee870f2f2fcf351cfdce843ff497f025e3d0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2596 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2596 AcroRd32.exe 2596 AcroRd32.exe 2596 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2796 2940 cmd.exe 29 PID 2940 wrote to memory of 2796 2940 cmd.exe 29 PID 2940 wrote to memory of 2796 2940 cmd.exe 29 PID 2796 wrote to memory of 2596 2796 rundll32.exe 30 PID 2796 wrote to memory of 2596 2796 rundll32.exe 30 PID 2796 wrote to memory of 2596 2796 rundll32.exe 30 PID 2796 wrote to memory of 2596 2796 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ZOD-master\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZOD-master\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ZOD-master\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df4bb5e84c8f0418801a17ca68d140b3
SHA19ca7d8ffba76cb9e9eabcab370035df9c005e394
SHA256d61994bdc04900653bbc3e771235983dc5565f043d89a32a50fa86fe3c620d1f
SHA512ec5d555594a7fc3f4a73d4351969a7b80cdfe286c2b3f9dfcca85d13192294e32611d74b4e0ab9ae901c884e1df7274c7eaa259a277370259e191fcdd2606668