Analysis
-
max time kernel
105s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
ZOD-master.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ZOD-master.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
ZOD-master/42.zip
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
ZOD-master/42.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
ZOD-master/README.md
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ZOD-master/README.md
Resource
win10v2004-20240508-en
General
-
Target
ZOD-master/README.md
-
Size
1KB
-
MD5
6e4616e9582ad27dadf48c5b62b53cca
-
SHA1
49c76a22735223a85cca9f46c62b346c7e74db78
-
SHA256
e6452e165b2c3e6056191326033ddcf8fcab36907bc6fe417954d5cb818a54e0
-
SHA512
86763d4487f75e182fd329c58b400a86c9fcbd5476748ee321a10d493b9898cabc96855d1f5a04a2258db149aa79ee870f2f2fcf351cfdce843ff497f025e3d0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2976 AcroRd32.exe 2976 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2596 2992 cmd.exe 29 PID 2992 wrote to memory of 2596 2992 cmd.exe 29 PID 2992 wrote to memory of 2596 2992 cmd.exe 29 PID 2596 wrote to memory of 2976 2596 rundll32.exe 30 PID 2596 wrote to memory of 2976 2596 rundll32.exe 30 PID 2596 wrote to memory of 2976 2596 rundll32.exe 30 PID 2596 wrote to memory of 2976 2596 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ZOD-master\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZOD-master\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ZOD-master\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a3eac2c671775488093b47d08b835621
SHA11360cb999d16714160a505cb871afe33b4ea8ba2
SHA256c07b9af11c5271d605c7d467d56be725a70d0bc738787c730ff6c8723694af80
SHA512b3420828bcb36bdf495dc0bfdebc0feb027b9fe5ee6d673b4cdc281cfff5d48a7132b24e3eeab87983997253e3614da5eee1638110812ecdc4ee02a4e6f7b323