Analysis

  • max time kernel
    600s
  • max time network
    493s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-06-2024 00:14

General

  • Target

    ZOD-master.zip

  • Size

    41KB

  • MD5

    ae6438a5a41352e5b7b37918259bea69

  • SHA1

    684f4e642980875422c1e666ee349d9aee5c337f

  • SHA256

    d53a7858a392b314ef7e63d5d8d2f7fa8b6067dc0b9cc926adf219c0c4c0b768

  • SHA512

    28b14be2cadcc3d37afd2a501e553bb5d8df42cb376609c587348a2bfd3eab35e81b76ff2f61b1951a606739834eda607f9dc4334ea60f00bb806edb269c9784

  • SSDEEP

    768:XUMiHEhp2vCIODrhNGkAalt/bp2GiKlIPJV1Aoi+vZPJSFmGiU0Jv1uwiX:XUKP2vCF1Aalt/keIPhDjZPJSFmLa

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\ZOD-master.zip
    1⤵
      PID:1724
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2732-0-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-1-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-2-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-6-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-12-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-11-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-10-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-9-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-8-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB

    • memory/2732-7-0x0000021EE2200000-0x0000021EE2201000-memory.dmp

      Filesize

      4KB