General
-
Target
ADZP 20 Complex.cmd
-
Size
10KB
-
Sample
240706-3mrz3szdpa
-
MD5
e12f846bf65a57321794ad4fbf1fac8b
-
SHA1
6e3126868a68005fc0a426da13d256c2a0136b5e
-
SHA256
e01060af4aebe2aa52c598e171b6f5cb2e0de2b8857c72b56301140611bda390
-
SHA512
21b7871ffe232f0f3501cce4e035b1c3dd13813091b967ce2479ff555640154c8c700dcadf029b4868d9f25f52e5b47cf2459ae90c3e0cd4080772f1d2ae664c
-
SSDEEP
192:88fvn9rD7rYVTiuIxhoAtpYAjDj8+3M8dfmJWap3ahzKcd1h4kuWSZBxAp:BVNmJWo3yzK+
Static task
static1
Behavioral task
behavioral1
Sample
ADZP 20 Complex.cmd
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ADZP 20 Complex.cmd
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
ADZP 20 Complex.cmd
-
Size
10KB
-
MD5
e12f846bf65a57321794ad4fbf1fac8b
-
SHA1
6e3126868a68005fc0a426da13d256c2a0136b5e
-
SHA256
e01060af4aebe2aa52c598e171b6f5cb2e0de2b8857c72b56301140611bda390
-
SHA512
21b7871ffe232f0f3501cce4e035b1c3dd13813091b967ce2479ff555640154c8c700dcadf029b4868d9f25f52e5b47cf2459ae90c3e0cd4080772f1d2ae664c
-
SSDEEP
192:88fvn9rD7rYVTiuIxhoAtpYAjDj8+3M8dfmJWap3ahzKcd1h4kuWSZBxAp:BVNmJWo3yzK+
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Modifies boot configuration data using bcdedit
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Modify Registry
2Hide Artifacts
1Hidden Files and Directories
1