Overview
overview
10Static
static
3ZRK 1.1_[u...]_.zip
windows7-x64
1ZRK 1.1_[u...]_.zip
windows10-2004-x64
ZRK 1.1 UC....1.exe
windows7-x64
1ZRK 1.1 UC....1.exe
windows10-2004-x64
1ZRK 1.1 UC...40.dll
windows7-x64
1ZRK 1.1 UC...40.dll
windows10-2004-x64
1ZRK 1.1 UC..._1.dll
windows7-x64
1ZRK 1.1 UC..._1.dll
windows10-2004-x64
1ZRK 1.1 UC...re.dll
windows7-x64
1ZRK 1.1 UC...re.dll
windows10-2004-x64
1ZRK 1.1 UC...us.dll
windows7-x64
1ZRK 1.1 UC...us.dll
windows10-2004-x64
ZRK 1.1 UC...ui.dll
windows7-x64
1ZRK 1.1 UC...ui.dll
windows10-2004-x64
6ZRK 1.1 UC...rk.dll
windows7-x64
1ZRK 1.1 UC...rk.dll
windows10-2004-x64
ZRK 1.1 UC...ml.dll
windows7-x64
1ZRK 1.1 UC...ml.dll
windows10-2004-x64
ZRK 1.1 UC...ls.dll
windows7-x64
1ZRK 1.1 UC...ls.dll
windows10-2004-x64
8ZRK 1.1 UC...ck.dll
windows7-x64
1ZRK 1.1 UC...ck.dll
windows10-2004-x64
1ZRK 1.1 UC...vg.dll
windows7-x64
1ZRK 1.1 UC...vg.dll
windows10-2004-x64
1ZRK 1.1 UC...ts.dll
windows7-x64
1ZRK 1.1 UC...ts.dll
windows10-2004-x64
1ZRK 1.1 UC...ts.dll
windows7-x64
1ZRK 1.1 UC...ts.dll
windows10-2004-x64
1ZRK 1.1 UC...40.dll
windows7-x64
1ZRK 1.1 UC...40.dll
windows10-2004-x64
1ZRK 1.1 UC..._ar.qm
windows7-x64
3ZRK 1.1 UC..._ar.qm
windows10-2004-x64
3Analysis
-
max time kernel
1552s -
max time network
1554s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 13:52
Behavioral task
behavioral1
Sample
ZRK 1.1_[unknowncheats.me]_.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ZRK 1.1_[unknowncheats.me]_.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ZRK 1.1 UC/ZRK 1.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ZRK 1.1 UC/ZRK 1.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/MSVCP140.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/MSVCP140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/MSVCP140_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/MSVCP140_1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5DBus.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5DBus.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Gui.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Gui.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Network.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Network.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Qml.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Qml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5QmlModels.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5QmlModels.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Quick.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Quick.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Svg.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Svg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5WebSockets.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5WebSockets.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Widgets.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/Qt5Widgets.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/VCRUNTIME140.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/bin/VCRUNTIME140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/translations/qt_ar.qm
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ZRK 1.1 UC/src/PyQt5/Qt5/translations/qt_ar.qm
Resource
win10v2004-20241007-en
General
-
Target
ZRK 1.1 UC/src/PyQt5/Qt5/translations/qt_ar.qm
-
Size
130B
-
MD5
8ff05b56c0995f90a80b7064aa6e915c
-
SHA1
d5aeb09ae557ceefb758972ec4ac624cddc9e6a7
-
SHA256
a8a1b0d6f958e7366d1c856be61000106d3e7fc993fb931675369892b9002d0b
-
SHA512
5374e0f1d3f5a6a456b00732de8005787b17ecef9c8a2b2c1228966a6a8de211700334d8fd789dad269f52d0aeed3f5160010ca60909861e270c253b3ea881a4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2916 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2916 AcroRd32.exe 2916 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 804 wrote to memory of 1028 804 cmd.exe 31 PID 804 wrote to memory of 1028 804 cmd.exe 31 PID 804 wrote to memory of 1028 804 cmd.exe 31 PID 1028 wrote to memory of 2916 1028 rundll32.exe 32 PID 1028 wrote to memory of 2916 1028 rundll32.exe 32 PID 1028 wrote to memory of 2916 1028 rundll32.exe 32 PID 1028 wrote to memory of 2916 1028 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ZRK 1.1 UC\src\PyQt5\Qt5\translations\qt_ar.qm"1⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZRK 1.1 UC\src\PyQt5\Qt5\translations\qt_ar.qm2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ZRK 1.1 UC\src\PyQt5\Qt5\translations\qt_ar.qm"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bc1e1aa461a4919fe8175e309927d896
SHA1dd2002666a327be37154ab17bbc6d7741d526382
SHA256b00681a6cfdf9bf98cc3277deb6eb8978fb17d2a3a72af5551b2ea5979d37dcc
SHA5123324407248393d47153161232ad25ee2bd99fa183218e0920f0dc29f9c88314fc01f5129e4a21966bd5896f1d43450c0165f580bb4f632524975a02a3085084e