Analysis
-
max time kernel
150s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
ZOD-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
ZOD-master.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
ZOD-master/42.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
ZOD-master/42.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
ZOD-master/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
ZOD-master/README.md
Resource
win10ltsc2021-20241023-en
General
-
Target
ZOD-master.zip
-
Size
41KB
-
MD5
ae6438a5a41352e5b7b37918259bea69
-
SHA1
684f4e642980875422c1e666ee349d9aee5c337f
-
SHA256
d53a7858a392b314ef7e63d5d8d2f7fa8b6067dc0b9cc926adf219c0c4c0b768
-
SHA512
28b14be2cadcc3d37afd2a501e553bb5d8df42cb376609c587348a2bfd3eab35e81b76ff2f61b1951a606739834eda607f9dc4334ea60f00bb806edb269c9784
-
SSDEEP
768:XUMiHEhp2vCIODrhNGkAalt/bp2GiKlIPJV1Aoi+vZPJSFmGiU0Jv1uwiX:XUKP2vCF1Aalt/keIPhDjZPJSFmLa
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 2208 7zFM.exe Token: 35 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeDebugPrivilege 3840 taskmgr.exe Token: SeSystemProfilePrivilege 3840 taskmgr.exe Token: SeCreateGlobalPrivilege 3840 taskmgr.exe Token: 33 3840 taskmgr.exe Token: SeIncBasePriorityPrivilege 3840 taskmgr.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2208 7zFM.exe 2208 7zFM.exe 2208 7zFM.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe 3840 taskmgr.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ZOD-master.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2208
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1768
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3840