Analysis

  • max time kernel
    150s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 00:39

General

  • Target

    ZOD-master.zip

  • Size

    41KB

  • MD5

    ae6438a5a41352e5b7b37918259bea69

  • SHA1

    684f4e642980875422c1e666ee349d9aee5c337f

  • SHA256

    d53a7858a392b314ef7e63d5d8d2f7fa8b6067dc0b9cc926adf219c0c4c0b768

  • SHA512

    28b14be2cadcc3d37afd2a501e553bb5d8df42cb376609c587348a2bfd3eab35e81b76ff2f61b1951a606739834eda607f9dc4334ea60f00bb806edb269c9784

  • SSDEEP

    768:XUMiHEhp2vCIODrhNGkAalt/bp2GiKlIPJV1Aoi+vZPJSFmGiU0Jv1uwiX:XUKP2vCF1Aalt/keIPhDjZPJSFmLa

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ZOD-master.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2208
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1768
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3840-4-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-6-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-5-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-12-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-16-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-15-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-14-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-13-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-11-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB

    • memory/3840-10-0x00000291A3050000-0x00000291A3051000-memory.dmp

      Filesize

      4KB