Analysis

  • max time kernel
    133s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    19-07-2020 16:35

General

  • Target

    zloader_1.17.0.0.vir.exe

  • Size

    260KB

  • MD5

    2cddc5e9482b049387c96b609ada8fea

  • SHA1

    c8fb26a5a4776ceb5572c5139d9057a8040f68b8

  • SHA256

    0b37d287d10b55a50f1a717a015503b64d3be3586f15a12a0085d61794864235

  • SHA512

    d19429d362f80feace554706fa1d905148301d628e14ef086a66b175c94489e736f512b4284010d9a52090203dba71684a397c95017f8c0b16f0b0512c28f141

Score
5/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zloader_1.17.0.0.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\zloader_1.17.0.0.vir.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:712
    • C:\Users\Admin\AppData\Local\Temp\zloader_1.17.0.0.vir.exe
      "C:\Users\Admin\AppData\Local\Temp\zloader_1.17.0.0.vir.exe"
      2⤵
        PID:3036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 88
          3⤵
          • Program crash
          PID:3872

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/712-0-0x0000000000356000-0x0000000000357000-memory.dmp
      Filesize

      4KB

    • memory/3036-1-0x00000000000065AA-mapping.dmp
    • memory/3872-2-0x0000000004480000-0x0000000004481000-memory.dmp
      Filesize

      4KB