Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10_x64 -
resource
win10 -
submitted
19-07-2020 19:24
Static task
static1
Behavioral task
behavioral1
Sample
zloader_1.15.0.0.vir.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zloader_1.15.0.0.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
zloader_1.15.0.0.vir.exe
-
Size
224KB
-
MD5
126dc987935804de8ceb101ae29c4922
-
SHA1
3a43fcba90ce677ddcf5d134e810d1954671b29d
-
SHA256
04dc453eef135fdf917b2cfd671246cc9d4273f7c9c770fad407ef714bed02dc
-
SHA512
4ee2e69aed98892717d36240255fc4dfb6cd6326f82fda9124b59251ab963d7384cdc48ffce8a51ac81e578f34e7d49133b243aac4fa35ee7e50ad447b4a3af3
Score
8/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
zloader_1.15.0.0.vir.exepid process 3832 zloader_1.15.0.0.vir.exe 3832 zloader_1.15.0.0.vir.exe -
Suspicious use of WriteProcessMemory 276 IoCs
Processes:
zloader_1.15.0.0.vir.exedescription pid process target process PID 3832 wrote to memory of 3984 3832 zloader_1.15.0.0.vir.exe cmd.exe PID 3832 wrote to memory of 3984 3832 zloader_1.15.0.0.vir.exe cmd.exe PID 3832 wrote to memory of 3984 3832 zloader_1.15.0.0.vir.exe cmd.exe PID 3832 wrote to memory of 3892 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3892 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3892 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3896 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3896 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3896 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 wrote to memory of 3864 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3864 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3864 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3872 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3872 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3872 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3860 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3860 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3860 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3952 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3952 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3952 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3960 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3960 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3960 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3908 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3908 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3908 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3840 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3840 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3840 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 1736 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 1736 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 1736 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3356 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3356 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3356 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3988 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3988 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3988 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3224 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3224 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3224 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3500 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3500 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3500 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3992 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3992 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3992 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3856 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3856 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe PID 3832 wrote to memory of 3856 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3784 WerFault.exe Token: SeBackupPrivilege 3784 WerFault.exe Token: SeDebugPrivilege 3784 WerFault.exe -
Drops startup file 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
zloader_1.15.0.0.vir.exeWerFault.exepid process 3832 zloader_1.15.0.0.vir.exe 3832 zloader_1.15.0.0.vir.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
zloader_1.15.0.0.vir.exedescription pid process target process PID 3832 set thread context of 3904 3832 zloader_1.15.0.0.vir.exe iexplore.exe PID 3832 set thread context of 4364 3832 zloader_1.15.0.0.vir.exe zloader_1.15.0.0.vir.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3784 3904 WerFault.exe iexplore.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
zloader_1.15.0.0.vir.exepid process 4364 zloader_1.15.0.0.vir.exe 4364 zloader_1.15.0.0.vir.exe -
Processes:
resource yara_rule behavioral2/memory/3904-1-0x0000000000400000-0x00000000009DC000-memory.dmp upx behavioral2/memory/3904-3-0x0000000000400000-0x00000000009DC000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 5363⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader_1.15.0.0.vir.exe"2⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3784-4-0x0000000004870000-0x0000000004871000-memory.dmpFilesize
4KB
-
memory/3784-11-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/3904-9-0x000000000040D770-mapping.dmp
-
memory/3904-3-0x0000000000400000-0x00000000009DC000-memory.dmpFilesize
5.9MB
-
memory/3904-2-0x000000000040D770-mapping.dmp
-
memory/3904-8-0x000000000040D770-mapping.dmp
-
memory/3904-10-0x000000000040D770-mapping.dmp
-
memory/3904-1-0x0000000000400000-0x00000000009DC000-memory.dmpFilesize
5.9MB
-
memory/3984-0-0x0000000000000000-mapping.dmp
-
memory/4364-5-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/4364-6-0x0000000000402193-mapping.dmp
-
memory/4364-7-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/4396-12-0x0000000000000000-mapping.dmp
-
memory/4396-13-0x0000000000C20000-0x000000000105F000-memory.dmpFilesize
4.2MB
-
memory/4396-17-0x0000000000C20000-0x000000000105F000-memory.dmpFilesize
4.2MB