Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    19-07-2020 17:34

General

  • Target

    zloader_1.17.3.0.vir.exe

  • Size

    194KB

  • MD5

    3bda20fb53a01ce52525f46e44d98328

  • SHA1

    55f274ff87a8bfb6eebaaa3e7403239aa21d3a78

  • SHA256

    c6035dfd95b359f00bc421c50365c58f55ffee88ff1f4223cad9d8fd4f9879a7

  • SHA512

    b26b867d6a052e308e03591595d9345944cf11bd5578193f16729d6220eb381483220fa3215e137007687f71f43ecd30e772eab56618b2c9b3fc0b187a02b645

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zloader_1.17.3.0.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\zloader_1.17.3.0.vir.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: MapViewOfSection
    PID:1392
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1444-0-0x0000000000000000-mapping.dmp
  • memory/1444-1-0x0000000000320000-0x00000000005A1000-memory.dmp
    Filesize

    2.5MB