Analysis

  • max time kernel
    134s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 12:18

General

  • Target

    ZoraraUI.exe

  • Size

    254KB

  • MD5

    a64cafc6b2f823a091535cd9d31b5184

  • SHA1

    f8e7e04ae3a4280526a72ad81be47c3e1cc11d96

  • SHA256

    e2db764d50b8b1e729e6ecdb3a77d00aab4366d0f9396e85854e72a36a569350

  • SHA512

    c07fa353adf0ce62caa49597cead3ddebc2abafcbb60f595629a2dfbe1c960cb4d9bcc2edaab06b19e0932016c754a006e41c9c85e41b7517a2f029cc63f21cb

  • SSDEEP

    3072:GjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOBhBu9mYwSKgIwp:GjK4TDUqgpqWDLZ5H+xuZ04ihA9N

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe
    "C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3332

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3332-2-0x00007FFBA5C20000-0x00007FFBA5C22000-memory.dmp

    Filesize

    8KB

  • memory/3332-1-0x00007FFBA5C10000-0x00007FFBA5C12000-memory.dmp

    Filesize

    8KB

  • memory/3332-3-0x00007FFBA5C30000-0x00007FFBA5C32000-memory.dmp

    Filesize

    8KB

  • memory/3332-0-0x00007FFB81A17000-0x00007FFB8231A000-memory.dmp

    Filesize

    9.0MB

  • memory/3332-5-0x00007FFB81940000-0x00007FFB831D3000-memory.dmp

    Filesize

    24.6MB

  • memory/3332-4-0x00007FFBA5750000-0x00007FFBA5752000-memory.dmp

    Filesize

    8KB

  • memory/3332-6-0x00007FFBA5760000-0x00007FFBA5762000-memory.dmp

    Filesize

    8KB

  • memory/3332-7-0x00007FFBA3A90000-0x00007FFBA3A92000-memory.dmp

    Filesize

    8KB

  • memory/3332-8-0x00007FFBA3AA0000-0x00007FFBA3AA2000-memory.dmp

    Filesize

    8KB

  • memory/3332-13-0x00007FFB81940000-0x00007FFB831D3000-memory.dmp

    Filesize

    24.6MB

  • memory/3332-14-0x00007FFB81A17000-0x00007FFB8231A000-memory.dmp

    Filesize

    9.0MB