Analysis

  • max time kernel
    14s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/09/2024, 08:45

General

  • Target

    ZoraraUI.exe

  • Size

    254KB

  • MD5

    b297f569ee42cb928b335194d22cb1da

  • SHA1

    d4bfa90ef319dd8b93ffa235a6f84d55d74270cf

  • SHA256

    42e67a231a0be71c51d556fb6a0ee10c8c30fe279c68fa4e70799f0d773b57d7

  • SHA512

    d78d95985481cb408c4d5e8cd8e751f72bea450783d2049d8daaf494574f9579b67852bedaa7a75f13a90f844d833eafae021f25d25408dd481e9380c5640ec9

  • SSDEEP

    3072:ejK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOBhBuKmYwSKgIw8:ejK4TDUqgpqWDLZ5H+xuZ04ihAKN

Score
1/10

Malware Config

Signatures

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe
    "C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe"
    1⤵
      PID:5072
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:756

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

      Filesize

      10KB

      MD5

      a7f391566ceb7d310b04c1376aa66a07

      SHA1

      eda88e9134d3de209152481c9e8aa02054d4c2eb

      SHA256

      8ecb81fa22792fa6bb09abc86b9b5afb50773e2c5537def45dd8ba297f6c714e

      SHA512

      163bad20eaa9108286367367e6a54a9ac612026954ee2466b8f88f732a992695fe160d3fb5f092976ef15c1c1b71400e577a9a4833dfa616d7c9ee6a8237033c