Analysis

  • max time kernel
    92s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 15:21

General

  • Target

    Zorara.dll

  • Size

    14.2MB

  • MD5

    e9f7a600f1c3c30e2ef9576bf7cea03b

  • SHA1

    700017e157bec2e9f72bceffcdeab36004a9c820

  • SHA256

    439c9fc897dd7026df5b9579f45b712516b4b22f4ffe3324694202530e3ba23c

  • SHA512

    81606aa1d2c3d2e604c201bd7803e28f22a0e60f0fe9e6b05d16c2cb1dd9bea54649d2b15bd1b1187a62e5fb6644964e7274d21d50854e33312d017e050f7a3c

  • SSDEEP

    393216:i8kK1+g5u+l7ylz47SB1S9v1b7z2N+KJeRV:ic+cue08w+KJe

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Zorara.dll,#1
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1680-0-0x00007FFF9E2DD000-0x00007FFF9EB4E000-memory.dmp

    Filesize

    8.4MB

  • memory/1680-2-0x00007FFFBD2C0000-0x00007FFFBD2C2000-memory.dmp

    Filesize

    8KB

  • memory/1680-1-0x00007FFFBD2B0000-0x00007FFFBD2B2000-memory.dmp

    Filesize

    8KB

  • memory/1680-3-0x00007FFFBD2D0000-0x00007FFFBD2D2000-memory.dmp

    Filesize

    8KB

  • memory/1680-4-0x00007FFFBD2E0000-0x00007FFFBD2E2000-memory.dmp

    Filesize

    8KB

  • memory/1680-5-0x00007FFFBC150000-0x00007FFFBC152000-memory.dmp

    Filesize

    8KB

  • memory/1680-6-0x00007FFFBC160000-0x00007FFFBC162000-memory.dmp

    Filesize

    8KB

  • memory/1680-7-0x00007FFF9E1B0000-0x00007FFF9F986000-memory.dmp

    Filesize

    23.8MB

  • memory/1680-8-0x00007FFFBADD0000-0x00007FFFBADD2000-memory.dmp

    Filesize

    8KB

  • memory/1680-9-0x00007FFFBADE0000-0x00007FFFBADE2000-memory.dmp

    Filesize

    8KB

  • memory/1680-14-0x000001B913050000-0x000001B913165000-memory.dmp

    Filesize

    1.1MB

  • memory/1680-15-0x00007FFF9E2DD000-0x00007FFF9EB4E000-memory.dmp

    Filesize

    8.4MB

  • memory/1680-16-0x00007FFF9E1B0000-0x00007FFF9F986000-memory.dmp

    Filesize

    23.8MB