Overview
overview
3Static
static
3Zorara2.5(WaveUI).zip
windows7-x64
1Zorara2.5(WaveUI).zip
windows10-2004-x64
1ZoraraUI.deps.json
windows7-x64
3ZoraraUI.deps.json
windows10-2004-x64
3ZoraraUI.e...rprint
windows7-x64
3ZoraraUI.e...rprint
windows10-2004-x64
3ZoraraUI.e...t.json
windows7-x64
3ZoraraUI.e...t.json
windows10-2004-x64
3ZoraraUI.e...s.json
windows7-x64
3ZoraraUI.e...s.json
windows10-2004-x64
3ZoraraUI.e...rl-set
windows7-x64
1ZoraraUI.e...rl-set
windows10-2004-x64
1ZoraraUI.e...rprint
windows7-x64
3ZoraraUI.e...rprint
windows10-2004-x64
3ZoraraUI.e...t.json
windows7-x64
3ZoraraUI.e...t.json
windows10-2004-x64
3ZoraraUI.e...gs.dat
windows7-x64
3ZoraraUI.e...gs.dat
windows10-2004-x64
3ZoraraUI.e...re.dat
windows7-x64
3ZoraraUI.e...re.dat
windows10-2004-x64
3ZoraraUI.e...data_0
windows7-x64
1ZoraraUI.e...data_0
windows10-2004-x64
1ZoraraUI.e...data_1
windows7-x64
1ZoraraUI.e...data_1
windows10-2004-x64
1ZoraraUI.e...data_2
windows7-x64
1ZoraraUI.e...data_2
windows10-2004-x64
1ZoraraUI.e...data_3
windows7-x64
1ZoraraUI.e...data_3
windows10-2004-x64
1ZoraraUI.e...001.gz
windows7-x64
3ZoraraUI.e...001.gz
windows10-2004-x64
3ZoraraUI.e.../index
windows7-x64
1ZoraraUI.e.../index
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
Zorara2.5(WaveUI).zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Zorara2.5(WaveUI).zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ZoraraUI.deps.json
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ZoraraUI.deps.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ZoraraUI.exe.WebView2/EBWebView/AutoLaunchProtocolsComponent/1.0.0.8/manifest.fingerprint
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ZoraraUI.exe.WebView2/EBWebView/AutoLaunchProtocolsComponent/1.0.0.8/manifest.fingerprint
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ZoraraUI.exe.WebView2/EBWebView/AutoLaunchProtocolsComponent/1.0.0.8/manifest.json
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
ZoraraUI.exe.WebView2/EBWebView/AutoLaunchProtocolsComponent/1.0.0.8/manifest.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ZoraraUI.exe.WebView2/EBWebView/AutoLaunchProtocolsComponent/1.0.0.8/protocols.json
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ZoraraUI.exe.WebView2/EBWebView/AutoLaunchProtocolsComponent/1.0.0.8/protocols.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ZoraraUI.exe.WebView2/EBWebView/CertificateRevocation/6498.2023.8.1/crl-set
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ZoraraUI.exe.WebView2/EBWebView/CertificateRevocation/6498.2023.8.1/crl-set
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ZoraraUI.exe.WebView2/EBWebView/CertificateRevocation/6498.2023.8.1/manifest.fingerprint
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ZoraraUI.exe.WebView2/EBWebView/CertificateRevocation/6498.2023.8.1/manifest.fingerprint
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ZoraraUI.exe.WebView2/EBWebView/CertificateRevocation/6498.2023.8.1/manifest.json
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
ZoraraUI.exe.WebView2/EBWebView/CertificateRevocation/6498.2023.8.1/manifest.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ZoraraUI.exe.WebView2/EBWebView/Crashpad/settings.dat
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
ZoraraUI.exe.WebView2/EBWebView/Crashpad/settings.dat
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
ZoraraUI.exe.WebView2/EBWebView/Crashpad/throttle_store.dat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ZoraraUI.exe.WebView2/EBWebView/Crashpad/throttle_store.dat
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/data_0
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/data_0
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/data_1
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/data_1
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/data_2
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/data_2
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/data_3
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/data_3
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/f_000001.gz
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/f_000001.gz
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/index
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/index
Resource
win10v2004-20240802-en
General
-
Target
ZoraraUI.exe.WebView2/EBWebView/Default/Cache/Cache_Data/f_000001.gz
-
Size
170KB
-
MD5
d9d5de59488c160ec82077a175384aff
-
SHA1
0d3b0b2ad7636793e06406682dba49fc043000b7
-
SHA256
d50aeef84ae7e3685863249d28f6322e952792940fc5c851d921c9836332dab9
-
SHA512
daa64356473dc7143a864aa77895fd7258d61a5e4b6316fa4b4a258b18e20ef3805feed596fffd73dd7eb7e23522f097b5ba68ff705928c761aa20c38c08f3f2
-
SSDEEP
3072:TAdbCxeQJhYeIh+NXmqdFa+rzFu/UBILrcTypuQpBMBpB6AclI6Wy826:TA5CrYt8xmOFzAU8puQpBM1GUj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2668 1560 cmd.exe 30 PID 1560 wrote to memory of 2668 1560 cmd.exe 30 PID 1560 wrote to memory of 2668 1560 cmd.exe 30 PID 2668 wrote to memory of 2804 2668 rundll32.exe 31 PID 2668 wrote to memory of 2804 2668 rundll32.exe 31 PID 2668 wrote to memory of 2804 2668 rundll32.exe 31 PID 2804 wrote to memory of 2796 2804 rundll32.exe 32 PID 2804 wrote to memory of 2796 2804 rundll32.exe 32 PID 2804 wrote to memory of 2796 2804 rundll32.exe 32 PID 2796 wrote to memory of 2704 2796 rundll32.exe 33 PID 2796 wrote to memory of 2704 2796 rundll32.exe 33 PID 2796 wrote to memory of 2704 2796 rundll32.exe 33 PID 2704 wrote to memory of 2584 2704 rundll32.exe 34 PID 2704 wrote to memory of 2584 2704 rundll32.exe 34 PID 2704 wrote to memory of 2584 2704 rundll32.exe 34 PID 2584 wrote to memory of 3052 2584 rundll32.exe 35 PID 2584 wrote to memory of 3052 2584 rundll32.exe 35 PID 2584 wrote to memory of 3052 2584 rundll32.exe 35 PID 3052 wrote to memory of 3056 3052 rundll32.exe 36 PID 3052 wrote to memory of 3056 3052 rundll32.exe 36 PID 3052 wrote to memory of 3056 3052 rundll32.exe 36 PID 3056 wrote to memory of 2324 3056 rundll32.exe 37 PID 3056 wrote to memory of 2324 3056 rundll32.exe 37 PID 3056 wrote to memory of 2324 3056 rundll32.exe 37 PID 2324 wrote to memory of 956 2324 rundll32.exe 38 PID 2324 wrote to memory of 956 2324 rundll32.exe 38 PID 2324 wrote to memory of 956 2324 rundll32.exe 38 PID 956 wrote to memory of 1788 956 rundll32.exe 39 PID 956 wrote to memory of 1788 956 rundll32.exe 39 PID 956 wrote to memory of 1788 956 rundll32.exe 39 PID 1788 wrote to memory of 1504 1788 rundll32.exe 40 PID 1788 wrote to memory of 1504 1788 rundll32.exe 40 PID 1788 wrote to memory of 1504 1788 rundll32.exe 40 PID 1504 wrote to memory of 2840 1504 rundll32.exe 41 PID 1504 wrote to memory of 2840 1504 rundll32.exe 41 PID 1504 wrote to memory of 2840 1504 rundll32.exe 41 PID 2840 wrote to memory of 1056 2840 rundll32.exe 42 PID 2840 wrote to memory of 1056 2840 rundll32.exe 42 PID 2840 wrote to memory of 1056 2840 rundll32.exe 42 PID 1056 wrote to memory of 2968 1056 rundll32.exe 43 PID 1056 wrote to memory of 2968 1056 rundll32.exe 43 PID 1056 wrote to memory of 2968 1056 rundll32.exe 43 PID 2968 wrote to memory of 2176 2968 rundll32.exe 44 PID 2968 wrote to memory of 2176 2968 rundll32.exe 44 PID 2968 wrote to memory of 2176 2968 rundll32.exe 44 PID 2176 wrote to memory of 2128 2176 rundll32.exe 45 PID 2176 wrote to memory of 2128 2176 rundll32.exe 45 PID 2176 wrote to memory of 2128 2176 rundll32.exe 45 PID 2128 wrote to memory of 2424 2128 rundll32.exe 46 PID 2128 wrote to memory of 2424 2128 rundll32.exe 46 PID 2128 wrote to memory of 2424 2128 rundll32.exe 46 PID 2424 wrote to memory of 928 2424 rundll32.exe 47 PID 2424 wrote to memory of 928 2424 rundll32.exe 47 PID 2424 wrote to memory of 928 2424 rundll32.exe 47 PID 928 wrote to memory of 1604 928 rundll32.exe 48 PID 928 wrote to memory of 1604 928 rundll32.exe 48 PID 928 wrote to memory of 1604 928 rundll32.exe 48 PID 1604 wrote to memory of 2464 1604 rundll32.exe 49 PID 1604 wrote to memory of 2464 1604 rundll32.exe 49 PID 1604 wrote to memory of 2464 1604 rundll32.exe 49 PID 2464 wrote to memory of 2488 2464 rundll32.exe 50 PID 2464 wrote to memory of 2488 2464 rundll32.exe 50 PID 2464 wrote to memory of 2488 2464 rundll32.exe 50 PID 2488 wrote to memory of 2368 2488 rundll32.exe 51
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz1⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz4⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz6⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz7⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz8⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz9⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz10⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz11⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz12⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz13⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz14⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz15⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz16⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz17⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz18⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz19⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz20⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz21⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz22⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz23⤵
- Modifies registry class
PID:2368 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz24⤵
- Modifies registry class
PID:1536 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz25⤵
- Modifies registry class
PID:2216 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZoraraUI.exe.WebView2\EBWebView\Default\Cache\Cache_Data\f_000001.gz26⤵
- Modifies registry class
PID:2108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-