Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
ZyuL.ioAHK.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ZyuL.ioAHK.exe
Resource
win10v2004-20240802-en
General
-
Target
ZyuL.ioAHK.exe
-
Size
706KB
-
MD5
bbd81ebf0126bc58a96f30bf83869371
-
SHA1
4b3b52c6d74d3a8e1162a550825de3d24fe01679
-
SHA256
899e37f5d9133b188199d4fc536d07841844375b018d28e36d533ea5b5aeab4d
-
SHA512
af1967e87463b2abff6bb40e04d29465cf07b0a92deaa96605d250a9f4697095b9ac0b5e18baac670b21a703f9d68c7dace8f0e5b823dd00d37c1a16d1f94b9e
-
SSDEEP
12288:8U+9H3900EJqrekLEyTYQcDL/TNuUCziP6VFGO5lrEaKYNtcBvAuvlee2NCFbLkV:8U+9XNrenyktDLdYNtcdvQNC9wHAP5cF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZyuL.ioAHK.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 ZyuL.ioAHK.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2220 ZyuL.ioAHK.exe