Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-10-2024 07:38

General

  • Target

    Zorara Key Bypasser V1.2(made by flyx).exe

  • Size

    91KB

  • MD5

    34d9ebb82a36eaa00cf845f96ce6daa5

  • SHA1

    0277484403ba5040bcb5dd6194f5894baf18cf4f

  • SHA256

    7e25275c2a1af877b382cacac29752abb448b25dad9d012a2d140624a858bb0c

  • SHA512

    9ee005d992803ad89bf33f5350578543890f24afd256e00cf3f371c99621d20bd85ef1888079ba65cd9cb95a15c0bb9b4f025dc0998023e3c86ffeffb7d6d3e9

  • SSDEEP

    1536:f7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfnwo5O+:T7DhdC6kzWypvaQ0FxyNTBfnJL

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe
    "C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\63CB.tmp\63CC.tmp\63CD.bat "C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Windows\system32\timeout.exe
        timeout /t 2
        3⤵
        • Delays execution with timeout.exe
        PID:4608
      • C:\Windows\system32\timeout.exe
        timeout /t 1
        3⤵
        • Delays execution with timeout.exe
        PID:3900
      • C:\Windows\system32\timeout.exe
        timeout /t 1
        3⤵
        • Delays execution with timeout.exe
        PID:32
      • C:\Windows\system32\timeout.exe
        timeout /t 4
        3⤵
        • Delays execution with timeout.exe
        PID:204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\63CB.tmp\63CC.tmp\63CD.bat

    Filesize

    2KB

    MD5

    73cc5660fe4c16c3587d3a55964c9d8d

    SHA1

    9c2a5bdc3660df8bb5e53dbedb39a5f45b83bcef

    SHA256

    e4ba4053d9c1757cd71eaf73e38ac840458d67a5142a4076b56f0522190ec8f3

    SHA512

    a17243caea28c2e6fbae4f5fc71ed72a1df0ec65401f02a1f85cb1a736860b9b59408dfdd8a018a1542915332feaed5da9a5c607c6310e19a51f274044dbdc9f