Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13-10-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
Zorara Key Bypasser V1.2(made by flyx).exe
Resource
win10-20240404-en
General
-
Target
Zorara Key Bypasser V1.2(made by flyx).exe
-
Size
91KB
-
MD5
34d9ebb82a36eaa00cf845f96ce6daa5
-
SHA1
0277484403ba5040bcb5dd6194f5894baf18cf4f
-
SHA256
7e25275c2a1af877b382cacac29752abb448b25dad9d012a2d140624a858bb0c
-
SHA512
9ee005d992803ad89bf33f5350578543890f24afd256e00cf3f371c99621d20bd85ef1888079ba65cd9cb95a15c0bb9b4f025dc0998023e3c86ffeffb7d6d3e9
-
SSDEEP
1536:f7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfnwo5O+:T7DhdC6kzWypvaQ0FxyNTBfnJL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zorara Key Bypasser V1.2(made by flyx).exe -
Delays execution with timeout.exe 4 IoCs
pid Process 4608 timeout.exe 3900 timeout.exe 32 timeout.exe 204 timeout.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1396 wrote to memory of 4044 1396 Zorara Key Bypasser V1.2(made by flyx).exe 75 PID 1396 wrote to memory of 4044 1396 Zorara Key Bypasser V1.2(made by flyx).exe 75 PID 4044 wrote to memory of 4608 4044 cmd.exe 76 PID 4044 wrote to memory of 4608 4044 cmd.exe 76 PID 4044 wrote to memory of 3900 4044 cmd.exe 77 PID 4044 wrote to memory of 3900 4044 cmd.exe 77 PID 4044 wrote to memory of 32 4044 cmd.exe 78 PID 4044 wrote to memory of 32 4044 cmd.exe 78 PID 4044 wrote to memory of 204 4044 cmd.exe 79 PID 4044 wrote to memory of 204 4044 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe"C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\63CB.tmp\63CC.tmp\63CD.bat "C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:4608
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3900
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:32
-
-
C:\Windows\system32\timeout.exetimeout /t 43⤵
- Delays execution with timeout.exe
PID:204
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD573cc5660fe4c16c3587d3a55964c9d8d
SHA19c2a5bdc3660df8bb5e53dbedb39a5f45b83bcef
SHA256e4ba4053d9c1757cd71eaf73e38ac840458d67a5142a4076b56f0522190ec8f3
SHA512a17243caea28c2e6fbae4f5fc71ed72a1df0ec65401f02a1f85cb1a736860b9b59408dfdd8a018a1542915332feaed5da9a5c607c6310e19a51f274044dbdc9f