Analysis
-
max time kernel
18s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
Zorara Key Bypasser V1.2(made by flyx).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Zorara Key Bypasser V1.2(made by flyx).exe
Resource
win10v2004-20241007-en
General
-
Target
Zorara Key Bypasser V1.2(made by flyx).exe
-
Size
91KB
-
MD5
34d9ebb82a36eaa00cf845f96ce6daa5
-
SHA1
0277484403ba5040bcb5dd6194f5894baf18cf4f
-
SHA256
7e25275c2a1af877b382cacac29752abb448b25dad9d012a2d140624a858bb0c
-
SHA512
9ee005d992803ad89bf33f5350578543890f24afd256e00cf3f371c99621d20bd85ef1888079ba65cd9cb95a15c0bb9b4f025dc0998023e3c86ffeffb7d6d3e9
-
SSDEEP
1536:f7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfnwo5O+:T7DhdC6kzWypvaQ0FxyNTBfnJL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zorara Key Bypasser V1.2(made by flyx).exe -
Delays execution with timeout.exe 4 IoCs
pid Process 1988 timeout.exe 2384 timeout.exe 3004 timeout.exe 2052 timeout.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2656 2084 Zorara Key Bypasser V1.2(made by flyx).exe 31 PID 2084 wrote to memory of 2656 2084 Zorara Key Bypasser V1.2(made by flyx).exe 31 PID 2084 wrote to memory of 2656 2084 Zorara Key Bypasser V1.2(made by flyx).exe 31 PID 2084 wrote to memory of 2656 2084 Zorara Key Bypasser V1.2(made by flyx).exe 31 PID 2656 wrote to memory of 1988 2656 cmd.exe 32 PID 2656 wrote to memory of 1988 2656 cmd.exe 32 PID 2656 wrote to memory of 1988 2656 cmd.exe 32 PID 2656 wrote to memory of 2384 2656 cmd.exe 33 PID 2656 wrote to memory of 2384 2656 cmd.exe 33 PID 2656 wrote to memory of 2384 2656 cmd.exe 33 PID 2656 wrote to memory of 3004 2656 cmd.exe 34 PID 2656 wrote to memory of 3004 2656 cmd.exe 34 PID 2656 wrote to memory of 3004 2656 cmd.exe 34 PID 2656 wrote to memory of 2052 2656 cmd.exe 35 PID 2656 wrote to memory of 2052 2656 cmd.exe 35 PID 2656 wrote to memory of 2052 2656 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe"C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\85C3.tmp\85C4.tmp\85C5.bat "C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1988
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2384
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3004
-
-
C:\Windows\system32\timeout.exetimeout /t 43⤵
- Delays execution with timeout.exe
PID:2052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD573cc5660fe4c16c3587d3a55964c9d8d
SHA19c2a5bdc3660df8bb5e53dbedb39a5f45b83bcef
SHA256e4ba4053d9c1757cd71eaf73e38ac840458d67a5142a4076b56f0522190ec8f3
SHA512a17243caea28c2e6fbae4f5fc71ed72a1df0ec65401f02a1f85cb1a736860b9b59408dfdd8a018a1542915332feaed5da9a5c607c6310e19a51f274044dbdc9f