Analysis
-
max time kernel
8s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
Zorara Key Bypasser V1.2(made by flyx).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Zorara Key Bypasser V1.2(made by flyx).exe
Resource
win10v2004-20241007-en
General
-
Target
Zorara Key Bypasser V1.2(made by flyx).exe
-
Size
91KB
-
MD5
34d9ebb82a36eaa00cf845f96ce6daa5
-
SHA1
0277484403ba5040bcb5dd6194f5894baf18cf4f
-
SHA256
7e25275c2a1af877b382cacac29752abb448b25dad9d012a2d140624a858bb0c
-
SHA512
9ee005d992803ad89bf33f5350578543890f24afd256e00cf3f371c99621d20bd85ef1888079ba65cd9cb95a15c0bb9b4f025dc0998023e3c86ffeffb7d6d3e9
-
SSDEEP
1536:f7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfnwo5O+:T7DhdC6kzWypvaQ0FxyNTBfnJL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zorara Key Bypasser V1.2(made by flyx).exe -
Delays execution with timeout.exe 4 IoCs
pid Process 3148 timeout.exe 3752 timeout.exe 3100 timeout.exe 4028 timeout.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4736 1144 Zorara Key Bypasser V1.2(made by flyx).exe 84 PID 1144 wrote to memory of 4736 1144 Zorara Key Bypasser V1.2(made by flyx).exe 84 PID 4736 wrote to memory of 3148 4736 cmd.exe 85 PID 4736 wrote to memory of 3148 4736 cmd.exe 85 PID 4736 wrote to memory of 3752 4736 cmd.exe 89 PID 4736 wrote to memory of 3752 4736 cmd.exe 89 PID 4736 wrote to memory of 3100 4736 cmd.exe 90 PID 4736 wrote to memory of 3100 4736 cmd.exe 90 PID 4736 wrote to memory of 4028 4736 cmd.exe 91 PID 4736 wrote to memory of 4028 4736 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe"C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7762.tmp\7763.tmp\7764.bat "C:\Users\Admin\AppData\Local\Temp\Zorara Key Bypasser V1.2(made by flyx).exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:3148
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3752
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3100
-
-
C:\Windows\system32\timeout.exetimeout /t 43⤵
- Delays execution with timeout.exe
PID:4028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD573cc5660fe4c16c3587d3a55964c9d8d
SHA19c2a5bdc3660df8bb5e53dbedb39a5f45b83bcef
SHA256e4ba4053d9c1757cd71eaf73e38ac840458d67a5142a4076b56f0522190ec8f3
SHA512a17243caea28c2e6fbae4f5fc71ed72a1df0ec65401f02a1f85cb1a736860b9b59408dfdd8a018a1542915332feaed5da9a5c607c6310e19a51f274044dbdc9f