Overview
overview
10Static
static
10Zara+Perm_...ky.exe
windows7-x64
3Zara+Perm_...ky.exe
windows10-2004-x64
4Zara+Perm_...ms.dll
windows7-x64
1Zara+Perm_...ms.dll
windows10-2004-x64
1Zara+Perm_...I2.dll
windows7-x64
1Zara+Perm_...I2.dll
windows10-2004-x64
1Zara+Perm_...ky.exe
windows7-x64
10Zara+Perm_...ky.exe
windows10-2004-x64
10Analysis
-
max time kernel
22s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 14:49
Behavioral task
behavioral1
Sample
Zara+Perm_new_fix/._cache_Lucky.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Zara+Perm_new_fix/._cache_Lucky.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
Zara+Perm_new_fix/Bunifu.UI.WinForms.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Zara+Perm_new_fix/Bunifu.UI.WinForms.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
Zara+Perm_new_fix/Guna.UI2.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Zara+Perm_new_fix/Guna.UI2.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
Zara+Perm_new_fix/Lucky.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Zara+Perm_new_fix/Lucky.exe
Resource
win10v2004-20250129-en
General
-
Target
Zara+Perm_new_fix/._cache_Lucky.exe
-
Size
73KB
-
MD5
bda7e3ae3b6d42fd2ae7fc727ed53cd7
-
SHA1
6c43aad175ab5754ea0aecede688c5ae87f946ba
-
SHA256
2c54752c7dfc19485fa1e2f5193de64a74d61bcc485ffa33df95bff2b5fd8285
-
SHA512
b9a11e2aba64bf29452010bde4035f3b3196b32da82392f60d56c76b133ca574fdfe51d0e1ba342e5678c9e403323fb292ee51523eb1637d13a1077134036722
-
SSDEEP
1536:xRQT4CM+vza9t1LTtlbeK2Iu3wNsS8W/1WDkB8l/qfWO:3QsDSO9fLTLbeK2ISwSHy1WDkBSgWO
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\IME\1.sys ._cache_Lucky.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Lucky.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Lucky.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Lucky.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Lucky.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 ._cache_Lucky.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Lucky.exe"C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Lucky.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1916