Analysis Overview
SHA256
e19a4a36276e501ee70068b365480f122b3b0e96cba020ca7def1322a716dbe5
Threat Level: Known bad
The file Unlock all.exe was found to be: Known bad.
Malicious Activity Summary
Async RAT payload
Asyncrat family
AsyncRat
Unsigned PE
Suspicious use of SetWindowsHookEx
Modifies registry class
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-06 15:35
Signatures
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Asyncrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-06 15:35
Reported
2024-06-06 15:38
Platform
win11-20240508-en
Max time kernel
146s
Max time network
149s
Command Line
Signatures
AsyncRat
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\Unlock all.exe
"C:\Users\Admin\AppData\Local\Temp\Unlock all.exe"
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
Network
| Country | Destination | Domain | Proto |
| GB | 184.28.176.104:443 | tcp | |
| US | 20.42.65.85:443 | browser.pipe.aria.microsoft.com | tcp |
| US | 8.8.8.8:53 | 222.197.79.204.in-addr.arpa | udp |
| BE | 2.17.107.114:443 | r.bing.com | tcp |
| BE | 2.17.107.114:443 | r.bing.com | tcp |
| BE | 2.17.107.114:443 | r.bing.com | tcp |
| BE | 2.17.107.114:443 | r.bing.com | tcp |
| BE | 2.17.107.114:443 | r.bing.com | tcp |
| BE | 2.17.107.114:443 | r.bing.com | tcp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 145.83.221.88.in-addr.arpa | udp |
| US | 13.107.253.64:443 | fp-afd-nocache-ccp.azureedge.net | tcp |
| US | 152.199.19.161:443 | fp-vs.azureedge.net | tcp |
| SE | 92.123.135.95:443 | ow1.res.office365.com | tcp |
Files
memory/1000-1-0x00007FFD081D3000-0x00007FFD081D5000-memory.dmp
memory/1000-0-0x0000000000D30000-0x0000000000D46000-memory.dmp
memory/1000-2-0x00007FFD081D0000-0x00007FFD08C92000-memory.dmp
memory/1000-3-0x00007FFD081D0000-0x00007FFD08C92000-memory.dmp
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
| MD5 | a71ab244d565671f741686cb2c5ed11b |
| SHA1 | b6e766a85f1f878d512f752df2dd4873971755e2 |
| SHA256 | 06a5716962f3b50a8aa3acd30e33d6c75664465c3d795196ad6dce5e33a80faa |
| SHA512 | 0826c8e52b0f5dbcbda745f06390fd59ce9eee8e0e845cdb007f4a97b19065f2544ca63226b34d361adf9e1cf26644672abfe5dcfd75651cd2aeb1ae27f16f84 |
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
| MD5 | 44408d8bcd8c4ffe97a60ddf16281885 |
| SHA1 | ab8773e27c92a24e12969dd4dc6bb8422f15d589 |
| SHA256 | a6047cddc1126bc128da907db3550e725647640752e6a5c71ce9445735a9e83a |
| SHA512 | ff4e382bd3d00515f57bb735c6ffce35afd9f63a8def25ba18f722e618ac9f107e31e0ab44ff7758394e9ca7f52bc67b0ba70710c4dfd6afdb470a34093a35c6 |