Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-12-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
IObitUnlocker/IObitUnlocker.dll
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
IObitUnlocker/IObitUnlocker.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
IObitUnlocker/IObitUnlocker.sys
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
IObitUnlocker/Loader.vbs
Resource
win11-20241023-en
General
-
Target
IObitUnlocker/IObitUnlocker.dll
-
Size
71KB
-
MD5
e1a4327af3cd8ca866996f472f0ff93a
-
SHA1
cfea8426ef8fab4136055401152821a19f908d45
-
SHA256
5f0bc7d75f32981e0e704c2217ed423c9a355f19515a1603103cc55cf9d3b901
-
SHA512
745f1ec495869d2fa2722ecadcaa27ec1f005742c69110802e9e1d7600d680d077e9762a400799e38003a4671a2590ecf1c480c2e7586039ebcce6ed36662280
-
SSDEEP
768:BxKNeWSsRLrVmxJG0Yv3uVKvtbQuIkuU+W2oM/hIYFHxfAKfxKn2DEDSUwQNyuJO:ugr2Lr071OUKFOk12oilFHyKyXMuJwIG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4404 2268 rundll32.exe 77 PID 2268 wrote to memory of 4404 2268 rundll32.exe 77 PID 2268 wrote to memory of 4404 2268 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\IObitUnlocker\IObitUnlocker.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\IObitUnlocker\IObitUnlocker.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4404
-