Overview
overview
10Static
static
3IObitUnloc...er.dll
windows7-x64
3IObitUnloc...er.dll
windows10-2004-x64
3IObitUnloc...er.exe
windows7-x64
7IObitUnloc...er.exe
windows10-2004-x64
7IObitUnloc...er.sys
windows7-x64
1IObitUnloc...er.sys
windows10-2004-x64
1IObitUnloc...er.vbs
windows7-x64
3IObitUnloc...er.vbs
windows10-2004-x64
7IObitUnloc...rt.ps1
windows7-x64
10IObitUnloc...rt.ps1
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
IObitUnlocker/IObitUnlocker.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
IObitUnlocker/IObitUnlocker.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
IObitUnlocker/IObitUnlocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
IObitUnlocker/IObitUnlocker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
IObitUnlocker/IObitUnlocker.sys
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
IObitUnlocker/IObitUnlocker.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
IObitUnlocker/Loader.vbs
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
IObitUnlocker/Loader.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
IObitUnlocker/Report.ps1
Resource
win7-20240903-en
General
-
Target
IObitUnlocker/Loader.vbs
-
Size
155B
-
MD5
3781eced7bdb501738a60e3f926ae42a
-
SHA1
c65ca3f8ee5fd4f6dad689cc43bde301a451ec2c
-
SHA256
b343abd677e362c3ae1e573bf7c43bf476a8e97e67d7758328a51f30daaf4d95
-
SHA512
854dc0f2b8d2d4bcb7bb736d2a9c7f70132d069aedffb0e0952fa2d3d57992ae8cda02ea49214f40f4a05b30ac6fea145901fe6c72f257b43c461be138ce6971
Malware Config
Signatures
-
pid Process 2088 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2088 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2088 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 292 wrote to memory of 2088 292 WScript.exe 30 PID 292 wrote to memory of 2088 292 WScript.exe 30 PID 292 wrote to memory of 2088 292 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IObitUnlocker\Loader.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-