Analysis

  • max time kernel
    119s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 19:29

General

  • Target

    IObitUnlocker/Report.ps1

  • Size

    457KB

  • MD5

    40e7960be05c7c1f64d7157235171ce6

  • SHA1

    79df02a409ba3721415e3d2755e467c10f9c698e

  • SHA256

    5db5a2e88209a2e2901c8e9e74ad794be31c035a583ec62e73b5e8e22d5df0f0

  • SHA512

    6801ed81e4c87b1328906befb506d598ea3eeaec3a835744b3a681104efca02d92db5228189b9859741a380ec54fdf98048f37d690396cfb9b2a7cabe487e2e9

  • SSDEEP

    768:FpcM++5necrPLkSqmwEepmixWhkPsc14VcKQ:w

Malware Config

Extracted

Family

asyncrat

Version

A 14

Botnet

Default

C2

Egypt2.camdvr.org:301

Mutex

MaterxMutex_Egypt2

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Start PowerShell.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\IObitUnlocker\Report.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe"' & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe"'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe
            "C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2912
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {CCB3B997-DEC0-46AA-956C-8CC76BB33D7B} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:8784
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:8816
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {1AB46C91-B614-41DE-AFD1-686C96F2FC1C} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:9004
    • C:\Users\Admin\AppData\Roaming\Flags\HashValue.exe
      C:\Users\Admin\AppData\Roaming\Flags\HashValue.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:9040
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
        3⤵
          PID:8072
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
          3⤵
            PID:8096
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
            3⤵
              PID:8104
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
              3⤵
                PID:8120
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                3⤵
                  PID:8140
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                  3⤵
                    PID:8148
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                    3⤵
                      PID:8164
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                      3⤵
                        PID:8180
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                        3⤵
                          PID:8188
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                          3⤵
                            PID:8200

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\CabAC29.tmp

                        Filesize

                        70KB

                        MD5

                        49aebf8cbd62d92ac215b2923fb1b9f5

                        SHA1

                        1723be06719828dda65ad804298d0431f6aff976

                        SHA256

                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                        SHA512

                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                      • C:\Users\Admin\AppData\Local\Temp\TarC2F6.tmp

                        Filesize

                        181KB

                        MD5

                        4ea6026cf93ec6338144661bf1202cd1

                        SHA1

                        a1dec9044f750ad887935a01430bf49322fbdcb7

                        SHA256

                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                        SHA512

                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                      • C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe

                        Filesize

                        636KB

                        MD5

                        b106cc7d66b582858c053e3df0b2d8b2

                        SHA1

                        211f794befc4546bd7a9858e945e008fdeb55b28

                        SHA256

                        c9f58cd90b70ab645546634648de35339786ae3fa14bc8e975c5400a85307ba8

                        SHA512

                        bf11c3b677cab7ce7cca1aac6eeaeb35bd08d990d55321dd90a022b232c00c6c2562714ee4d8331824c38dd9bc84c111c8065d8e217443fb13175d59dedcb3c0

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        bfbda3a88d369d1e820f5335c415b462

                        SHA1

                        6be2ae429ae2ec3c942dcec3b06a943e7cda6572

                        SHA256

                        8adffed5e50294ca43dc4dd7dd1038f238c73f28a6175dff5937887a5a714360

                        SHA512

                        99d539a52004b2fa47e3b09e12fd767f2cfc054995bb94cdf3de004f3f9c057f70ac029d7259c4c9bc313822f2d7c6bdac76b39fa7ea5b1e0c18092c28d03ec2

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WPCLKB4NH6T5ZQ0QZALU.temp

                        Filesize

                        7KB

                        MD5

                        286d621bef1a4d29e57c0744ac10f253

                        SHA1

                        650e8b4c585ff0af924a28fcd00574ebca1df52e

                        SHA256

                        c5215bc2ee8370aaed22a0cfb1c2124e71624fd9f0a0c725955045bd48c3cb0e

                        SHA512

                        28af585798dbed1071f78ab56c897de4e85e234a0cee5f55c20186f7fca8f5878ef17e745acad941d52d292c170389e25a700bfbd015a61274708657009060b5

                      • memory/2680-26-0x000007FEF6390000-0x000007FEF6D2D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2680-5-0x000000001B510000-0x000000001B7F2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2680-9-0x000007FEF6390000-0x000007FEF6D2D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2680-10-0x000007FEF6390000-0x000007FEF6D2D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2680-11-0x000007FEF6390000-0x000007FEF6D2D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2680-12-0x000007FEF6390000-0x000007FEF6D2D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2680-13-0x0000000002AF0000-0x0000000002AFA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2680-25-0x000007FEF6390000-0x000007FEF6D2D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2680-6-0x0000000001F80000-0x0000000001F88000-memory.dmp

                        Filesize

                        32KB

                      • memory/2680-4-0x000007FEF664E000-0x000007FEF664F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2680-7-0x000007FEF6390000-0x000007FEF6D2D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2680-8-0x000007FEF6390000-0x000007FEF6D2D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2832-27-0x0000000074660000-0x0000000074D4E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/2832-16-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/2832-15-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/2832-23-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/2832-21-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/2832-24-0x000000007466E000-0x000000007466F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2832-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2832-19-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/2832-44-0x00000000004F0000-0x0000000000552000-memory.dmp

                        Filesize

                        392KB

                      • memory/2832-45-0x000000007466E000-0x000000007466F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2832-17-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/2832-14-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/2832-273-0x0000000074660000-0x0000000074D4E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/2912-113-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-91-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-125-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-123-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-121-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-119-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-117-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-115-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-111-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-109-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-107-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-105-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-103-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-99-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-97-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-95-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-93-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-81-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-89-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-87-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-85-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-83-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-79-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-77-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-75-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-101-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-72-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-73-0x0000000001090000-0x0000000001183000-memory.dmp

                        Filesize

                        972KB

                      • memory/2912-2667-0x0000000001190000-0x00000000011E6000-memory.dmp

                        Filesize

                        344KB

                      • memory/2912-2668-0x0000000000650000-0x000000000069C000-memory.dmp

                        Filesize

                        304KB

                      • memory/2912-2669-0x0000000002710000-0x0000000002764000-memory.dmp

                        Filesize

                        336KB

                      • memory/2912-71-0x0000000001090000-0x0000000001188000-memory.dmp

                        Filesize

                        992KB

                      • memory/2912-70-0x00000000011F0000-0x0000000001294000-memory.dmp

                        Filesize

                        656KB

                      • memory/8816-2676-0x000000001A230000-0x000000001A512000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/8816-2677-0x00000000009A0000-0x00000000009A8000-memory.dmp

                        Filesize

                        32KB

                      • memory/9040-2684-0x0000000000FD0000-0x0000000001074000-memory.dmp

                        Filesize

                        656KB