Overview
overview
10Static
static
3lossless s...ck.bat
windows11-21h2-x64
10lossless s...ck.bat
windows11-21h2-x64
10lossless s...an.vbs
windows11-21h2-x64
3lossless s...AR.exe
windows11-21h2-x64
3lossless s...RU.ps1
windows11-21h2-x64
3lossless s...UK.ps1
windows11-21h2-x64
10lossless s...an.vbs
windows11-21h2-x64
3lossless s...ss.dll
windows11-21h2-x64
1lossless s...ng.exe
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1lossless s...es.dll
windows11-21h2-x64
1Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/01/2025, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
lossless scaling/Crack.bat
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
lossless scaling/Registration ('Crack')/Crack.bat
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
lossless scaling/Registration ('Crack')/Data/en-US/Lan.vbs
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
lossless scaling/Registration ('Crack')/Data/en-US/RAR.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
lossless scaling/Registration ('Crack')/Data/en-US/RU.ps1
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
lossless scaling/Registration ('Crack')/Data/en-US/UK.ps1
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/Lan.vbs
Resource
win11-20241023-en
Behavioral task
behavioral8
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/Lossless.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/LosslessScaling.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/ar/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/bg/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/cs/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/de/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/es-ES/LosslessScaling.resources.dll
Resource
win11-20241023-en
Behavioral task
behavioral15
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/fa/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/fr/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/he/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/hr/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/id/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/it/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/ja/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/ko/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/lt/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/pl/LosslessScaling.resources.dll
Resource
win11-20241023-en
Behavioral task
behavioral25
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/pt-BR/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/pt-PT/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/ro/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/sr-Latn/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/tr/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/uk/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/vi/LosslessScaling.resources.dll
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
lossless scaling/Registration ('Crack')/Data/uk-UA/zh-CN/LosslessScaling.resources.dll
Resource
win11-20241007-en
General
-
Target
lossless scaling/Registration ('Crack')/Crack.bat
-
Size
14KB
-
MD5
8bfba49d351559387e43cb66ffeaafc1
-
SHA1
2a237525a6d906e264b36bb11bdd2d6b997b0a64
-
SHA256
6be519bd1dcfbfcf4d192d1b8df90434f3fad30792cc817ace43bbec5314f232
-
SHA512
5ff2536f48dea56d6f1b736875ce88858bd6c4b4b68ae89ce9690b11f9983b4b41882757c6f8f4615e84c1bf782550c82fad1136779d076d198b7360dfdef41a
-
SSDEEP
384:re23N2+xMcYjLnGHXZYGJ+SbnnGxJ46QLGpbQusYrMTVOJwC9hc+tmsWSYd5Ajdn:re23N2+xMcYjTGHXZYGJ+SbnnGxJ46QC
Malware Config
Extracted
asyncrat
A 14
Default
3x3.casacam.net:303
MaterxMutex_Egypt2
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
pid Process 1588 powershell.exe 4972 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 972 RAR.exe 980 Font.exe 3372 esentutl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1588 set thread context of 2824 1588 powershell.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Font.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings powershell.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2824 aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4972 powershell.exe 4972 powershell.exe 4972 powershell.exe 1588 powershell.exe 1588 powershell.exe 3372 esentutl.exe 3372 esentutl.exe 2824 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 3372 esentutl.exe Token: SeDebugPrivilege 2824 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2824 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3504 wrote to memory of 1392 3504 cmd.exe 78 PID 3504 wrote to memory of 1392 3504 cmd.exe 78 PID 1392 wrote to memory of 4520 1392 net.exe 79 PID 1392 wrote to memory of 4520 1392 net.exe 79 PID 3504 wrote to memory of 3548 3504 cmd.exe 80 PID 3504 wrote to memory of 3548 3504 cmd.exe 80 PID 3504 wrote to memory of 4972 3504 cmd.exe 81 PID 3504 wrote to memory of 4972 3504 cmd.exe 81 PID 4972 wrote to memory of 4812 4972 powershell.exe 82 PID 4972 wrote to memory of 4812 4972 powershell.exe 82 PID 4972 wrote to memory of 972 4972 powershell.exe 83 PID 4972 wrote to memory of 972 4972 powershell.exe 83 PID 4972 wrote to memory of 980 4972 powershell.exe 85 PID 4972 wrote to memory of 980 4972 powershell.exe 85 PID 4972 wrote to memory of 980 4972 powershell.exe 85 PID 4972 wrote to memory of 720 4972 powershell.exe 86 PID 4972 wrote to memory of 720 4972 powershell.exe 86 PID 4972 wrote to memory of 1504 4972 powershell.exe 87 PID 4972 wrote to memory of 1504 4972 powershell.exe 87 PID 720 wrote to memory of 1588 720 WScript.exe 88 PID 720 wrote to memory of 1588 720 WScript.exe 88 PID 3504 wrote to memory of 5004 3504 cmd.exe 90 PID 3504 wrote to memory of 5004 3504 cmd.exe 90 PID 980 wrote to memory of 3372 980 Font.exe 91 PID 980 wrote to memory of 3372 980 Font.exe 91 PID 1588 wrote to memory of 2824 1588 powershell.exe 92 PID 1588 wrote to memory of 2824 1588 powershell.exe 92 PID 1588 wrote to memory of 2824 1588 powershell.exe 92 PID 1588 wrote to memory of 2824 1588 powershell.exe 92 PID 1588 wrote to memory of 2824 1588 powershell.exe 92 PID 1588 wrote to memory of 2824 1588 powershell.exe 92 PID 1588 wrote to memory of 2824 1588 powershell.exe 92 PID 1588 wrote to memory of 2824 1588 powershell.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\lossless scaling\Registration ('Crack')\Crack.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:4520
-
-
-
C:\Windows\system32\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\lossless scaling\Registration ('Crack')\\Data\en-US" "C:\Users\Public\IObitUnlocker" /E /H /C /I /Y2⤵PID:3548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "& {Get-Content 'C:\Users\Public\IObitUnlocker\UK.dll' | Out-String | Invoke-Expression}"2⤵
- UAC bypass
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /query /tn administrator3⤵PID:4812
-
-
C:\Users\Public\IObitUnlocker\RAR.exe"C:\Users\Public\IObitUnlocker\RAR.exe" x -pahmad..123 -o+ C:\Users\Public\IObitUnlocker\EN.dll C:\Users\Public\IObitUnlocker\3⤵
- Executes dropped EXE
PID:972
-
-
C:\Users\Public\IObitUnlocker\BR\Font.exe"C:\Users\Public\IObitUnlocker\BR\Font.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\IObitUnlocker\Loader.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /query /tn administrator3⤵PID:1504
-
-
-
C:\Windows\system32\mode.commode con: cols=80 lines=102⤵PID:5004
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD522e796539d05c5390c21787da1fb4c2b
SHA155320ebdedd3069b2aaf1a258462600d9ef53a58
SHA2567c6c09f48f03421430d707d27632810414e5e2bf2eecd5eb675fecf8b45a9a92
SHA512d9cc0cb22df56db72a71504bb3ebc36697e0a7a1d2869e0e0ab61349bda603298fe6c667737b79bf2235314fb49b883ba4c5f137d002e273e79391038ecf9c09
-
Filesize
1KB
MD5f1dd882e18628bc3173525f100778a5a
SHA16e108181c7614325af250bc9de0e65731d2b4df6
SHA25662d61cb4ea1054e83e384180c604d14304d8baebef3a97605fe4ab1edef8423c
SHA5127f4b45e29e39d07e78b0f63b744a5ae9d49036393c58710662248932103b3fde1fba9a04077c6e3ddbd800a12ccc1c9b4aba357f299122dcea369862913b7be1
-
Filesize
156KB
MD56981d94fbcc31ca50551300f5b4a96a3
SHA1e38b3a74f2951f5480fb67acc75d41f3e2b4f70e
SHA2568c19a90379611efc39c3e96529de2e82a99e3e049d36ef6563ec975836e47811
SHA512b94e87c641009ab8206c91ede3e35ab3b65a94fa3be5f4ce7c8a2b17af018f03801086c850427f4d51f4867a3d0a85aaf58ece9fd7f6a36f68df29da430c8d5d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
434KB
MD568c9ee084cc409309b116ec6aea890a8
SHA1efd6aab18a08a63b146ad587d1fa08e0bb19bebc
SHA256ef2cbfdfdd874c6c3ea11223b369fbd5f155d20c680ae1e59ac74e6f1bb74a9d
SHA5129809477d42df7bbbaea04da5eda4a4f2ae3114b33541a4efd7003bab339d1c6ddf2f9a61b2ba781c0f5de82b030859c8ac76cbe697b296046227c1dc6b547a25
-
Filesize
181KB
MD5a435e2fb659a3596b017f556b53fa09d
SHA1c9ab6229bf239edac73593e0ffb53c1d9bb21686
SHA256e7f03b61cff5526877ea3f26f613caf5dbdf9006d49b98c906de3051067d7512
SHA512aa3fa16420e66bcdff349ba66791d7849a67d2ae720fdca4b3674ce2a8bffd7a1caae1a306c6533446950b0f8798d6cf7e37ec78ea199252028870fbc742f495
-
Filesize
308B
MD52993b76e0b0ba015caf654881638a0c0
SHA17fbd5f28fb2f6f948cbeb3c4dd5b0672bdfe4bcd
SHA2560e131f595ef67c160de9727d9a92a84b50393e66dd242f330736b916e1bf20a3
SHA512a61e0e7f92f0d78c27939ba21bdda6ff97503adc44e42a4b7eab3c4c1bea8acad4517b90db3430cabc237c2db01e60ab3a2a78e237ae01a896bd09aabba067cb
-
Filesize
629KB
MD5d3e9f98155c0faab869ccc74fb5e8a1e
SHA18e4feaad1d43306fdd8aa66efa443bca7afde710
SHA2563e0fdb5c40336482dacef3496116053d7772a51720900141b3c6f35c6e9b351b
SHA5122760c139ef276f406770675d89fb667f3369a9e1943a6eff2c18f391114018ad6fdce9daf0b499b18081ef22243ef04d74ff21cbd346eb31a1ddbcb79756697d
-
Filesize
457KB
MD5dd3f962ccc2f5b5f34700307e35138f8
SHA190d80df0ef716260a7d4ed466cf40caf966f0969
SHA256e273b5a8cf3d3d37ff676251aa4f41e3726b45b3280f8bf84bf618ca05cca9bb
SHA512619fba6cd9b8aae26db23f9cbd6db4870f969abd198d3fe8551703a1e2c46a9d1fd861f7b9462d82581b322209795c1e00762ebe31e0a1383c8a10df8e4a9eae
-
Filesize
5KB
MD53fffc04611766c3d49b9f0b74752a2b5
SHA1c70e6e3b2cd315e900f6dfdd5828cbf75b903fe5
SHA2567537dd03a875384bc79a7a21811e06ca97de3571631fc20b4b86b26baaafad9d
SHA5123ded3c5712f93eaa75fc9fe9469a02ece5996b6574d63b7b3a5db86db74762631e35aacae519ea3d23862bdaffab5e786696eeb812b0d1ce7f14b78f4539b4d8