Static task
static1
Behavioral task
behavioral1
Sample
Unlocker.exe
Resource
win7-20231215-en
General
-
Target
Unlocker.exe
-
Size
122KB
-
MD5
0a77f732624155a215f5ca54df9b2930
-
SHA1
172bdf71343dd6544cfbe04abbc3dec4535f7d84
-
SHA256
a0b651038c4301f70e4aea506eb90edc584a5c4ca46880c7dc2ae5eafa6dc506
-
SHA512
6482c9fc3b5ff9d5798deb9965b4dfab9ba62b889e921011696f29dd96b813194a59f76a52a88fa4962317c6a43a21122c857e4ca80c6c4360c2cee544117352
-
SSDEEP
1536:QjL8UYqusRZHN+R6iJBf232Qxl1D5ljFerDUF7TGMvB+xpgGfGlbPMcpEkAEAG+L://sRZt+R6+232QLADzMvYonfgQ/Y39
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Unlocker.exe
Files
-
Unlocker.exe.exe windows:4 windows x64 arch:x64
e8f4d104ba03c60ae9f3327e0e3c6f36
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
psapi
EnumProcessModules
GetModuleBaseNameW
GetModuleFileNameExW
comctl32
ImageList_Create
InitCommonControlsEx
ImageList_SetBkColor
ImageList_ReplaceIcon
ws2_32
recv
send
connect
htons
gethostbyname
socket
WSAStartup
shlwapi
StrStrA
PathRemoveExtensionW
PathStripPathW
SHDeleteKeyA
PathSkipRootW
StrToIntA
PathStripToRootW
PathRemoveFileSpecW
wvnsprintfA
PathFindExtensionW
StrStrW
PathIsDirectoryW
kernel32
Module32FirstW
GetModuleFileNameW
CreateToolhelp32Snapshot
Module32NextW
CreateThread
ExitProcess
CreateFileA
QueryDosDeviceA
Process32NextW
lstrcmpiW
GetCommandLineW
lstrlenW
GetFileAttributesW
DeleteFileW
RemoveDirectoryW
SetFileAttributesW
GetShortPathNameW
lstrcpyW
MoveFileW
GlobalFree
GlobalUnlock
GlobalLock
GlobalReAlloc
GlobalAlloc
FindClose
FindNextFileW
lstrcmpW
FindFirstFileW
GetModuleHandleA
CloseHandle
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
lstrcpyA
GetProcAddress
WriteProcessMemory
VirtualAllocEx
OpenProcess
LocalFree
LoadLibraryA
ReadFile
lstrcmpA
GetLongPathNameW
CreateFileW
WriteFile
MultiByteToWideChar
GetVersionExA
lstrlenA
MoveFileExW
DuplicateHandle
GetCurrentProcess
TerminateProcess
Process32FirstW
user32
SetWindowTextA
SetDlgItemTextW
SetDlgItemTextA
DestroyIcon
LoadIconA
GetDlgItemTextW
DialogBoxParamA
SendDlgItemMessageA
UpdateWindow
InvalidateRect
PostMessageA
MoveWindow
GetClientRect
ClientToScreen
wsprintfA
CharUpperW
CallWindowProcA
DestroyCursor
SetWindowLongPtrA
SetCapture
SetCursor
LoadCursorA
PtInRect
ReleaseCapture
GetSystemMetrics
GetWindowRect
GetWindowPlacement
EndDialog
SetWindowPlacement
GetDC
DrawTextA
MessageBoxA
CreateDialogParamA
GetDlgItem
SendMessageA
ShowWindow
TranslateMessage
DispatchMessageA
PeekMessageA
DestroyWindow
wsprintfW
GetSysColor
gdi32
GetObjectA
CreateFontIndirectA
SelectObject
comdlg32
GetSaveFileNameW
advapi32
SetNamedSecurityInfoW
RegSetValueExW
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
FreeSid
SetEntriesInAclA
AllocateAndInitializeSid
RegSetValueExA
shell32
CommandLineToArgvW
ShellExecuteA
ExtractIconExW
ShellExecuteExW
SHGetMalloc
SHBrowseForFolderW
SHFileOperationW
SHCreateDirectoryExW
SHGetPathFromIDListW
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ