General
-
Target
Unlocker_2.exe
-
Size
3.4MB
-
Sample
240522-fhfd6acf4x
-
MD5
9b25d73c3a94e37f07fd23154e004c8b
-
SHA1
8ef59559d03711ca7f2185e98039aecdb11e6162
-
SHA256
e65c8c69d128676f200db5ae91937aa4152fd93fb66e8098972ce33f3f029226
-
SHA512
c5c3cd962290dff48cdadf98e249577c762bac978dc138fd1e9fc00ea02e504e0f632a6b04db56f3d0224a3a8cdf0ba12ead2983d52c9ecde354f75eae717e92
-
SSDEEP
49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxj3GT0DZ8oNZ+O93+xaj:Mxx9NUFkQx753uWuCyyxaCruQ
Behavioral task
behavioral1
Sample
Unlocker_2.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Unlocker_2.exe
-
Size
3.4MB
-
MD5
9b25d73c3a94e37f07fd23154e004c8b
-
SHA1
8ef59559d03711ca7f2185e98039aecdb11e6162
-
SHA256
e65c8c69d128676f200db5ae91937aa4152fd93fb66e8098972ce33f3f029226
-
SHA512
c5c3cd962290dff48cdadf98e249577c762bac978dc138fd1e9fc00ea02e504e0f632a6b04db56f3d0224a3a8cdf0ba12ead2983d52c9ecde354f75eae717e92
-
SSDEEP
49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxj3GT0DZ8oNZ+O93+xaj:Mxx9NUFkQx753uWuCyyxaCruQ
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Modify Registry
2Virtualization/Sandbox Evasion
1