Analysis

  • max time kernel
    93s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 04:52

General

  • Target

    Unlocker_2.exe

  • Size

    3.4MB

  • MD5

    9b25d73c3a94e37f07fd23154e004c8b

  • SHA1

    8ef59559d03711ca7f2185e98039aecdb11e6162

  • SHA256

    e65c8c69d128676f200db5ae91937aa4152fd93fb66e8098972ce33f3f029226

  • SHA512

    c5c3cd962290dff48cdadf98e249577c762bac978dc138fd1e9fc00ea02e504e0f632a6b04db56f3d0224a3a8cdf0ba12ead2983d52c9ecde354f75eae717e92

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxj3GT0DZ8oNZ+O93+xaj:Mxx9NUFkQx753uWuCyyxaCruQ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 7 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Unlocker_2.exe
    "C:\Users\Admin\AppData\Local\Temp\Unlocker_2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4160
    • \??\c:\users\admin\appdata\local\temp\unlocker_2.exe 
      c:\users\admin\appdata\local\temp\unlocker_2.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c Color 4
        3⤵
          PID:4472
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2672
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2104
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4356
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4668
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2360
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:764
          • C:\Windows\system32\sc.exe
            sc stop HTTPDebuggerPro
            4⤵
            • Launches sc.exe
            PID:2084
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:548
          • C:\Windows\system32\taskkill.exe
            taskkill /IM HTTPDebuggerSvc.exe /F
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:652
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
          3⤵
            PID:3732
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c certutil -hashfile "c:\users\admin\appdata\local\temp\unlocker_2.exe " MD5
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1436
            • C:\Windows\system32\certutil.exe
              certutil -hashfile "c:\users\admin\appdata\local\temp\unlocker_2.exe " MD5
              4⤵
                PID:2996
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1868
              • C:\Windows\system32\taskkill.exe
                taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3424
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4944
              • C:\Windows\system32\taskkill.exe
                taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5032
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3216
              • C:\Windows\system32\taskkill.exe
                taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4764
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1020
              • C:\Windows\system32\sc.exe
                sc stop HTTPDebuggerPro
                4⤵
                • Launches sc.exe
                PID:2536
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Windows\system32\taskkill.exe
                taskkill /IM HTTPDebuggerSvc.exe /F
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2592
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
              3⤵
                PID:1660
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                3⤵
                  PID:5012
                  • C:\Windows\system32\taskkill.exe
                    taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                    4⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3980
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                  3⤵
                    PID:4904
                    • C:\Windows\system32\taskkill.exe
                      taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                      4⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1240
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                    3⤵
                      PID:1008
                      • C:\Windows\system32\taskkill.exe
                        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                        4⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4960
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                      3⤵
                        PID:4888
                        • C:\Windows\system32\sc.exe
                          sc stop HTTPDebuggerPro
                          4⤵
                          • Launches sc.exe
                          PID:3904
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                        3⤵
                          PID:4804
                          • C:\Windows\system32\taskkill.exe
                            taskkill /IM HTTPDebuggerSvc.exe /F
                            4⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1396
                        • C:\Windows\SYSTEM32\cmd.exe
                          cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                          3⤵
                            PID:2752
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                            3⤵
                              PID:3456
                              • C:\Windows\system32\taskkill.exe
                                taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                4⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3808
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                              3⤵
                                PID:1452
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                  4⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2100
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                3⤵
                                  PID:2660
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                    4⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4424
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                  3⤵
                                    PID:1212
                                    • C:\Windows\system32\sc.exe
                                      sc stop HTTPDebuggerPro
                                      4⤵
                                      • Launches sc.exe
                                      PID:1752
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                                    3⤵
                                      PID:4260
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /IM HTTPDebuggerSvc.exe /F
                                        4⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4688
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      3⤵
                                        PID:3960
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        3⤵
                                          PID:1564
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                            4⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3628
                                        • C:\Windows\SYSTEM32\cmd.exe
                                          cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                          3⤵
                                            PID:2444
                                            • C:\Windows\system32\taskkill.exe
                                              taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                              4⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4984
                                          • C:\Windows\SYSTEM32\cmd.exe
                                            cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                            3⤵
                                              PID:864
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:512
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                              3⤵
                                                PID:1912
                                                • C:\Windows\system32\sc.exe
                                                  sc stop HTTPDebuggerPro
                                                  4⤵
                                                  • Launches sc.exe
                                                  PID:224
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                                                3⤵
                                                  PID:3996
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /IM HTTPDebuggerSvc.exe /F
                                                    4⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4300
                                                • C:\Windows\SYSTEM32\cmd.exe
                                                  cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                  3⤵
                                                    PID:1780
                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                    cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                    3⤵
                                                      PID:2708
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                        4⤵
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1128
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                      3⤵
                                                        PID:396
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                          4⤵
                                                          • Kills process with taskkill
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2996
                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                        cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                        3⤵
                                                          PID:1000
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                            4⤵
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2420
                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                          cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                          3⤵
                                                            PID:2960
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop HTTPDebuggerPro
                                                              4⤵
                                                              • Launches sc.exe
                                                              PID:3600
                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                            cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                                                            3⤵
                                                              PID:2788
                                                              • C:\Windows\system32\taskkill.exe
                                                                taskkill /IM HTTPDebuggerSvc.exe /F
                                                                4⤵
                                                                • Kills process with taskkill
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4864
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                              3⤵
                                                                PID:2728
                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                                3⤵
                                                                  PID:1616
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                                    4⤵
                                                                    • Kills process with taskkill
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1660
                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                  cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                                  3⤵
                                                                    PID:4032
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                                      4⤵
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3788
                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                    cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                    3⤵
                                                                      PID:1640
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                        4⤵
                                                                        • Kills process with taskkill
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3956
                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                      cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                                      3⤵
                                                                        PID:1840
                                                                        • C:\Windows\system32\sc.exe
                                                                          sc stop HTTPDebuggerPro
                                                                          4⤵
                                                                          • Launches sc.exe
                                                                          PID:2484
                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                        cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                                                                        3⤵
                                                                          PID:4368
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill /IM HTTPDebuggerSvc.exe /F
                                                                            4⤵
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1724
                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                          cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                                          3⤵
                                                                            PID:2232
                                                                        • C:\Windows\Resources\Themes\icsys.icn.exe
                                                                          C:\Windows\Resources\Themes\icsys.icn.exe
                                                                          2⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Checks whether UAC is enabled
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • Drops file in Windows directory
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:2448
                                                                          • \??\c:\windows\resources\themes\explorer.exe
                                                                            c:\windows\resources\themes\explorer.exe
                                                                            3⤵
                                                                            • Modifies visiblity of hidden/system files in Explorer
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Adds Run key to start application
                                                                            • Checks whether UAC is enabled
                                                                            • Drops file in System32 directory
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • Drops file in Windows directory
                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:2684
                                                                            • \??\c:\windows\resources\spoolsv.exe
                                                                              c:\windows\resources\spoolsv.exe SE
                                                                              4⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Checks whether UAC is enabled
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • Drops file in Windows directory
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1156
                                                                              • \??\c:\windows\resources\svchost.exe
                                                                                c:\windows\resources\svchost.exe
                                                                                5⤵
                                                                                • Modifies visiblity of hidden/system files in Explorer
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Adds Run key to start application
                                                                                • Checks whether UAC is enabled
                                                                                • Drops file in System32 directory
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1800
                                                                                • \??\c:\windows\resources\spoolsv.exe
                                                                                  c:\windows\resources\spoolsv.exe PR
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Checks whether UAC is enabled
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1364
                                                                      • C:\Windows\System32\rundll32.exe
                                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                        1⤵
                                                                          PID:4748

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\Local\Temp\unlocker_2.exe 

                                                                          Filesize

                                                                          906KB

                                                                          MD5

                                                                          8d1c02e1de7dd05c14a26cb2b7e2bb38

                                                                          SHA1

                                                                          1ce626e0b0e84d4762f445a56ed5130def0e0914

                                                                          SHA256

                                                                          3661e65d26427186355d603643731105ed4dbd152904b6bf56a7bbd5b2443653

                                                                          SHA512

                                                                          1a08981e91f5ea2f368ad6eccacaa4c8377b856eb1785e7af2e236752763170b867fd27f394070b2e342b2b1b2b2742477ad0b26a9b491d7949cc1fc0341e49c

                                                                        • C:\Windows\Resources\Themes\explorer.exe

                                                                          Filesize

                                                                          2.5MB

                                                                          MD5

                                                                          d9e6590ddb9cf00ad58f9ecb88820768

                                                                          SHA1

                                                                          260114f1943c5ea8849923c6cbece687626fa7f4

                                                                          SHA256

                                                                          dfbec28773f1d03fff1571b011da3a8a4f23ec860099c8b91c0f7f4ae80f0ec9

                                                                          SHA512

                                                                          34400aebaed4447370816327758d1da4e3175d2939fe86c64c5654be86e545fa2a0cc64d6b01e9da794bd43eb20109b64f4163a7447e1c431542ebc5ae5f8fad

                                                                        • C:\Windows\Resources\Themes\icsys.icn.exe

                                                                          Filesize

                                                                          2.5MB

                                                                          MD5

                                                                          4ee55df736258d4d7836af2f8d7bb2f6

                                                                          SHA1

                                                                          a5f30f93cf6ea14cab303f4d0b399ea162aeb4a3

                                                                          SHA256

                                                                          2c3e75ec4099263cb6d3c4ee6c78ec363b087d2c1b1a175e531c200e563ba0c0

                                                                          SHA512

                                                                          c6e282fe618da2c751b312f7da4b4a2b1f99dfd507c45e7c56400e21db735866481d189517ffaebd8220cc2ea5c90ef00c555b12341ad81905c47313d3903f63

                                                                        • C:\Windows\Resources\spoolsv.exe

                                                                          Filesize

                                                                          2.5MB

                                                                          MD5

                                                                          95fa85f347ec3ee60518c0e0a56c1793

                                                                          SHA1

                                                                          c2ded6de5450f8abfc844fccd4b3b45aa537429f

                                                                          SHA256

                                                                          5373ca56aa039ec380e92434953b0bf832d423e4f528e1e3acb0f7e84fc6112b

                                                                          SHA512

                                                                          7a9017f098086931fe82344bdf079fc6df53e6bce8fff62c5b94e926ccda5519e8765b4791bb7c8d009e559fc1b497d9cddbcfc29da6fcd4eefcf49b52080cea

                                                                        • \??\c:\windows\resources\svchost.exe

                                                                          Filesize

                                                                          2.5MB

                                                                          MD5

                                                                          3ecebfcb5ee72071a81b98db1e29a8af

                                                                          SHA1

                                                                          1e8c513e8f24c09939837ba55761e5cc3dc2e990

                                                                          SHA256

                                                                          400365e612cc41b2a2f252090694c0a99410fdc84bd8e3e8b7aaf6db22a74f6f

                                                                          SHA512

                                                                          56ae817ec6687bae6784d07ad1b6bcb6cf9941582e038d21369d13fd6123d951b434f13c9d03c87576614872b56e202e216f56fffb518430ed650e317f42b0f1

                                                                        • memory/1156-31-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/1156-52-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/1364-50-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/1364-45-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/1800-58-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/1800-40-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/2448-12-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/2448-55-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/2684-22-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/2684-57-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/2684-68-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/2684-70-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/3484-61-0x00007FF74E5F0000-0x00007FF74E6D6000-memory.dmp

                                                                          Filesize

                                                                          920KB

                                                                        • memory/4160-0-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/4160-56-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/4160-1-0x0000000077D34000-0x0000000077D36000-memory.dmp

                                                                          Filesize

                                                                          8KB