Analysis

  • max time kernel
    42s
  • max time network
    26s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-05-2024 05:13

General

  • Target

    Unlocker_2.exe

  • Size

    3.4MB

  • MD5

    9b25d73c3a94e37f07fd23154e004c8b

  • SHA1

    8ef59559d03711ca7f2185e98039aecdb11e6162

  • SHA256

    e65c8c69d128676f200db5ae91937aa4152fd93fb66e8098972ce33f3f029226

  • SHA512

    c5c3cd962290dff48cdadf98e249577c762bac978dc138fd1e9fc00ea02e504e0f632a6b04db56f3d0224a3a8cdf0ba12ead2983d52c9ecde354f75eae717e92

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxj3GT0DZ8oNZ+O93+xaj:Mxx9NUFkQx753uWuCyyxaCruQ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 7 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Unlocker_2.exe
    "C:\Users\Admin\AppData\Local\Temp\Unlocker_2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4596
    • \??\c:\users\admin\appdata\local\temp\unlocker_2.exe 
      c:\users\admin\appdata\local\temp\unlocker_2.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c Color 4
        3⤵
          PID:3296
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4868
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4140
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3336
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:732
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5036
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4076
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:568
          • C:\Windows\system32\sc.exe
            sc stop HTTPDebuggerPro
            4⤵
            • Launches sc.exe
            PID:1140
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3080
          • C:\Windows\system32\taskkill.exe
            taskkill /IM HTTPDebuggerSvc.exe /F
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4316
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
          3⤵
            PID:1632
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c certutil -hashfile "c:\users\admin\appdata\local\temp\unlocker_2.exe " MD5
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4792
            • C:\Windows\system32\certutil.exe
              certutil -hashfile "c:\users\admin\appdata\local\temp\unlocker_2.exe " MD5
              4⤵
                PID:5060
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:424
              • C:\Windows\system32\taskkill.exe
                taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3880
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3124
              • C:\Windows\system32\taskkill.exe
                taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1940
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3156
              • C:\Windows\system32\taskkill.exe
                taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2040
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4524
              • C:\Windows\system32\sc.exe
                sc stop HTTPDebuggerPro
                4⤵
                • Launches sc.exe
                PID:4896
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4796
              • C:\Windows\system32\taskkill.exe
                taskkill /IM HTTPDebuggerSvc.exe /F
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2896
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
              3⤵
                PID:2092
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                3⤵
                  PID:772
                  • C:\Windows\system32\taskkill.exe
                    taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                    4⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2764
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                  3⤵
                    PID:4652
                    • C:\Windows\system32\taskkill.exe
                      taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                      4⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:900
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                    3⤵
                      PID:3580
                      • C:\Windows\system32\taskkill.exe
                        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                        4⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4716
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                      3⤵
                        PID:5068
                        • C:\Windows\system32\sc.exe
                          sc stop HTTPDebuggerPro
                          4⤵
                          • Launches sc.exe
                          PID:2304
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                        3⤵
                          PID:1104
                          • C:\Windows\system32\taskkill.exe
                            taskkill /IM HTTPDebuggerSvc.exe /F
                            4⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2508
                        • C:\Windows\SYSTEM32\cmd.exe
                          cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                          3⤵
                            PID:4856
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                            3⤵
                              PID:4588
                              • C:\Windows\system32\taskkill.exe
                                taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                4⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3624
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                              3⤵
                                PID:2192
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                  4⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4788
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                3⤵
                                  PID:3480
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                    4⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2376
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                  3⤵
                                    PID:1752
                                    • C:\Windows\system32\sc.exe
                                      sc stop HTTPDebuggerPro
                                      4⤵
                                      • Launches sc.exe
                                      PID:4872
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                                    3⤵
                                      PID:4488
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /IM HTTPDebuggerSvc.exe /F
                                        4⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3476
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      3⤵
                                        PID:2000
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        3⤵
                                          PID:3568
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                            4⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1636
                                        • C:\Windows\SYSTEM32\cmd.exe
                                          cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                          3⤵
                                            PID:1612
                                            • C:\Windows\system32\taskkill.exe
                                              taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                              4⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3116
                                          • C:\Windows\SYSTEM32\cmd.exe
                                            cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                            3⤵
                                              PID:3452
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:956
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                              3⤵
                                                PID:236
                                                • C:\Windows\system32\sc.exe
                                                  sc stop HTTPDebuggerPro
                                                  4⤵
                                                  • Launches sc.exe
                                                  PID:1264
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                                                3⤵
                                                  PID:1588
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /IM HTTPDebuggerSvc.exe /F
                                                    4⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1284
                                                • C:\Windows\SYSTEM32\cmd.exe
                                                  cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                  3⤵
                                                    PID:1328
                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                    cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                    3⤵
                                                      PID:4376
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                        4⤵
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4148
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                      3⤵
                                                        PID:4392
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                          4⤵
                                                          • Kills process with taskkill
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4636
                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                        cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                        3⤵
                                                          PID:4736
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                            4⤵
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3060
                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                          cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                          3⤵
                                                            PID:3268
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop HTTPDebuggerPro
                                                              4⤵
                                                              • Launches sc.exe
                                                              PID:4640
                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                            cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                                                            3⤵
                                                              PID:2876
                                                              • C:\Windows\system32\taskkill.exe
                                                                taskkill /IM HTTPDebuggerSvc.exe /F
                                                                4⤵
                                                                • Kills process with taskkill
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4620
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                              3⤵
                                                                PID:2176
                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                                3⤵
                                                                  PID:640
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                                    4⤵
                                                                    • Kills process with taskkill
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1856
                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                  cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                                  3⤵
                                                                    PID:844
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                                      4⤵
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1332
                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                    cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                    3⤵
                                                                      PID:2828
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                        4⤵
                                                                        • Kills process with taskkill
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3092
                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                      cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                                      3⤵
                                                                        PID:2092
                                                                        • C:\Windows\system32\sc.exe
                                                                          sc stop HTTPDebuggerPro
                                                                          4⤵
                                                                          • Launches sc.exe
                                                                          PID:3844
                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                        cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&1
                                                                        3⤵
                                                                          PID:664
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill /IM HTTPDebuggerSvc.exe /F
                                                                            4⤵
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1080
                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                          cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                                          3⤵
                                                                            PID:2076
                                                                        • C:\Windows\Resources\Themes\icsys.icn.exe
                                                                          C:\Windows\Resources\Themes\icsys.icn.exe
                                                                          2⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Checks whether UAC is enabled
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • Drops file in Windows directory
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:3412
                                                                          • \??\c:\windows\resources\themes\explorer.exe
                                                                            c:\windows\resources\themes\explorer.exe
                                                                            3⤵
                                                                            • Modifies visiblity of hidden/system files in Explorer
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Adds Run key to start application
                                                                            • Checks whether UAC is enabled
                                                                            • Drops file in System32 directory
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • Drops file in Windows directory
                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:352
                                                                            • \??\c:\windows\resources\spoolsv.exe
                                                                              c:\windows\resources\spoolsv.exe SE
                                                                              4⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Checks whether UAC is enabled
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • Drops file in Windows directory
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:904
                                                                              • \??\c:\windows\resources\svchost.exe
                                                                                c:\windows\resources\svchost.exe
                                                                                5⤵
                                                                                • Modifies visiblity of hidden/system files in Explorer
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Adds Run key to start application
                                                                                • Checks whether UAC is enabled
                                                                                • Drops file in System32 directory
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:4804
                                                                                • \??\c:\windows\resources\spoolsv.exe
                                                                                  c:\windows\resources\spoolsv.exe PR
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Checks whether UAC is enabled
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:4916

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Temp\unlocker_2.exe 

                                                                        Filesize

                                                                        906KB

                                                                        MD5

                                                                        8d1c02e1de7dd05c14a26cb2b7e2bb38

                                                                        SHA1

                                                                        1ce626e0b0e84d4762f445a56ed5130def0e0914

                                                                        SHA256

                                                                        3661e65d26427186355d603643731105ed4dbd152904b6bf56a7bbd5b2443653

                                                                        SHA512

                                                                        1a08981e91f5ea2f368ad6eccacaa4c8377b856eb1785e7af2e236752763170b867fd27f394070b2e342b2b1b2b2742477ad0b26a9b491d7949cc1fc0341e49c

                                                                      • C:\Windows\Resources\Themes\icsys.icn.exe

                                                                        Filesize

                                                                        2.5MB

                                                                        MD5

                                                                        4ee55df736258d4d7836af2f8d7bb2f6

                                                                        SHA1

                                                                        a5f30f93cf6ea14cab303f4d0b399ea162aeb4a3

                                                                        SHA256

                                                                        2c3e75ec4099263cb6d3c4ee6c78ec363b087d2c1b1a175e531c200e563ba0c0

                                                                        SHA512

                                                                        c6e282fe618da2c751b312f7da4b4a2b1f99dfd507c45e7c56400e21db735866481d189517ffaebd8220cc2ea5c90ef00c555b12341ad81905c47313d3903f63

                                                                      • \??\c:\windows\resources\spoolsv.exe

                                                                        Filesize

                                                                        2.5MB

                                                                        MD5

                                                                        74c99e2aba9805e13eda1fda285f46c2

                                                                        SHA1

                                                                        961fcd57dab28467215eeb2efb5e932e8195d807

                                                                        SHA256

                                                                        13e10f820025c0c5ddf1db95d164ccffcf5ddeee71cf396c6fb4ab88822c94a6

                                                                        SHA512

                                                                        561e4a10883c1ac9228be490b668d14434dda9275e673f1ffd098ef59e63f40467570f972eae90c4b79880064f6e4833cc32eb926071ab34775b9b34c9453ec6

                                                                      • \??\c:\windows\resources\svchost.exe

                                                                        Filesize

                                                                        2.5MB

                                                                        MD5

                                                                        d141abee53b3088584ea5a7a1daf23f5

                                                                        SHA1

                                                                        002dd929133e0d4165bacc82cf3d9139fefe88a1

                                                                        SHA256

                                                                        8022034e1c085493677ef703db122741df79c88ce584bb2986e8f17e3367b7b4

                                                                        SHA512

                                                                        a82686f4c8348047f431134c2a9960565bba168079310f6e2a20d3af0c10fd8b4d9716097ace0527f11d9741e4d376f363e342cddc4ff3ec25c6ac454cf90d53

                                                                      • \??\c:\windows\resources\themes\explorer.exe

                                                                        Filesize

                                                                        2.5MB

                                                                        MD5

                                                                        16abf4caa680f4e2fd53d22d06893346

                                                                        SHA1

                                                                        334938e974c83690af993fe3873106066ba3dbca

                                                                        SHA256

                                                                        bee33bae38fa7fde922c7244c863829588bb2186d6c1c49fab40278e086104f2

                                                                        SHA512

                                                                        3f42d6dd9427a6500f8db6ecdeb0c1c18da9c22974999d5758f816e436a0853829b3eeeeec02e0073181c29cb0f410ed9daed3eddbbba92c445b905cc7a9fe82

                                                                      • memory/352-56-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/352-21-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/904-30-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/904-52-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/2448-60-0x00007FF795130000-0x00007FF795216000-memory.dmp

                                                                        Filesize

                                                                        920KB

                                                                      • memory/3412-55-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/4596-54-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/4596-1-0x0000000077E16000-0x0000000077E18000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/4596-0-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/4804-39-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/4804-57-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/4916-49-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/4916-44-0x0000000000400000-0x0000000000A0E000-memory.dmp

                                                                        Filesize

                                                                        6.1MB