Overview
overview
8Static
static
3Destroy Wi...ng.exe
windows7-x64
6Destroy Wi...ng.exe
windows10-2004-x64
6unlocker1.9.0-x64.exe
windows7-x64
7unlocker1.9.0-x64.exe
windows10-2004-x64
7$PLUGINSDIR/Delay.dll
windows7-x64
3$PLUGINSDIR/Delay.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/File...er.exe
windows7-x64
7$TEMP/File...er.exe
windows10-2004-x64
7$TEMP/Quic...er.exe
windows7-x64
7$TEMP/Quic...er.exe
windows10-2004-x64
7Unlocker.exe
windows7-x64
8Unlocker.exe
windows10-2004-x64
8UnlockerCOM.dll
windows7-x64
7UnlockerCOM.dll
windows10-2004-x64
7UnlockerDriver5.sys
windows7-x64
1UnlockerDriver5.sys
windows10-2004-x64
1UnlockerInject32.exe
windows7-x64
1UnlockerInject32.exe
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
Destroy Windows 10 Spying/Destroy Windows 10 Spying.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Destroy Windows 10 Spying/Destroy Windows 10 Spying.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
unlocker1.9.0-x64.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
unlocker1.9.0-x64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Delay.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Delay.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$TEMP/FileUnlocker_Installer.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$TEMP/FileUnlocker_Installer.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
$TEMP/QuickStores_Unlocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$TEMP/QuickStores_Unlocker.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Unlocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
Unlocker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
UnlockerCOM.dll
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
UnlockerCOM.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
UnlockerDriver5.sys
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
UnlockerDriver5.sys
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
UnlockerInject32.exe
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
UnlockerInject32.exe
Resource
win10v2004-20240426-en
General
-
Target
Unlocker.exe
-
Size
127KB
-
MD5
4ba85f844c75293187c5a95b2dedc7ec
-
SHA1
2d71137121698fe5427d912dc14dfbf4604775f4
-
SHA256
0c44365761c09c19f3c2c4edce69d2caf64aa927e34db2c71d46db86dfbf98c8
-
SHA512
641b53b4fb533292406d9a4490e973abddc564d2098f372efe13a4b907ac13ced09b731ec28ee2ac4d4870693adebcb6831e78d699676a0a0500f263086ac2f5
-
SSDEEP
3072:yZH+J/jSHmow32UVSlH101bJqwK7CWA4M799m:uH+hr32UIVEswK7e99m
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
Unlocker.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\UnlockerDriver5\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\UnlockerDriver5.sys" Unlocker.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
Unlocker.exepid process 2992 Unlocker.exe 2992 Unlocker.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Unlocker.exedescription pid process Token: SeDebugPrivilege 2992 Unlocker.exe Token: SeLoadDriverPrivilege 2992 Unlocker.exe Token: SeBackupPrivilege 2992 Unlocker.exe Token: SeTakeOwnershipPrivilege 2992 Unlocker.exe