Overview
overview
9Static
static
3NY TOOLS/B...er.exe
windows7-x64
NY TOOLS/B...er.exe
windows10-2004-x64
DefCon/DefCon.rar
windows7-x64
3DefCon/DefCon.rar
windows10-2004-x64
3DefCon/Def...gs.vbs
windows7-x64
1DefCon/Def...gs.vbs
windows10-2004-x64
1DefCon/ReadMe.txt
windows7-x64
1DefCon/ReadMe.txt
windows10-2004-x64
1UNLOCKER V2.exe
windows7-x64
5UNLOCKER V2.exe
windows10-2004-x64
5bsod fix.bat
windows7-x64
1bsod fix.bat
windows10-2004-x64
1w11 fix.bat
windows7-x64
9w11 fix.bat
windows10-2004-x64
9UNLOCK ALL.exe
windows7-x64
9UNLOCK ALL.exe
windows10-2004-x64
9bsod fix.bat
windows7-x64
1bsod fix.bat
windows10-2004-x64
1w11 fix.bat
windows7-x64
9w11 fix.bat
windows10-2004-x64
9VIP-CHAIR.exe
windows7-x64
5VIP-CHAIR.exe
windows10-2004-x64
5bsod fix.bat
windows7-x64
1bsod fix.bat
windows10-2004-x64
1w11 fix.bat
windows7-x64
9w11 fix.bat
windows10-2004-x64
9Analysis
-
max time kernel
104s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 18:04
Static task
static1
Behavioral task
behavioral1
Sample
NY TOOLS/BLOCKER&WOOFER/Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NY TOOLS/BLOCKER&WOOFER/Loader.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
DefCon/DefCon.rar
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
DefCon/DefCon.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
DefCon/Defender_Settings.vbs
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
DefCon/Defender_Settings.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
DefCon/ReadMe.txt
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
DefCon/ReadMe.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
UNLOCKER V2.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
UNLOCKER V2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
bsod fix.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
bsod fix.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
w11 fix.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
w11 fix.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
UNLOCK ALL.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
UNLOCK ALL.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
bsod fix.bat
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
bsod fix.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
w11 fix.bat
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
w11 fix.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
VIP-CHAIR.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
VIP-CHAIR.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
bsod fix.bat
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
bsod fix.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
w11 fix.bat
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
w11 fix.bat
Resource
win10v2004-20240426-en
General
-
Target
UNLOCKER V2.exe
-
Size
5.6MB
-
MD5
872b0fa8c0306040f181d08c5d7a252b
-
SHA1
a08cf74361c96aa4d7e4503af6563c63b95f1973
-
SHA256
3a5576c4e7d9ed56cc295fea24ef0fa68cf4235dfefa434caa32015887e757c3
-
SHA512
23d8610ac8bfcb68695b652dd8d35edcc5f17994c90966ef0cabf11489d983cc852dd8e6d36ec85c78ec6f63cb6a7b21238a6d9687494f3ef99bc7ca86a4a277
-
SSDEEP
98304:GRx4heu/+/tswG+PJPigEtVTH41ZE6HqM/aZeOO4wZivrH/LXmfI1ZWQpy:GL4gy+/tbG+PJa3txT6KKaLbwZivrjdJ
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
UNLOCKER V2.exepid process 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5080 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
UNLOCKER V2.exepid process 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe 1340 UNLOCKER V2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
UNLOCKER V2.execmd.execmd.execmd.exedescription pid process target process PID 1340 wrote to memory of 404 1340 UNLOCKER V2.exe cmd.exe PID 1340 wrote to memory of 404 1340 UNLOCKER V2.exe cmd.exe PID 404 wrote to memory of 3740 404 cmd.exe certutil.exe PID 404 wrote to memory of 3740 404 cmd.exe certutil.exe PID 404 wrote to memory of 4180 404 cmd.exe find.exe PID 404 wrote to memory of 4180 404 cmd.exe find.exe PID 404 wrote to memory of 856 404 cmd.exe find.exe PID 404 wrote to memory of 856 404 cmd.exe find.exe PID 1340 wrote to memory of 4056 1340 UNLOCKER V2.exe cmd.exe PID 1340 wrote to memory of 4056 1340 UNLOCKER V2.exe cmd.exe PID 1340 wrote to memory of 3440 1340 UNLOCKER V2.exe cmd.exe PID 1340 wrote to memory of 3440 1340 UNLOCKER V2.exe cmd.exe PID 3440 wrote to memory of 1932 3440 cmd.exe cmd.exe PID 3440 wrote to memory of 1932 3440 cmd.exe cmd.exe PID 1932 wrote to memory of 5080 1932 cmd.exe timeout.exe PID 1932 wrote to memory of 5080 1932 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UNLOCKER V2.exe"C:\Users\Admin\AppData\Local\Temp\UNLOCKER V2.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\UNLOCKER V2.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\UNLOCKER V2.exe" MD53⤵PID:3740
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4180
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: Session not found. Use latest code. You can only have app opened 1 at a time. && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: Session not found. Use latest code. You can only have app opened 1 at a time. && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:5080