Analysis
-
max time kernel
16s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 00:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
MW3 Unlocker + Spoofer.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
MW3 Unlocker + Spoofer.exe
-
Size
5.6MB
-
MD5
872b0fa8c0306040f181d08c5d7a252b
-
SHA1
a08cf74361c96aa4d7e4503af6563c63b95f1973
-
SHA256
3a5576c4e7d9ed56cc295fea24ef0fa68cf4235dfefa434caa32015887e757c3
-
SHA512
23d8610ac8bfcb68695b652dd8d35edcc5f17994c90966ef0cabf11489d983cc852dd8e6d36ec85c78ec6f63cb6a7b21238a6d9687494f3ef99bc7ca86a4a277
-
SSDEEP
98304:GRx4heu/+/tswG+PJPigEtVTH41ZE6HqM/aZeOO4wZivrH/LXmfI1ZWQpy:GL4gy+/tbG+PJa3txT6KKaLbwZivrjdJ
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
MW3 Unlocker + Spoofer.exepid process 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MW3 Unlocker + Spoofer.exepid process 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe 2400 MW3 Unlocker + Spoofer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
MW3 Unlocker + Spoofer.execmd.exedescription pid process target process PID 2400 wrote to memory of 2568 2400 MW3 Unlocker + Spoofer.exe cmd.exe PID 2400 wrote to memory of 2568 2400 MW3 Unlocker + Spoofer.exe cmd.exe PID 2568 wrote to memory of 244 2568 cmd.exe certutil.exe PID 2568 wrote to memory of 244 2568 cmd.exe certutil.exe PID 2568 wrote to memory of 1336 2568 cmd.exe find.exe PID 2568 wrote to memory of 1336 2568 cmd.exe find.exe PID 2568 wrote to memory of 4920 2568 cmd.exe find.exe PID 2568 wrote to memory of 4920 2568 cmd.exe find.exe PID 2400 wrote to memory of 3452 2400 MW3 Unlocker + Spoofer.exe cmd.exe PID 2400 wrote to memory of 3452 2400 MW3 Unlocker + Spoofer.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MW3 Unlocker + Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\MW3 Unlocker + Spoofer.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\MW3 Unlocker + Spoofer.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\MW3 Unlocker + Spoofer.exe" MD53⤵PID:244
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1336
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4920
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3452