Analysis

  • max time kernel
    23s
  • max time network
    13s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-09-2024 07:19

General

  • Target

    Unlocker.exe

  • Size

    700KB

  • MD5

    f6723ad9095fe7f23bc81103b62ce14e

  • SHA1

    418f277b1e5cd33189e1ba7001a99a8604f97100

  • SHA256

    1c6787530790297da905509a2bf5e130943199cf7860ac992a5e5c01c626ec1f

  • SHA512

    75540a6add2654e4ee2817bc960542be5c1acb4c1bce6e55b8c242b9dc20aef47fec480f76ad8a6e58fb2f19a9ba07d4fc6f63ee006e10237bd5b4934a8bb944

  • SSDEEP

    12288:DArxvGXUTdw07Y7SbARpGMktQgmTiQM4HEdh:DArxvIEdw07YCARQMkOgmT3M4kdh

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Unlocker.exe
    "C:\Users\Admin\AppData\Local\Temp\Unlocker.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads