Play interactive tourEdit tour

Analysis Report IObitUnlocker.sys

Overview

General Information

Sample Name:IObitUnlocker.sys
Analysis ID:340296
MD5:47aa03a10ac3a407f8f30f1088edcbc9
SHA1:b5d78a1d3ae93bd343c6d65e64c0945d1d558758
SHA256:c79a2bb050af6436b10b58ef04dbc7082df1513cec5934432004eb56fba05e66
Errors
  • Nothing to analyse, Joe Sandbox has not found any analysis process or sample
  • Corrupt sample or wrongly selected analyzer. Details: A device attached to the system is not functioning.

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: IObitUnlocker.sysReversingLabs: Detection: 12%
Machine Learning detection for sample
Source: IObitUnlocker.sysJoe Sandbox ML: detected
Source: IObitUnlocker.sysStatic PE information: certificate valid
Source: Binary string: f:\iobitsvn\c++\unlocker\driver\objchk_win7_amd64\amd64\IObitUnlocker.pdb source: IObitUnlocker.sys
Source: IObitUnlocker.sysString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: IObitUnlocker.sysString found in binary or memory: http://ocsp.thawte.com0
Source: IObitUnlocker.sysString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: IObitUnlocker.sysString found in binary or memory: http://s.symcd.com06
Source: IObitUnlocker.sysString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: IObitUnlocker.sysString found in binary or memory: http://s2.symcb.com0
Source: IObitUnlocker.sysString found in binary or memory: http://sv.symcb.com/sv.crl0f
Source: IObitUnlocker.sysString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: IObitUnlocker.sysString found in binary or memory: http://sv.symcd.com0&
Source: IObitUnlocker.sysString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: IObitUnlocker.sysString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: IObitUnlocker.sysString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: IObitUnlocker.sysString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: IObitUnlocker.sysString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: IObitUnlocker.sysString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: IObitUnlocker.sysString found in binary or memory: http://www.symauth.com/cps0(
Source: IObitUnlocker.sysString found in binary or memory: http://www.symauth.com/rpa00
Source: IObitUnlocker.sysString found in binary or memory: https://d.symcb.com/cps0%
Source: IObitUnlocker.sysString found in binary or memory: https://d.symcb.com/rpa0
Source: IObitUnlocker.sysString found in binary or memory: https://d.symcb.com/rpa0.
Source: IObitUnlocker.sysBinary string: \Device\HarddiskDmVolumes\
Source: IObitUnlocker.sysBinary string: \Device\IObitUnlockerDevice
Source: IObitUnlocker.sysBinary string: \Device\HarddiskVolume1\unlocker.log
Source: classification engineClassification label: mal52.winSYS@0/0@0/0
Source: IObitUnlocker.sysReversingLabs: Detection: 12%
Source: IObitUnlocker.sysStatic PE information: certificate valid
Source: IObitUnlocker.sysStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: f:\iobitsvn\c++\unlocker\driver\objchk_win7_amd64\amd64\IObitUnlocker.pdb source: IObitUnlocker.sys

Mitre Att&ck Matrix

No Mitre Att&ck techniques found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 340296 Sample: IObitUnlocker.sys Startdate: 15/01/2021 Architecture: WINDOWS Score: 52 5 Multi AV Scanner detection for submitted file 2->5 7 Machine Learning detection for sample 2->7
SourceDetectionScannerLabelLink
IObitUnlocker.sys4%VirustotalBrowse
IObitUnlocker.sys5%MetadefenderBrowse
IObitUnlocker.sys12%ReversingLabsWin64.PUA.IObitUnlocker
IObitUnlocker.sys100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.thawte.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0IObitUnlocker.sysfalse
    high
    http://www.symauth.com/cps0(IObitUnlocker.sysfalse
      high
      http://www.symauth.com/rpa00IObitUnlocker.sysfalse
        high
        http://ocsp.thawte.com0IObitUnlocker.sysfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        No contacted IP infos

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:340296
        Start date:15.01.2021
        Start time:15:38:56
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 1m 35s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:IObitUnlocker.sys
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:0
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal52.winSYS@0/0@0/0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .sys
        • Unable to launch sample, stop analysis
        Errors:
        • Nothing to analyse, Joe Sandbox has not found any analysis process or sample
        • Corrupt sample or wrongly selected analyzer. Details: A device attached to the system is not functioning.
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found

        Static File Info

        General

        File type:PE32+ executable (native) x86-64, for MS Windows
        Entropy (8bit):6.534009084883959
        TrID:
        • Win64 Device Driver (generic) (12004/3) 74.95%
        • Generic Win/DOS Executable (2004/3) 12.51%
        • DOS Executable Generic (2002/1) 12.50%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
        File name:IObitUnlocker.sys
        File size:66824
        MD5:47aa03a10ac3a407f8f30f1088edcbc9
        SHA1:b5d78a1d3ae93bd343c6d65e64c0945d1d558758
        SHA256:c79a2bb050af6436b10b58ef04dbc7082df1513cec5934432004eb56fba05e66
        SHA512:3402ca68b00ffd9e2551f97b3895990ee0274f14f117505c3588ea76c716488860ac2da07c1d9275bbc43eb87b88893c52fb04d15f1afe7b7bf7d9a524961101
        SSDEEP:1536:h0xAAJD9GvR6+SmcoWtW6RxJUVe9UVKghwR1xn:hyDw6+SmcoW0ixyVeWV8RLn
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C.r.................=...................................................Rich............................PE..d....(BY.........."

        File Icon

        Icon Hash:74f0e4ecccdce0e4

        General

        Entrypoint:0x1c064
        Entrypoint Section:INIT
        Digitally signed:true
        Imagebase:0x10000
        Subsystem:native
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:
        Time Stamp:0x594228AA [Thu Jun 15 06:26:50 2017 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:1
        File Version Major:6
        File Version Minor:1
        Subsystem Version Major:6
        Subsystem Version Minor:1
        Import Hash:878e0ad08d61b8eeabe5f33873401f2d
        Signature Valid:true
        Signature Issuer:CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US
        Signature Validation Error:The operation completed successfully
        Error Number:0
        Not Before, Not After
        • 12/23/2015 1:00:00 AM 3/24/2018 12:59:59 AM
        Subject Chain
        • CN=IObit Information Technology, O=IObit Information Technology, L=Chengdu, S=Sichuan, C=CN
        Version:3
        Thumbprint MD5:015DE39AFB8FF135DFCAFC5E64FAAF37
        Thumbprint SHA-1:72E43BDF20C3532371DD5A0A4BB27E0B3DA44248
        Thumbprint SHA-256:691719047BDADC45AC3537CD867753EDEDA21C07FB7626E1A91962A9740E890E
        Serial:454A6CD2E1E63CA9D542DFDAB518FED9
        Instruction
        dec eax
        sub esp, 28h
        dec esp
        mov eax, edx
        dec esp
        mov ecx, ecx
        call 00007FA5E8C2F83Ah
        dec ecx
        mov edx, eax
        dec ecx
        mov ecx, ecx
        dec eax
        add esp, 28h
        jmp 00007FA5E8C24A73h
        int3
        int3
        mov al, C0h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        rol dh, 00000000h
        add byte ptr [eax], al
        nop
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        push 000000C2h
        add byte ptr [eax], al
        add byte ptr [eax+000000C2h], al
        add byte ptr [eax], al
        add byte ptr [eax+000000C2h], bl
        add byte ptr [eax], al
        add byte ptr [edx+eax*8+00000000h], ch
        add byte ptr [eax], al
        mov esi, 000000C2h
        add byte ptr [eax], al
        add ah, dl
        retn 0000h
        add byte ptr [eax], al
        add byte ptr [eax], al
        in al, dx
        retn 0000h
        add byte ptr [eax], al
        add byte ptr [eax], al
        inc dl
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        or al, bl
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        push ss
        ret
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        and al, C3h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        inc eax
        ret
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        pop esp
        ret
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        jo 00007FA5E8C2F865h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        mov bx, es
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        cmpsb
        ret
        add byte ptr [eax], al
        Programming Language:
        • [ASM] VS2008 SP1 build 30729
        • [ C ] VS2008 SP1 build 30729
        • [IMP] VS2008 SP1 build 30729
        • [LNK] VS2008 SP1 build 30729
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xc0840x28INIT
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd0000x370.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb0000x3a8.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x9e000x6708
        IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000x10.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x91c00x1c.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x90000x1b8.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x7fed0x8000False0.358184814453data5.40373293752IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
        .rdata0x90000x4e80x600False0.4296875data3.59156431085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
        .data0xa0000x1700x200False0.125data0.611685037312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
        .pdata0xb0000x3a80x400False0.5322265625data3.89550684067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
        INIT0xc0000x6e60x800False0.4638671875data4.72418546261IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        .rsrc0xd0000x3700x400False0.3837890625data2.94391235696IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        .reloc0xe0000x240x200False0.052734375GLS_BINARY_LSB_FIRST0.153703185652IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_VERSION0xd0600x30cdataEnglishUnited States
        DLLImport
        ntoskrnl.exeExAllocatePoolWithTag, IoDeleteSymbolicLink, ExFreePoolWithTag, IoDeleteDevice, IofCompleteRequest, IoCreateSymbolicLink, IoCreateDevice, RtlAssert, _wcsnicmp, ZwReadFile, IoGetRelatedDeviceObject, MmGetSystemRoutineAddress, KeInitializeEvent, ExInterlockedPopEntryList, KeDelayExecutionThread, IoFileObjectType, ZwWaitForSingleObject, ZwClose, ObReferenceObjectByHandle, KeWaitForSingleObject, RtlCompareUnicodeString, IoAllocateIrp, ObfDereferenceObject, ZwWriteFile, DbgPrint, IofCallDriver, _wcsicmp, PsGetProcessPeb, PsLookupProcessByProcessId, ZwQuerySymbolicLinkObject, RtlInitUnicodeString, KeSetEvent, RtlAppendUnicodeToString, IoCreateFile, ZwQuerySystemInformation, ZwOpenSymbolicLinkObject, KeUnstackDetachProcess, ObQueryNameString, ZwCreateFile, wcsrchr, ZwQueryDirectoryFile, _vsnwprintf, RtlAppendUnicodeStringToString, ZwDuplicateObject, IoFreeIrp, ZwOpenProcess, PsGetCurrentProcessId, MmIsAddressValid, ZwTerminateProcess, ZwQueryInformationFile, ExInterlockedPushEntryList, KeStackAttachProcess, KeBugCheckEx, __C_specific_handler
        DescriptionData
        LegalCopyrightIObit Copyright 2005-2013
        InternalNameIObitUnlocker.sys
        FileVersion1.2.0.1 built by: WinDDK
        CompanyNameIObit
        ProductNameIObitUnlocker
        ProductVersion1.2.0.1
        FileDescriptionIObitUnlocker Driver
        OriginalFilenameIObitUnlocker.sys
        Translation0x0409 0x04b0
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States

        Network Behavior

        No network behavior found

        Code Manipulations

        Statistics

        System Behavior

        Disassembly