Analysis
-
max time kernel
135s -
max time network
318s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
12-02-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
UnlockTool-2024-09-01-0.exe
Resource
win7-20231129-es
Behavioral task
behavioral2
Sample
UnlockTool-2024-09-01-0.exe
Resource
win10v2004-20231215-es
General
-
Target
UnlockTool-2024-09-01-0.exe
-
Size
182.5MB
-
MD5
d47143627ffdbbc4a487b6cf0832d9ae
-
SHA1
652174cacdc5e773085061be52ce6783c81bec57
-
SHA256
543b67bea0d897b65be998ccd2b0cc58579c21f249b94b9c7cdcfbfe9283de8f
-
SHA512
c03b91257c3a212375ebd40670d199bdb33235e81a6146e062f0805c7165b3a3faa0e7554eb2599d8e5b5796f2b2a17ebfe809647e8be992a660ef3edf9f8497
-
SSDEEP
3145728:bYMQFgo7i9qCKLKaPbYL3LUDpRuU24HGWmV+iB2x5MlX7GOzbm7sweWJlY20CeTJ:V6go7i9BtaDYL3Q/92FWm3XHH4sPWJCX
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 2 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\0E68FCF27C261EAA0F0DE3053E2B3A5692F6CA2E\Blob = 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 UnlockTool-2024-09-01-0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\FBE11F6170659F4A3064D3159FE8FFCE0CE06C67\Blob = 030000000100000014000000fbe11f6170659f4a3064d3159fe8ffce0ce06c672000000001000000e7050000308205e3308203cba00302010202107eb0af01977017a545f699ea3889f612300d06092a864886f70d01010b050030633161305f06035504031e58005500530042005c005600490044005f00300035004100430026005000490044005f003100320032003700200028006c006900620077006400690020006100750074006f00670065006e0065007200610074006500640029301e170d3232303431393136343931325a170d3239303130313030303030305a30633161305f06035504031e58005500530042005c005600490044005f00300035004100430026005000490044005f003100320032003700200028006c006900620077006400690020006100750074006f00670065006e006500720061007400650064002930820222300d06092a864886f70d01010105000382020f003082020a028202010090641fdbf995019ade845ff65c0399997699266ef2b60a1cd75df5c7e5d4926ca7c845797cc3885a0ec6dada1b7d546f63eda5631db386ba7828bb7532f1e2abf3c6c8e9e672a2c8766e78087b46e275d49b2e7573b2c8260a6e0605ee347105d7dfea689b90e5af33881b92498ef19bedcce12b1bec6c5f1dfb0b51c5bae578269c9910b68ad0cef9dfbec9586c63bac5ad13711187f007627f9a4cee19dfa59fbd798378f269dbc5866ce56b5938116e5d5c59600f5099c03065c7c2e99bcf94d749f0dc84c9de5e6bdf9695bd4384a1ec131175a34800b7a2fbfcee562a0a2bc282ecc288d068169d81b9b48db5723fb97a0d7f8106901ea27c15edb45df2278c6dce0515b70c35c9a58fb91bec0bfec791a7a7f172469521e1340f88e867bd98fb3507ced81a6f91379628d96528786360bf7bc55a1e871efd46e6997b1ab119aa6c020d221552aab92b4964b62f647a107eb35855a4f288abbf87fca6ee39344486a37de1b2ad7b5f537e4126e7ca57dbb580b9384b4ff84689bd40c0529bc4b28be5f11b3a48b2ea527ed918565c716c2374353b18a723b978334db6f46d244450ae9df4c2f496078dae28b5ab1fe0d05e5fb597450a43f578429d6c2cee799a919db0c9a47b999372126dc8d36286ddcbd472f09c616611c409190b2e511ce5ed0086d522ccd615e4f513a2f898d652fdfebd7928f47b103438941c510203010001a3819230818f30160603551d250101ff040c300a06082b0601050507030330340603551d07042d302b812943726561746564206279206c69627764692028687474703a2f2f6c69627764692e616b656f2e696529303f0603551d2004383036303406082b060105050702013028302606082b06010505070201161a687474703a2f2f6c69627764692d6370732e616b656f2e696500300d06092a864886f70d01010b050003820201000a3dde4665593726d8e543f39c750cdfe780b154c5241b979420c9153c595e2c2b4e36516c5cc4925f4cd161389cfc2c3a527141f5670b5862648be14cb8012d4581e1d117c5f58421d91d0f7e99ee27e370dbe60af3c9087efd51db9d25947348056610452e93f6503897cf03c4bf7d90873d18e790666ac47a69fef3a66667229b440d39b57ec3d73c9838f95d0368faf7aeded3c68a95dd8b06c1a512412646908e28c6497406bc313b92386e25bd70541ecedf2b2ee95aae6fc0fbba442939c403ce4d8c23103d972e8aef0eec76d807f50f5c1043738a2b183deb34d880d1e33eadaa085f520b19f17ccd41d9739b2d25ec524e5ae5afd52f5c5409f3db801764630a307e15557d1023df8bd2fabccc4229424f5f00cf7ebbe8c7b30e769ee8a30b55e38415aa747b0a4bf8dad24cd220d4b3d2a3e9e9175e2767a5d26cea925c0d4e5fe9139d52aa22236eca16802bd593dc8e91afe55c39b0ea441f74c4ed9491137f8a997220ac6f8f3314bad918e72fa7b5a6086058a4e928bd0003c7618c43015a843e5d7aca890c2717bea5b30954ac6aaee5b940af506a3b13d4bd14f4da34c2ed7b78ac9588d1df6a282b9058a704bba2ed4672886e673d1b60f0011933bbde15cf7980592b84ad13dfae1396d9294f4dfa28efaf4eb3c7069e17093af78a3cd4c73a172119ae4d7abdf8932bbe09891e06e62e93cd72697e96 UnlockTool-2024-09-01-0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2364 UnlockTool-2024-09-01-0.exe 2364 UnlockTool-2024-09-01-0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 UnlockTool-2024-09-01-0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString UnlockTool-2024-09-01-0.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS UnlockTool-2024-09-01-0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer UnlockTool-2024-09-01-0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName UnlockTool-2024-09-01-0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion UnlockTool-2024-09-01-0.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\FBE11F6170659F4A3064D3159FE8FFCE0CE06C67\Blob = 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 UnlockTool-2024-09-01-0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\0E68FCF27C261EAA0F0DE3053E2B3A5692F6CA2E UnlockTool-2024-09-01-0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\0E68FCF27C261EAA0F0DE3053E2B3A5692F6CA2E\Blob = 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 UnlockTool-2024-09-01-0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\FBE11F6170659F4A3064D3159FE8FFCE0CE06C67 UnlockTool-2024-09-01-0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\FBE11F6170659F4A3064D3159FE8FFCE0CE06C67\Blob = 030000000100000014000000fbe11f6170659f4a3064d3159fe8ffce0ce06c672000000001000000e7050000308205e3308203cba00302010202107eb0af01977017a545f699ea3889f612300d06092a864886f70d01010b050030633161305f06035504031e58005500530042005c005600490044005f00300035004100430026005000490044005f003100320032003700200028006c006900620077006400690020006100750074006f00670065006e0065007200610074006500640029301e170d3232303431393136343931325a170d3239303130313030303030305a30633161305f06035504031e58005500530042005c005600490044005f00300035004100430026005000490044005f003100320032003700200028006c006900620077006400690020006100750074006f00670065006e006500720061007400650064002930820222300d06092a864886f70d01010105000382020f003082020a028202010090641fdbf995019ade845ff65c0399997699266ef2b60a1cd75df5c7e5d4926ca7c845797cc3885a0ec6dada1b7d546f63eda5631db386ba7828bb7532f1e2abf3c6c8e9e672a2c8766e78087b46e275d49b2e7573b2c8260a6e0605ee347105d7dfea689b90e5af33881b92498ef19bedcce12b1bec6c5f1dfb0b51c5bae578269c9910b68ad0cef9dfbec9586c63bac5ad13711187f007627f9a4cee19dfa59fbd798378f269dbc5866ce56b5938116e5d5c59600f5099c03065c7c2e99bcf94d749f0dc84c9de5e6bdf9695bd4384a1ec131175a34800b7a2fbfcee562a0a2bc282ecc288d068169d81b9b48db5723fb97a0d7f8106901ea27c15edb45df2278c6dce0515b70c35c9a58fb91bec0bfec791a7a7f172469521e1340f88e867bd98fb3507ced81a6f91379628d96528786360bf7bc55a1e871efd46e6997b1ab119aa6c020d221552aab92b4964b62f647a107eb35855a4f288abbf87fca6ee39344486a37de1b2ad7b5f537e4126e7ca57dbb580b9384b4ff84689bd40c0529bc4b28be5f11b3a48b2ea527ed918565c716c2374353b18a723b978334db6f46d244450ae9df4c2f496078dae28b5ab1fe0d05e5fb597450a43f578429d6c2cee799a919db0c9a47b999372126dc8d36286ddcbd472f09c616611c409190b2e511ce5ed0086d522ccd615e4f513a2f898d652fdfebd7928f47b103438941c510203010001a3819230818f30160603551d250101ff040c300a06082b0601050507030330340603551d07042d302b812943726561746564206279206c69627764692028687474703a2f2f6c69627764692e616b656f2e696529303f0603551d2004383036303406082b060105050702013028302606082b06010505070201161a687474703a2f2f6c69627764692d6370732e616b656f2e696500300d06092a864886f70d01010b050003820201000a3dde4665593726d8e543f39c750cdfe780b154c5241b979420c9153c595e2c2b4e36516c5cc4925f4cd161389cfc2c3a527141f5670b5862648be14cb8012d4581e1d117c5f58421d91d0f7e99ee27e370dbe60af3c9087efd51db9d25947348056610452e93f6503897cf03c4bf7d90873d18e790666ac47a69fef3a66667229b440d39b57ec3d73c9838f95d0368faf7aeded3c68a95dd8b06c1a512412646908e28c6497406bc313b92386e25bd70541ecedf2b2ee95aae6fc0fbba442939c403ce4d8c23103d972e8aef0eec76d807f50f5c1043738a2b183deb34d880d1e33eadaa085f520b19f17ccd41d9739b2d25ec524e5ae5afd52f5c5409f3db801764630a307e15557d1023df8bd2fabccc4229424f5f00cf7ebbe8c7b30e769ee8a30b55e38415aa747b0a4bf8dad24cd220d4b3d2a3e9e9175e2767a5d26cea925c0d4e5fe9139d52aa22236eca16802bd593dc8e91afe55c39b0ea441f74c4ed9491137f8a997220ac6f8f3314bad918e72fa7b5a6086058a4e928bd0003c7618c43015a843e5d7aca890c2717bea5b30954ac6aaee5b940af506a3b13d4bd14f4da34c2ed7b78ac9588d1df6a282b9058a704bba2ed4672886e673d1b60f0011933bbde15cf7980592b84ad13dfae1396d9294f4dfa28efaf4eb3c7069e17093af78a3cd4c73a172119ae4d7abdf8932bbe09891e06e62e93cd72697e96 UnlockTool-2024-09-01-0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0E68FCF27C261EAA0F0DE3053E2B3A5692F6CA2E UnlockTool-2024-09-01-0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0E68FCF27C261EAA0F0DE3053E2B3A5692F6CA2E\Blob = 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 UnlockTool-2024-09-01-0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\FBE11F6170659F4A3064D3159FE8FFCE0CE06C67 UnlockTool-2024-09-01-0.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2364 UnlockTool-2024-09-01-0.exe 2364 UnlockTool-2024-09-01-0.exe 2364 UnlockTool-2024-09-01-0.exe 2364 UnlockTool-2024-09-01-0.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2364 UnlockTool-2024-09-01-0.exe 2364 UnlockTool-2024-09-01-0.exe 2364 UnlockTool-2024-09-01-0.exe 2364 UnlockTool-2024-09-01-0.exe 2364 UnlockTool-2024-09-01-0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UnlockTool-2024-09-01-0.exe"C:\Users\Admin\AppData\Local\Temp\UnlockTool-2024-09-01-0.exe"1⤵
- Manipulates Digital Signatures
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD51a534450750eca1f3d951def8d9965bf
SHA17dd82b6d52a840c4979a7515fc7a9ca3725363c4
SHA2565e84d13636fbce7869cddc8b20c7d83fa0063e98c319e8e5ab751edc9ee1da76
SHA5123acdfff24a4d9ebb4e9647afccf95f33b4580980fb35a91eff65a01ce470b0bbc1a3a27c476653911f1fa431757ca64c945da89da54bffa599744f29123ef715