Overview
overview
8Static
static
7anyunlock-...1).exe
windows7-x64
8anyunlock-...1).exe
windows10-2004-x64
7$PLUGINSDI...Vs.dll
windows7-x64
3$PLUGINSDI...Vs.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...up.exe
windows7-x64
7$PLUGINSDI...up.exe
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDIR/setup.exe
windows7-x64
1$PLUGINSDIR/setup.exe
windows10-2004-x64
1$PLUGINSDI...ll.exe
windows7-x64
7$PLUGINSDI...ll.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...Vs.dll
windows7-x64
3$PLUGINSDI...Vs.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
1$PLUGINSDI...ib.dll
windows10-2004-x64
3$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...tn.dll
windows7-x64
3$PLUGINSDI...tn.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
103s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 06:57
Behavioral task
behavioral1
Sample
anyunlock-iphone-password-unlocker-en-official-setup (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
anyunlock-iphone-password-unlocker-en-official-setup (1).exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/SkinnedControls.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/SkinnedControls.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/setup.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/uninstall.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240419-en
General
-
Target
anyunlock-iphone-password-unlocker-en-official-setup (1).exe
-
Size
14.1MB
-
MD5
42f74b42135f9dea8b74d4df8600d62c
-
SHA1
b176f0c2a18e77de33484dac7283dfb149cfc703
-
SHA256
7d5b1d29a694e8fc136a5a13fd17b8c30d08c8d4f4d5d8006a5361d53acdf9de
-
SHA512
de9b1d042788da091f86d9af8ae1556b68acbc62a9eb06ec454e407b89b216bcd10ab7cbc945224b111163700d27b2153e9fada181f2e90cd195619829014210
-
SSDEEP
196608:H06I6iZ1VR5nzGRXmEY9RRdwMw6C7S2F2euxVQQPZrMYDdauyGCqKilFn+FlZudA:HcnqZmEYXRxrCzb8M2zyLclFnGzTZUIN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation anyunlock-iphone-password-unlocker-en-official-setup (1).exe -
Executes dropped EXE 1 IoCs
pid Process 5024 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 anyunlock-iphone-password-unlocker-en-official-setup (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier anyunlock-iphone-password-unlocker-en-official-setup (1).exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5024 setup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3648 wrote to memory of 1336 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 82 PID 3648 wrote to memory of 1336 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 82 PID 3648 wrote to memory of 1336 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 82 PID 3648 wrote to memory of 5024 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 84 PID 3648 wrote to memory of 5024 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 84 PID 3648 wrote to memory of 5024 3648 anyunlock-iphone-password-unlocker-en-official-setup (1).exe 84 PID 1336 wrote to memory of 1148 1336 cmd.exe 85 PID 1336 wrote to memory of 1148 1336 cmd.exe 85 PID 1336 wrote to memory of 1148 1336 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\anyunlock-iphone-password-unlocker-en-official-setup (1).exe"C:\Users\Admin\AppData\Local\Temp\anyunlock-iphone-password-unlocker-en-official-setup (1).exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"au-Windows\",\"user_id\":\"4C5EDCD2\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch NSIS App\",\"el\":\"1\",\"pv\":\"au-win\",\"install_productversion\":\"Official-com-pp\",\"install_trackversion\":\"2.1.0.0\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-G1ZWRJY8K8&api_secret=TQ-BdekiTo671_UiBfGprA""2⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\curl.execurl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"au-Windows\",\"user_id\":\"4C5EDCD2\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch NSIS App\",\"el\":\"1\",\"pv\":\"au-win\",\"install_productversion\":\"Official-com-pp\",\"install_trackversion\":\"2.1.0.0\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-G1ZWRJY8K8&api_secret=TQ-BdekiTo671_UiBfGprA"3⤵PID:1148
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsn33F2.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\nsn33F2.tmp\setup.exe" ver:2.1.0 gv:2.1.0.0 gs:Official-com-pp lan:en-US2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD562e85098ce43cb3d5c422e49390b7071
SHA1df6722f155ce2a1379eff53a9ad1611ddecbb3bf
SHA256ee7e26894cbf89c93ae4df15bdb12cd9a21f5deacedfa99a01eefe8fa52daec2
SHA512dfe7438c2b46f822e2a810bc355e5226043547608d19d1c70314e4325c06ad9ad63a797905e30d19f5d9a86ee1a6d9c28f525a298731e79dbf6f3d6441179a8e
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
3.3MB
MD5023dfce70301896fb6b2e15eca718549
SHA164bf799250c2d437b8dd2f0c7c7e6509394565d9
SHA2569140755badab25fcca359fe83f74a4a435ec6136302ddafb489a90f563ad4157
SHA512e47fbb80e62a02018ffd0484e21d9f80bd6469ef0df745d7f5aff7bc5ca91a487bbbcdc2d0a9b0c67352a33c97bced3f0184ba42960f1cf7c6313004fbf4eede