Analysis
-
max time kernel
93s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 04:52
Behavioral task
behavioral1
Sample
Unlocker_2.exe
Resource
win10v2004-20240508-en
General
-
Target
Unlocker_2.exe
-
Size
3.4MB
-
MD5
9b25d73c3a94e37f07fd23154e004c8b
-
SHA1
8ef59559d03711ca7f2185e98039aecdb11e6162
-
SHA256
e65c8c69d128676f200db5ae91937aa4152fd93fb66e8098972ce33f3f029226
-
SHA512
c5c3cd962290dff48cdadf98e249577c762bac978dc138fd1e9fc00ea02e504e0f632a6b04db56f3d0224a3a8cdf0ba12ead2983d52c9ecde354f75eae717e92
-
SSDEEP
49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxj3GT0DZ8oNZ+O93+xaj:Mxx9NUFkQx753uWuCyyxaCruQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exeUnlocker_2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Unlocker_2.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Unlocker_2.exeicsys.icn.exeexplorer.exespoolsv.exespoolsv.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Unlocker_2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Unlocker_2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe -
Executes dropped EXE 6 IoCs
Processes:
unlocker_2.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 3484 unlocker_2.exe 2448 icsys.icn.exe 2684 explorer.exe 1156 spoolsv.exe 1800 svchost.exe 1364 spoolsv.exe -
Processes:
resource yara_rule behavioral1/memory/4160-0-0x0000000000400000-0x0000000000A0E000-memory.dmp themida C:\Windows\Resources\Themes\icsys.icn.exe themida behavioral1/memory/2448-12-0x0000000000400000-0x0000000000A0E000-memory.dmp themida C:\Windows\Resources\Themes\explorer.exe themida behavioral1/memory/2684-22-0x0000000000400000-0x0000000000A0E000-memory.dmp themida C:\Windows\Resources\spoolsv.exe themida \??\c:\windows\resources\svchost.exe themida behavioral1/memory/1800-40-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/1156-31-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/1364-45-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/1156-52-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/4160-56-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2448-55-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/1364-50-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2684-57-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/1800-58-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2684-68-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2684-70-0x0000000000400000-0x0000000000A0E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Processes:
svchost.exespoolsv.exeUnlocker_2.exeicsys.icn.exeexplorer.exespoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Unlocker_2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
Unlocker_2.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 4160 Unlocker_2.exe 2448 icsys.icn.exe 2684 explorer.exe 1156 spoolsv.exe 1800 svchost.exe 1364 spoolsv.exe -
Drops file in Windows directory 5 IoCs
Processes:
explorer.exespoolsv.exeUnlocker_2.exeicsys.icn.exedescription ioc process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Unlocker_2.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 3600 sc.exe 224 sc.exe 2484 sc.exe 2084 sc.exe 2536 sc.exe 1752 sc.exe 3904 sc.exe -
Kills process with taskkill 28 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4424 taskkill.exe 4300 taskkill.exe 3788 taskkill.exe 652 taskkill.exe 2100 taskkill.exe 4960 taskkill.exe 4356 taskkill.exe 1128 taskkill.exe 4864 taskkill.exe 5032 taskkill.exe 3980 taskkill.exe 3808 taskkill.exe 1660 taskkill.exe 2592 taskkill.exe 4764 taskkill.exe 3628 taskkill.exe 1724 taskkill.exe 3956 taskkill.exe 4688 taskkill.exe 1396 taskkill.exe 4984 taskkill.exe 1240 taskkill.exe 2420 taskkill.exe 2996 taskkill.exe 512 taskkill.exe 2672 taskkill.exe 2360 taskkill.exe 3424 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Unlocker_2.exeicsys.icn.exepid process 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 4160 Unlocker_2.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2448 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2684 explorer.exe 1800 svchost.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 652 taskkill.exe Token: SeDebugPrivilege 2360 taskkill.exe Token: SeDebugPrivilege 2672 taskkill.exe Token: SeDebugPrivilege 4356 taskkill.exe Token: SeDebugPrivilege 2592 taskkill.exe Token: SeDebugPrivilege 5032 taskkill.exe Token: SeDebugPrivilege 3424 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 1396 taskkill.exe Token: SeDebugPrivilege 4688 taskkill.exe Token: SeDebugPrivilege 3980 taskkill.exe Token: SeDebugPrivilege 4424 taskkill.exe Token: SeDebugPrivilege 4960 taskkill.exe Token: SeDebugPrivilege 1240 taskkill.exe Token: SeDebugPrivilege 3808 taskkill.exe Token: SeDebugPrivilege 2100 taskkill.exe Token: SeDebugPrivilege 1128 taskkill.exe Token: SeDebugPrivilege 2420 taskkill.exe Token: SeDebugPrivilege 4984 taskkill.exe Token: SeDebugPrivilege 2996 taskkill.exe Token: SeDebugPrivilege 3628 taskkill.exe Token: SeDebugPrivilege 512 taskkill.exe Token: SeDebugPrivilege 4300 taskkill.exe Token: SeDebugPrivilege 4864 taskkill.exe Token: SeDebugPrivilege 1724 taskkill.exe Token: SeDebugPrivilege 3788 taskkill.exe Token: SeDebugPrivilege 3956 taskkill.exe Token: SeDebugPrivilege 1660 taskkill.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
Unlocker_2.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 4160 Unlocker_2.exe 4160 Unlocker_2.exe 2448 icsys.icn.exe 2448 icsys.icn.exe 2684 explorer.exe 2684 explorer.exe 1156 spoolsv.exe 1156 spoolsv.exe 1800 svchost.exe 1800 svchost.exe 1364 spoolsv.exe 1364 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Unlocker_2.exeunlocker_2.exe cmd.execmd.execmd.execmd.execmd.execmd.exeicsys.icn.execmd.execmd.execmd.execmd.execmd.exeexplorer.exedescription pid process target process PID 4160 wrote to memory of 3484 4160 Unlocker_2.exe unlocker_2.exe PID 4160 wrote to memory of 3484 4160 Unlocker_2.exe unlocker_2.exe PID 4160 wrote to memory of 2448 4160 Unlocker_2.exe icsys.icn.exe PID 4160 wrote to memory of 2448 4160 Unlocker_2.exe icsys.icn.exe PID 4160 wrote to memory of 2448 4160 Unlocker_2.exe icsys.icn.exe PID 3484 wrote to memory of 4472 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 4472 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 2824 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 2824 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 2104 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 2104 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 4668 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 4668 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 764 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 764 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 548 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 548 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 3732 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 3732 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 1436 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 1436 3484 unlocker_2.exe cmd.exe PID 548 wrote to memory of 652 548 cmd.exe taskkill.exe PID 548 wrote to memory of 652 548 cmd.exe taskkill.exe PID 1436 wrote to memory of 2996 1436 cmd.exe certutil.exe PID 1436 wrote to memory of 2996 1436 cmd.exe certutil.exe PID 2824 wrote to memory of 2672 2824 cmd.exe taskkill.exe PID 2824 wrote to memory of 2672 2824 cmd.exe taskkill.exe PID 2104 wrote to memory of 4356 2104 cmd.exe taskkill.exe PID 2104 wrote to memory of 4356 2104 cmd.exe taskkill.exe PID 4668 wrote to memory of 2360 4668 cmd.exe taskkill.exe PID 4668 wrote to memory of 2360 4668 cmd.exe taskkill.exe PID 764 wrote to memory of 2084 764 cmd.exe sc.exe PID 764 wrote to memory of 2084 764 cmd.exe sc.exe PID 3484 wrote to memory of 1868 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 1868 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 4944 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 4944 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 3216 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 3216 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 1020 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 1020 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 2704 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 2704 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 1660 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 1660 3484 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 2684 2448 icsys.icn.exe explorer.exe PID 2448 wrote to memory of 2684 2448 icsys.icn.exe explorer.exe PID 2448 wrote to memory of 2684 2448 icsys.icn.exe explorer.exe PID 2704 wrote to memory of 2592 2704 cmd.exe taskkill.exe PID 2704 wrote to memory of 2592 2704 cmd.exe taskkill.exe PID 4944 wrote to memory of 5032 4944 cmd.exe taskkill.exe PID 4944 wrote to memory of 5032 4944 cmd.exe taskkill.exe PID 1868 wrote to memory of 3424 1868 cmd.exe taskkill.exe PID 1868 wrote to memory of 3424 1868 cmd.exe taskkill.exe PID 3216 wrote to memory of 4764 3216 cmd.exe taskkill.exe PID 3216 wrote to memory of 4764 3216 cmd.exe taskkill.exe PID 1020 wrote to memory of 2536 1020 cmd.exe sc.exe PID 1020 wrote to memory of 2536 1020 cmd.exe sc.exe PID 2684 wrote to memory of 1156 2684 explorer.exe spoolsv.exe PID 2684 wrote to memory of 1156 2684 explorer.exe spoolsv.exe PID 2684 wrote to memory of 1156 2684 explorer.exe spoolsv.exe PID 3484 wrote to memory of 5012 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 5012 3484 unlocker_2.exe cmd.exe PID 3484 wrote to memory of 4904 3484 unlocker_2.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Unlocker_2.exe"C:\Users\Admin\AppData\Local\Temp\Unlocker_2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4160 -
\??\c:\users\admin\appdata\local\temp\unlocker_2.exec:\users\admin\appdata\local\temp\unlocker_2.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 43⤵PID:4472
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:2084
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:3732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "c:\users\admin\appdata\local\temp\unlocker_2.exe " MD53⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\system32\certutil.execertutil -hashfile "c:\users\admin\appdata\local\temp\unlocker_2.exe " MD54⤵PID:2996
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:2536
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:1660
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:5012
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:4904
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:1008
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:4888
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:3904
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:4804
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:2752
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:3456
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:1452
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:2660
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:1212
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:1752
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:4260
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:3960
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:1564
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:2444
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:864
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:1912
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:224
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:3996
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:1780
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:2708
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:396
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:1000
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:2960
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:3600
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:2788
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:2728
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:1616
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:4032
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:1640
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:1840
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:2484
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:4368
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:2232
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1156 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1800 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
906KB
MD58d1c02e1de7dd05c14a26cb2b7e2bb38
SHA11ce626e0b0e84d4762f445a56ed5130def0e0914
SHA2563661e65d26427186355d603643731105ed4dbd152904b6bf56a7bbd5b2443653
SHA5121a08981e91f5ea2f368ad6eccacaa4c8377b856eb1785e7af2e236752763170b867fd27f394070b2e342b2b1b2b2742477ad0b26a9b491d7949cc1fc0341e49c
-
Filesize
2.5MB
MD5d9e6590ddb9cf00ad58f9ecb88820768
SHA1260114f1943c5ea8849923c6cbece687626fa7f4
SHA256dfbec28773f1d03fff1571b011da3a8a4f23ec860099c8b91c0f7f4ae80f0ec9
SHA51234400aebaed4447370816327758d1da4e3175d2939fe86c64c5654be86e545fa2a0cc64d6b01e9da794bd43eb20109b64f4163a7447e1c431542ebc5ae5f8fad
-
Filesize
2.5MB
MD54ee55df736258d4d7836af2f8d7bb2f6
SHA1a5f30f93cf6ea14cab303f4d0b399ea162aeb4a3
SHA2562c3e75ec4099263cb6d3c4ee6c78ec363b087d2c1b1a175e531c200e563ba0c0
SHA512c6e282fe618da2c751b312f7da4b4a2b1f99dfd507c45e7c56400e21db735866481d189517ffaebd8220cc2ea5c90ef00c555b12341ad81905c47313d3903f63
-
Filesize
2.5MB
MD595fa85f347ec3ee60518c0e0a56c1793
SHA1c2ded6de5450f8abfc844fccd4b3b45aa537429f
SHA2565373ca56aa039ec380e92434953b0bf832d423e4f528e1e3acb0f7e84fc6112b
SHA5127a9017f098086931fe82344bdf079fc6df53e6bce8fff62c5b94e926ccda5519e8765b4791bb7c8d009e559fc1b497d9cddbcfc29da6fcd4eefcf49b52080cea
-
Filesize
2.5MB
MD53ecebfcb5ee72071a81b98db1e29a8af
SHA11e8c513e8f24c09939837ba55761e5cc3dc2e990
SHA256400365e612cc41b2a2f252090694c0a99410fdc84bd8e3e8b7aaf6db22a74f6f
SHA51256ae817ec6687bae6784d07ad1b6bcb6cf9941582e038d21369d13fd6123d951b434f13c9d03c87576614872b56e202e216f56fffb518430ed650e317f42b0f1