Analysis
-
max time kernel
42s -
max time network
26s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-05-2024 05:13
Behavioral task
behavioral1
Sample
Unlocker_2.exe
Resource
win11-20240426-en
General
-
Target
Unlocker_2.exe
-
Size
3.4MB
-
MD5
9b25d73c3a94e37f07fd23154e004c8b
-
SHA1
8ef59559d03711ca7f2185e98039aecdb11e6162
-
SHA256
e65c8c69d128676f200db5ae91937aa4152fd93fb66e8098972ce33f3f029226
-
SHA512
c5c3cd962290dff48cdadf98e249577c762bac978dc138fd1e9fc00ea02e504e0f632a6b04db56f3d0224a3a8cdf0ba12ead2983d52c9ecde354f75eae717e92
-
SSDEEP
49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxj3GT0DZ8oNZ+O93+xaj:Mxx9NUFkQx753uWuCyyxaCruQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exeUnlocker_2.exeicsys.icn.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Unlocker_2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
spoolsv.exeUnlocker_2.exeicsys.icn.exeexplorer.exesvchost.exespoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Unlocker_2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Unlocker_2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 6 IoCs
Processes:
unlocker_2.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2448 unlocker_2.exe 3412 icsys.icn.exe 352 explorer.exe 904 spoolsv.exe 4804 svchost.exe 4916 spoolsv.exe -
Processes:
resource yara_rule behavioral1/memory/4596-0-0x0000000000400000-0x0000000000A0E000-memory.dmp themida C:\Windows\Resources\Themes\icsys.icn.exe themida \??\c:\windows\resources\themes\explorer.exe themida behavioral1/memory/352-21-0x0000000000400000-0x0000000000A0E000-memory.dmp themida \??\c:\windows\resources\spoolsv.exe themida behavioral1/memory/904-30-0x0000000000400000-0x0000000000A0E000-memory.dmp themida \??\c:\windows\resources\svchost.exe themida behavioral1/memory/4804-39-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/4916-44-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/4916-49-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/3412-55-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/904-52-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/4596-54-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/352-56-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/4804-57-0x0000000000400000-0x0000000000A0E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Processes:
Unlocker_2.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Unlocker_2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
Unlocker_2.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 4596 Unlocker_2.exe 3412 icsys.icn.exe 352 explorer.exe 904 spoolsv.exe 4804 svchost.exe 4916 spoolsv.exe -
Drops file in Windows directory 4 IoCs
Processes:
explorer.exespoolsv.exeUnlocker_2.exeicsys.icn.exedescription ioc process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Unlocker_2.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1140 sc.exe 4896 sc.exe 2304 sc.exe 4872 sc.exe 1264 sc.exe 4640 sc.exe 3844 sc.exe -
Kills process with taskkill 28 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2764 taskkill.exe 1636 taskkill.exe 4636 taskkill.exe 956 taskkill.exe 3060 taskkill.exe 1332 taskkill.exe 4316 taskkill.exe 732 taskkill.exe 3476 taskkill.exe 900 taskkill.exe 4620 taskkill.exe 4076 taskkill.exe 3092 taskkill.exe 2896 taskkill.exe 4788 taskkill.exe 1080 taskkill.exe 4140 taskkill.exe 2508 taskkill.exe 3880 taskkill.exe 3116 taskkill.exe 3624 taskkill.exe 2376 taskkill.exe 1856 taskkill.exe 1940 taskkill.exe 4716 taskkill.exe 4148 taskkill.exe 1284 taskkill.exe 2040 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Unlocker_2.exeicsys.icn.exepid process 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 4596 Unlocker_2.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 3412 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 352 explorer.exe 4804 svchost.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 4140 taskkill.exe Token: SeDebugPrivilege 4316 taskkill.exe Token: SeDebugPrivilege 732 taskkill.exe Token: SeDebugPrivilege 4076 taskkill.exe Token: SeDebugPrivilege 1940 taskkill.exe Token: SeDebugPrivilege 2040 taskkill.exe Token: SeDebugPrivilege 3880 taskkill.exe Token: SeDebugPrivilege 2896 taskkill.exe Token: SeDebugPrivilege 2764 taskkill.exe Token: SeDebugPrivilege 900 taskkill.exe Token: SeDebugPrivilege 2508 taskkill.exe Token: SeDebugPrivilege 3624 taskkill.exe Token: SeDebugPrivilege 4716 taskkill.exe Token: SeDebugPrivilege 4788 taskkill.exe Token: SeDebugPrivilege 3476 taskkill.exe Token: SeDebugPrivilege 2376 taskkill.exe Token: SeDebugPrivilege 4148 taskkill.exe Token: SeDebugPrivilege 4620 taskkill.exe Token: SeDebugPrivilege 1636 taskkill.exe Token: SeDebugPrivilege 3116 taskkill.exe Token: SeDebugPrivilege 4636 taskkill.exe Token: SeDebugPrivilege 1284 taskkill.exe Token: SeDebugPrivilege 956 taskkill.exe Token: SeDebugPrivilege 3060 taskkill.exe Token: SeDebugPrivilege 1856 taskkill.exe Token: SeDebugPrivilege 3092 taskkill.exe Token: SeDebugPrivilege 1080 taskkill.exe Token: SeDebugPrivilege 1332 taskkill.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
Unlocker_2.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 4596 Unlocker_2.exe 4596 Unlocker_2.exe 3412 icsys.icn.exe 3412 icsys.icn.exe 352 explorer.exe 352 explorer.exe 904 spoolsv.exe 904 spoolsv.exe 4804 svchost.exe 4804 svchost.exe 4916 spoolsv.exe 4916 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Unlocker_2.exeunlocker_2.exe cmd.execmd.execmd.execmd.execmd.exeicsys.icn.execmd.execmd.execmd.execmd.execmd.execmd.exeexplorer.exedescription pid process target process PID 4596 wrote to memory of 2448 4596 Unlocker_2.exe unlocker_2.exe PID 4596 wrote to memory of 2448 4596 Unlocker_2.exe unlocker_2.exe PID 4596 wrote to memory of 3412 4596 Unlocker_2.exe icsys.icn.exe PID 4596 wrote to memory of 3412 4596 Unlocker_2.exe icsys.icn.exe PID 4596 wrote to memory of 3412 4596 Unlocker_2.exe icsys.icn.exe PID 2448 wrote to memory of 3296 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3296 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4868 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4868 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3336 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3336 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 5036 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 5036 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 568 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 568 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3080 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3080 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 1632 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 1632 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4792 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4792 2448 unlocker_2.exe cmd.exe PID 4868 wrote to memory of 4140 4868 cmd.exe taskkill.exe PID 4868 wrote to memory of 4140 4868 cmd.exe taskkill.exe PID 4792 wrote to memory of 5060 4792 cmd.exe certutil.exe PID 4792 wrote to memory of 5060 4792 cmd.exe certutil.exe PID 3080 wrote to memory of 4316 3080 cmd.exe taskkill.exe PID 3080 wrote to memory of 4316 3080 cmd.exe taskkill.exe PID 3336 wrote to memory of 732 3336 cmd.exe taskkill.exe PID 3336 wrote to memory of 732 3336 cmd.exe taskkill.exe PID 5036 wrote to memory of 4076 5036 cmd.exe taskkill.exe PID 5036 wrote to memory of 4076 5036 cmd.exe taskkill.exe PID 3412 wrote to memory of 352 3412 icsys.icn.exe explorer.exe PID 3412 wrote to memory of 352 3412 icsys.icn.exe explorer.exe PID 3412 wrote to memory of 352 3412 icsys.icn.exe explorer.exe PID 568 wrote to memory of 1140 568 cmd.exe sc.exe PID 568 wrote to memory of 1140 568 cmd.exe sc.exe PID 2448 wrote to memory of 424 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 424 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3124 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3124 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3156 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 3156 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4524 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4524 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4796 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4796 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 2092 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 2092 2448 unlocker_2.exe cmd.exe PID 424 wrote to memory of 3880 424 cmd.exe taskkill.exe PID 424 wrote to memory of 3880 424 cmd.exe taskkill.exe PID 3124 wrote to memory of 1940 3124 cmd.exe taskkill.exe PID 3124 wrote to memory of 1940 3124 cmd.exe taskkill.exe PID 3156 wrote to memory of 2040 3156 cmd.exe taskkill.exe PID 3156 wrote to memory of 2040 3156 cmd.exe taskkill.exe PID 4524 wrote to memory of 4896 4524 cmd.exe sc.exe PID 4524 wrote to memory of 4896 4524 cmd.exe sc.exe PID 4796 wrote to memory of 2896 4796 cmd.exe taskkill.exe PID 4796 wrote to memory of 2896 4796 cmd.exe taskkill.exe PID 352 wrote to memory of 904 352 explorer.exe spoolsv.exe PID 352 wrote to memory of 904 352 explorer.exe spoolsv.exe PID 352 wrote to memory of 904 352 explorer.exe spoolsv.exe PID 2448 wrote to memory of 772 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 772 2448 unlocker_2.exe cmd.exe PID 2448 wrote to memory of 4652 2448 unlocker_2.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Unlocker_2.exe"C:\Users\Admin\AppData\Local\Temp\Unlocker_2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4596 -
\??\c:\users\admin\appdata\local\temp\unlocker_2.exec:\users\admin\appdata\local\temp\unlocker_2.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 43⤵PID:3296
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:1140
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:1632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "c:\users\admin\appdata\local\temp\unlocker_2.exe " MD53⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\system32\certutil.execertutil -hashfile "c:\users\admin\appdata\local\temp\unlocker_2.exe " MD54⤵PID:5060
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:4896
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:2092
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:772
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:4652
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:3580
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:5068
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:2304
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:1104
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:4856
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:4588
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:2192
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:3480
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:1752
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:4872
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:4488
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:2000
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:3568
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:1612
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:3452
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:236
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:1264
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:1588
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:1328
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:4376
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:4392
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:4736
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:3268
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:4640
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:2876
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:2176
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:640
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:844
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:2828
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:2092
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:3844
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:664
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:2076
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3412 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:904 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4804 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4916
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
906KB
MD58d1c02e1de7dd05c14a26cb2b7e2bb38
SHA11ce626e0b0e84d4762f445a56ed5130def0e0914
SHA2563661e65d26427186355d603643731105ed4dbd152904b6bf56a7bbd5b2443653
SHA5121a08981e91f5ea2f368ad6eccacaa4c8377b856eb1785e7af2e236752763170b867fd27f394070b2e342b2b1b2b2742477ad0b26a9b491d7949cc1fc0341e49c
-
Filesize
2.5MB
MD54ee55df736258d4d7836af2f8d7bb2f6
SHA1a5f30f93cf6ea14cab303f4d0b399ea162aeb4a3
SHA2562c3e75ec4099263cb6d3c4ee6c78ec363b087d2c1b1a175e531c200e563ba0c0
SHA512c6e282fe618da2c751b312f7da4b4a2b1f99dfd507c45e7c56400e21db735866481d189517ffaebd8220cc2ea5c90ef00c555b12341ad81905c47313d3903f63
-
Filesize
2.5MB
MD574c99e2aba9805e13eda1fda285f46c2
SHA1961fcd57dab28467215eeb2efb5e932e8195d807
SHA25613e10f820025c0c5ddf1db95d164ccffcf5ddeee71cf396c6fb4ab88822c94a6
SHA512561e4a10883c1ac9228be490b668d14434dda9275e673f1ffd098ef59e63f40467570f972eae90c4b79880064f6e4833cc32eb926071ab34775b9b34c9453ec6
-
Filesize
2.5MB
MD5d141abee53b3088584ea5a7a1daf23f5
SHA1002dd929133e0d4165bacc82cf3d9139fefe88a1
SHA2568022034e1c085493677ef703db122741df79c88ce584bb2986e8f17e3367b7b4
SHA512a82686f4c8348047f431134c2a9960565bba168079310f6e2a20d3af0c10fd8b4d9716097ace0527f11d9741e4d376f363e342cddc4ff3ec25c6ac454cf90d53
-
Filesize
2.5MB
MD516abf4caa680f4e2fd53d22d06893346
SHA1334938e974c83690af993fe3873106066ba3dbca
SHA256bee33bae38fa7fde922c7244c863829588bb2186d6c1c49fab40278e086104f2
SHA5123f42d6dd9427a6500f8db6ecdeb0c1c18da9c22974999d5758f816e436a0853829b3eeeeec02e0073181c29cb0f410ed9daed3eddbbba92c445b905cc7a9fe82