File name:

Unlock-Tool_v1.3.exe

Full analysis: https://app.any.run/tasks/d79aed00-b0b3-41bc-b50e-2fc625ae19cc
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 25, 2024, 10:59:23
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
telegram
phishing
vidar
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 7 sections
MD5:

C81DBC69D466C1A8AEBB97EA21DF1E41

SHA1:

F7B3C1A0EEFA00C05AB190572977E8A576CD5872

SHA256:

DD03CFEA3F201DCF038BCB7313ABC84B2327E891227E2DAAC6B98DC774C4BAFC

SSDEEP:

12288:Rb/aU8gx6nlLgTKbggyr6ALey4clXrx2qb:Rbwfl3cgyr6Akchx5b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2192)
    • Actions looks like stealing of personal data

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • VIDAR has been detected (YARA)

      • Unlock-Tool_v1.3.exe (PID: 6272)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Application launched itself

      • Unlock-Tool_v1.3.exe (PID: 6272)
    • Checks Windows Trust Settings

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Executes application which crashes

      • Unlock-Tool_v1.3.exe (PID: 6272)
    • Searches for installed software

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Unlock-Tool_v1.3.exe (PID: 6404)
  • INFO

    • Creates files in the program directory

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Creates files or folders in the user directory

      • Unlock-Tool_v1.3.exe (PID: 6404)
      • WerFault.exe (PID: 6608)
    • Checks supported languages

      • Unlock-Tool_v1.3.exe (PID: 6404)
      • Unlock-Tool_v1.3.exe (PID: 6272)
    • Reads the machine GUID from the registry

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Reads the computer name

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Attempting to use instant messaging service

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Reads the software policy settings

      • Unlock-Tool_v1.3.exe (PID: 6404)
      • WerFault.exe (PID: 6608)
    • Checks proxy server information

      • Unlock-Tool_v1.3.exe (PID: 6404)
      • WerFault.exe (PID: 6608)
    • Reads CPU info

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Reads Environment values

      • Unlock-Tool_v1.3.exe (PID: 6404)
    • Reads product name

      • Unlock-Tool_v1.3.exe (PID: 6404)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Vidar

(PID) Process(6272) Unlock-Tool_v1.3.exe
C2https://t.me/k04ael
URLhttps://steamcommunity.com/profiles/76561199809363512
RC40123456789abcdefghijklmnopqrstuvwxyz
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:24 11:11:05+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 145408
InitializedDataSize: 55296
UninitializedDataSize: -
EntryPoint: 0x8a82
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #VIDAR unlock-tool_v1.3.exe conhost.exe no specs unlock-tool_v1.3.exe no specs unlock-tool_v1.3.exe no specs unlock-tool_v1.3.exe no specs unlock-tool_v1.3.exe werfault.exe #PHISHING svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6272"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exe" C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\unlock-tool_v1.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Vidar
(PID) Process(6272) Unlock-Tool_v1.3.exe
C2https://t.me/k04ael
URLhttps://steamcommunity.com/profiles/76561199809363512
RC40123456789abcdefghijklmnopqrstuvwxyz
6280\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUnlock-Tool_v1.3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6372"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exe"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exeUnlock-Tool_v1.3.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\unlock-tool_v1.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6380"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exe"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exeUnlock-Tool_v1.3.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\unlock-tool_v1.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6392"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exe"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exeUnlock-Tool_v1.3.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\unlock-tool_v1.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6404"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exe"C:\Users\admin\AppData\Local\Temp\Unlock-Tool_v1.3.exe
Unlock-Tool_v1.3.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\unlock-tool_v1.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6608C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6272 -s 292C:\Windows\SysWOW64\WerFault.exe
Unlock-Tool_v1.3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 804
Read events
3 801
Write events
3
Delete events
0

Modification events

(PID) Process:(6404) Unlock-Tool_v1.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6404) Unlock-Tool_v1.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6404) Unlock-Tool_v1.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
9
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6608WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Unlock-Tool_v1.3_5682f52c39195efc679993a5cadf5d571b553f0_9507c476_3771c2d5-7798-4fa7-91cb-79095280047a\Report.wer
MD5:
SHA256:
6608WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER663F.tmp.dmpbinary
MD5:7F0754BAD104B3CA74851F48E693F4C4
SHA256:67C39F7A6B03B25F8F63D01F2A5E430E8F47809D1B64A3EF662E7975ECEAC9CD
6608WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER66EC.tmp.WERInternalMetadata.xmlxml
MD5:9CCFDC07A272E56C60E03D2C0B9EA6BD
SHA256:EFAFEAF29CA89305E74EE4ED80A87D7F5CE02386A1AF9B6B1EFAAC50D8020693
6404Unlock-Tool_v1.3.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:3DFCA46E00FFA4795C72A41375F159D3
SHA256:DCBA1A505396539BAC40A7253C9F5DCCF06CBB79957E21D56305E1FC3AF5F40E
6404Unlock-Tool_v1.3.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E1F6908773451B0FCBC2198A82900E64binary
MD5:A89F0EBC6495B55B75A1101373BCB46C
SHA256:26CB3906A45D685761340857938078C62FF247F2C8FB0DAC29DEB89FB5EA540D
6608WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER673B.tmp.xmlxml
MD5:9C64AC2059D42E78C63EF241A8BB51DE
SHA256:DE684E7A576DB3B377DB5FFD79F2BBAD192281850600C9AFE3961F16860D56C5
6404Unlock-Tool_v1.3.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E1F6908773451B0FCBC2198A82900E64binary
MD5:279D287B6F9BF073B742A1B708A687A7
SHA256:B9B42073838921AAFDF1B2D682205E93C3EACD4403D3040271811EE98CA4616F
6608WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6608WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6608WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Unlock-Tool_v1.3.exe.6272.dmpbinary
MD5:CD685259F415B012328DB9D77F165762
SHA256:99ECE7344328A5392D99713BE0824348FA7E9E3D16C1E45792BA64578AFE6231
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
45
DNS requests
21
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6608
WerFault.exe
GET
200
23.48.23.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6404
Unlock-Tool_v1.3.exe
GET
200
23.32.238.82:80
http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgNwz8PXImKfnhVNHh00GVNPyQ%3D%3D
unknown
whitelisted
6556
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6608
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
23.48.23.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.178:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
40.126.32.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.194
  • 23.48.23.167
  • 23.48.23.177
  • 23.48.23.180
  • 23.48.23.147
  • 23.48.23.145
  • 23.48.23.166
  • 23.48.23.164
  • 23.48.23.176
  • 23.48.23.143
  • 23.48.23.141
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 216.58.212.174
whitelisted
www.bing.com
  • 104.126.37.178
  • 104.126.37.179
  • 104.126.37.162
  • 104.126.37.168
  • 104.126.37.160
  • 104.126.37.128
  • 104.126.37.171
  • 104.126.37.161
  • 104.126.37.123
whitelisted
login.live.com
  • 40.126.32.68
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.136
  • 40.126.32.134
  • 20.190.160.20
  • 40.126.32.74
  • 40.126.32.76
unknown
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
t.me
  • 149.154.167.99
whitelisted
bijutr.shop
  • 188.245.216.205
malicious

Threats

PID
Process
Class
Message
6404
Unlock-Tool_v1.3.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
2192
svchost.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (bijutr .shop)
1 ETPRO signatures available at the full report
No debug info