Skip to content

Terminator is a compact utility coded in C#, designed to end processes that have RtlSetProcessIsCritical enabled.

License

Notifications You must be signed in to change notification settings

Chainski/Terminator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation


Terminator

Terminator is a compact utility coded in C#, designed to end processes that have RtlSetProcessIsCritical enabled see bsod.cs

Requirements

  • An administrator account.
  • Tested on Windows 10, version 22H2 (19045.4355) amd64

Usage

  • Download the program from releases.
  • Run Terminator.exe

Proof of Concept 👁

Preview.mp4

How it Works ?

Terminator defines a method called UnProtectAndTerminate that aims to terminate a specified process after removing its protection. It utilizes platform invoke to call functions from system DLLs. First, it imports functions from ntdll.dll and kernel32.dll using DllImport attribute. These functions are NtSetInformationProcess to alter process information and TerminateProcess to forcibly terminate a process. Within the UnProtectAndTerminate method, it enters debug mode using Process.EnterDebugMode(). Then it attempts to open the target process using OpenProcess, passing necessary parameters including the process ID. Afterward, it calls NtSetInformationProcess with appropriate arguments to remove the process protection. If successful, it terminates the process using TerminateProcess with an exit code of 0. Terminator also provides feedback via console output, indicating success or failure in terminating the process.

Why was this tool made ?

I developed this tool specifically designed to terminate processes containing the RtlSetProcessIsCritical feature, after encountering several malware samples utilizing this technique during my analysis. This tool proved invaluable for expediting dynamic analysis, enabling swift termination of potentially harmful processes. By swiftly neutralizing these processes, analysts can efficiently investigate malware behavior, identify malicious activities, and develop effective countermeasures. Such tools not only streamline the analysis process but also enhance cybersecurity efforts by empowering analysts to respond proactively to emerging threats.

License

This project is licensed under the GNU License - see the LICENSE file for details