File name:

KMSpico 10.1.8 Final + Portable [4realtorrentz].zip

Full analysis: https://app.any.run/tasks/1ba6dd08-8320-46a2-9603-750c9c31e8f7
Verdict: Malicious activity
Analysis date: May 05, 2019, 11:41:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

807AAD729C335CCBD642AF1020F66A19

SHA1:

1C7A9DF4D891C4F31572A16CEF5355608DC2AA8F

SHA256:

324A7F0171C106ACD368BCFFC527AA79C41D77A969039ACD680BD66A8E90FE37

SSDEEP:

196608:RKlPipkpqeTOlIj5oexfXvM7gp+ZRnOh1Vm:RKlYZGOlImsfXXp+ZpO9m

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • KMSpico_setup.exe (PID: 2516)
      • KMSELDI.exe (PID: 3368)
      • KMSpico_setup.exe (PID: 2336)
      • KMSELDI.exe (PID: 2356)
    • Loads dropped or rewritten executable

      • KMSELDI.exe (PID: 2356)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • KMSpico_setup.exe (PID: 2336)
      • KMSpico_setup.tmp (PID: 2876)
      • KMSpico_setup.exe (PID: 2516)
      • WinRAR.exe (PID: 3140)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 3140)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2668)
    • Reads Environment values

      • KMSELDI.exe (PID: 2356)
    • Creates or modifies windows services

      • KMSELDI.exe (PID: 2356)
  • INFO

    • Application was dropped or rewritten from another process

      • KMSpico_setup.tmp (PID: 2748)
      • KMSpico_setup.tmp (PID: 2876)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3388)
      • iexplore.exe (PID: 1680)
    • Creates files in the user directory

      • iexplore.exe (PID: 3388)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1680)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3388)
    • Loads dropped or rewritten executable

      • KMSpico_setup.tmp (PID: 2876)
    • Changes internet zones settings

      • iexplore.exe (PID: 1680)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1680)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2015:11:01 05:46:20
ZipCRC: 0x02e210dd
ZipCompressedSize: 3175946
ZipUncompressedSize: 3210792
ZipFileName: KMSpico Install/KMSpico_setup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
15
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start drop and start drop and start winrar.exe kmspico_setup.exe kmspico_setup.tmp no specs kmspico_setup.exe kmspico_setup.tmp notepad.exe no specs cmd.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs iexplore.exe iexplore.exe kmseldi.exe no specs kmseldi.exe

Process information

PID
CMD
Path
Indicators
Parent process
1680"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2336"C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\KMSpico_setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\KMSpico_setup.exe
WinRAR.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
KMSpico Setup
Exit code:
2
Version:
10.1.8
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3140.3677\kmspico install\kmspico_setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2356"C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.7723\KMSpico Portable\KMSELDI.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.7723\KMSpico Portable\KMSELDI.exe
WinRAR.exe
User:
admin
Company:
@ByELDI
Integrity Level:
HIGH
Description:
KMS GUI ELDI
Exit code:
0
Version:
36.0.0.8
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3140.7723\kmspico portable\kmseldi.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2516"C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\KMSpico_setup.exe" /SPAWNWND=$30186 /NOTIFYWND=$5013E C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\KMSpico_setup.exe
KMSpico_setup.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
KMSpico Setup
Exit code:
2
Version:
10.1.8
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3140.3677\kmspico install\kmspico_setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2668cmd /c ""C:\Users\admin\AppData\Local\Temp\Rar$DIa3140.5744\UnInstall_Service.cmd" "C:\Windows\system32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1060
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2748"C:\Users\admin\AppData\Local\Temp\is-NMIOJ.tmp\KMSpico_setup.tmp" /SL5="$5013E,2933903,69120,C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\KMSpico_setup.exe" C:\Users\admin\AppData\Local\Temp\is-NMIOJ.tmp\KMSpico_setup.tmpKMSpico_setup.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
2
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-nmioj.tmp\kmspico_setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2876"C:\Users\admin\AppData\Local\Temp\is-AS5LL.tmp\KMSpico_setup.tmp" /SL5="$40184,2933903,69120,C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\KMSpico_setup.exe" /SPAWNWND=$30186 /NOTIFYWND=$5013E C:\Users\admin\AppData\Local\Temp\is-AS5LL.tmp\KMSpico_setup.tmp
KMSpico_setup.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
2
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-as5ll.tmp\kmspico_setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3140"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\KMSpico 10.1.8 Final + Portable [4realtorrentz].zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3256sc stop "Service KMSELDI" C:\Windows\system32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
A tool to aid in developing services for WindowsNT
Exit code:
1060
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3368"C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.7723\KMSpico Portable\KMSELDI.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3140.7723\KMSpico Portable\KMSELDI.exeWinRAR.exe
User:
admin
Company:
@ByELDI
Integrity Level:
MEDIUM
Description:
KMS GUI ELDI
Exit code:
3221226540
Version:
36.0.0.8
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3140.7723\kmspico portable\kmseldi.exe
c:\systemroot\system32\ntdll.dll
Total events
1 537
Read events
1 400
Write events
129
Delete events
8

Modification events

(PID) Process:(3140) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3140) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3140) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3140) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\KMSpico 10.1.8 Final + Portable [4realtorrentz].zip
(PID) Process:(3140) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3140) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3140) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3140) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3140) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
(PID) Process:(3140) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\ieframe.dll,-10046
Value:
Internet Shortcut
Executable files
15
Suspicious files
0
Text files
772
Unknown types
35

Dropped files

PID
Process
Filename
Type
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\UnInstall_Service.cmdtext
MD5:D228137B7B77D7EF3FCDC06DDABEBEEF
SHA256:0552A48861A2C9825D51EEB0197A959DC85E4E960FB00CEE89CCC4806EAADBA8
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Portable\cert\kmscert2010\Access\AccessVLReg64.regtext
MD5:3C688EC4EDC18A1FFA7EA020556504DB
SHA256:EE5C8D9592F48DEED26590C06756CC7EABF96ED0BEA56B8DD87EC6C80871B9B9
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Portable\cert\kmscert2010\Access\Access_KMS_Client.PL.xrm-msxml
MD5:CEE2D16BF6FBA85A5DE6ED12CBADA5BB
SHA256:40040A704FA891D7EA4F5791759023527B3C024A94EE76F1CDCB01C71B8E9898
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Portable\cert\kmscert2010\Access\Access_KMS_Client.RAC_Priv.xrm-msxml
MD5:A279AB8F8C617DF9C5411FDC199E7676
SHA256:9084E7F35F7220EC760719B29721A267943178972578E739BDAC2D6475A573E3
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Portable\cert\kmscert2010\Access\Access_KMS_Client.RAC_Pub.xrm-msxml
MD5:A279AB8F8C617DF9C5411FDC199E7676
SHA256:9084E7F35F7220EC760719B29721A267943178972578E739BDAC2D6475A573E3
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\ReadMe KMSpico Install.txttext
MD5:48CEDF7CFFF080EE0F296B20182DA27B
SHA256:5D2644CBD9EE95B045DDE9A557D3D75A2232133224BD5F8160F18AAA09B97CF6
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Portable\Auto (Run as Admin).cmdtext
MD5:3D9673422F0CDD485ADE60AC1ABB2F62
SHA256:7339A4CC48220A161FCC737ED26E99E5678A4D1FAA3F7E2686C46B5A5D234828
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Portable\cert\installAll.cmdtext
MD5:EC0220E538223DF10E4CCAEDCEAA1E3A
SHA256:784E531D9E132F24F622B3EB74BEC791D2843912A28C25B28A1BE09E9E771C9B
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Portable\cert\kmscert2010\Access\AccessVLRegWOW.regtext
MD5:50122EA723FFE7367AD811FC333594C2
SHA256:18B8099777C8956C4299DA79A44BF9CB3ADDE96B652A0C6D063BF6C9A925B0B8
3140WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3140.3677\KMSpico Install\KMSpico_setup.exeexecutable
MD5:BD8CB75CD1D80A311D72DB68B7BDE770
SHA256:88F11ABDD3E82C4FF30C0B67D4AF73E10DF6F83D6CBE0CE4F94FC2B2EBC013B8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
32
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1680
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3388
iexplore.exe
GET
301
91.209.70.107:80
http://www.4realtorrentz.com/
RU
binary
20 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1680
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3388
iexplore.exe
91.209.70.107:80
www.4realtorrentz.com
OOO Fishnet Communications
RU
unknown
3388
iexplore.exe
91.209.70.107:443
www.4realtorrentz.com
OOO Fishnet Communications
RU
unknown
3388
iexplore.exe
172.217.23.170:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3388
iexplore.exe
192.0.77.2:443
i0.wp.com
Automattic, Inc
US
suspicious
3388
iexplore.exe
192.0.78.17:443
wordpress.com
Automattic, Inc
US
unknown
3388
iexplore.exe
192.0.76.3:443
stats.wp.com
Automattic, Inc
US
suspicious
3388
iexplore.exe
192.0.77.32:443
s0.wp.com
Automattic, Inc
US
suspicious
3388
iexplore.exe
185.60.216.19:443
connect.facebook.net
Facebook, Inc.
IE
whitelisted
1680
iexplore.exe
91.209.70.107:443
www.4realtorrentz.com
OOO Fishnet Communications
RU
unknown

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.4realtorrentz.com
  • 91.209.70.107
malicious
c0.wp.com
  • 192.0.77.37
whitelisted
fonts.googleapis.com
  • 172.217.23.170
whitelisted
fonts.gstatic.com
  • 216.58.205.227
whitelisted
wordpress.com
  • 192.0.78.17
  • 192.0.78.9
whitelisted
i0.wp.com
  • 192.0.77.2
whitelisted
i2.wp.com
  • 192.0.77.2
whitelisted
i1.wp.com
  • 192.0.77.2
whitelisted
stats.wp.com
  • 192.0.76.3
whitelisted

Threats

No threats detected
No debug info