File name:

KMSoffline 2.4.7 Portable.rar

Full analysis: https://app.any.run/tasks/cae2d83c-4000-416b-ae99-7fca7a807e28
Verdict: Malicious activity
Analysis date: January 04, 2025, 22:10:42
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-doc
netreactor
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

0255A40C6AD242488D66058171BD3B58

SHA1:

D4B66A35C8FA0FF43C402416EC9D4995FB680460

SHA256:

3EEE7F8F219B75ED89853D873E0BF92B1FF7036DAEB0E2D239E55EC4E26423DA

SSDEEP:

98304:1BggyN4NOwRYVNmqcaYVvgcWXK5ifVRQe7XR43STJqpI3lpun/0oyjVHZvbgT9b6:1bv72SUMVl/FSZVOmB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 4328)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4328)
      • KMSoffline.exe (PID: 3296)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 4328)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 4328)
  • INFO

    • Reads product name

      • KMSoffline.exe (PID: 3296)
    • Manual execution by a user

      • notepad.exe (PID: 540)
      • notepad.exe (PID: 4392)
      • KMSoffline.exe (PID: 3296)
      • KMSoffline.exe (PID: 2776)
    • Reads the computer name

      • KMSoffline.exe (PID: 3296)
      • MpCmdRun.exe (PID: 1536)
    • .NET Reactor protector has been detected

      • KMSoffline.exe (PID: 3296)
    • Reads the machine GUID from the registry

      • KMSoffline.exe (PID: 3296)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 4392)
      • notepad.exe (PID: 540)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4328)
    • Checks supported languages

      • KMSoffline.exe (PID: 3296)
      • MpCmdRun.exe (PID: 1536)
    • Reads Environment values

      • KMSoffline.exe (PID: 3296)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 4328)
      • KMSoffline.exe (PID: 3296)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 1536)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 3778601
UncompressedSize: 3932160
OperatingSystem: Win32
ArchivedFileName: KMSoffline 2.4.7 Portable/KMSoffline.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
8
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe kmsoffline.exe no specs kmsoffline.exe notepad.exe no specs notepad.exe no specs cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
540"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\KMSoffline.iniC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
732\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1536"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR4328.49687"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
2680C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR4328.49687\Rar$Scan26932.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
2776"C:\Users\admin\Desktop\KMSoffline.exe" C:\Users\admin\Desktop\KMSoffline.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
KMSoffline
Exit code:
3221226540
Version:
2.4.7.0
Modules
Images
c:\users\admin\desktop\kmsoffline.exe
c:\windows\system32\ntdll.dll
3296"C:\Users\admin\Desktop\KMSoffline.exe" C:\Users\admin\Desktop\KMSoffline.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
KMSoffline
Version:
2.4.7.0
Modules
Images
c:\users\admin\desktop\kmsoffline.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4328"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\KMSoffline 2.4.7 Portable.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4392"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\©danielo11.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
3 231
Read events
3 219
Write events
12
Delete events
0

Modification events

(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\KMSoffline 2.4.7 Portable.rar
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList
Operation:writeName:ArcSort
Value:
32
(PID) Process:(4328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList
Operation:writeName:ArcSort
Value:
0
Executable files
2
Suspicious files
0
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
3296KMSoffline.exeC:\Users\admin\Desktop\KMSoffline.initext
MD5:1353E6DBB94A36C74958634258BA1857
SHA256:78D7BB6CDED6169DBA4350C7450C5DA45BA95C5E4E94E7716B21777EDD62A2A7
4328WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR4328.49687\KMSoffline 2.4.7 Portable.rar\KMSoffline 2.4.7 Portable\KMSoffline.initext
MD5:26DBDE6B244434F9B3F3780361E2CBEA
SHA256:1B079472DF1154A22A5672117BB16E47015AEB7458C2B27CC9B8B70D10FAC257
1536MpCmdRun.exeC:\Users\admin\AppData\Local\Temp\MpCmdRun.logtext
MD5:C3FD420D4194E44A450541D35C78434D
SHA256:058A0D450AC6026C2DCD679FC54A6F735EB4B8AAC0BA80D3532F317266A10277
4328WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR4328.49687\KMSoffline 2.4.7 Portable.rar\KMSoffline 2.4.7 Portable\©danielo11.txttext
MD5:B3ED180EE551D0C10A0B73E565317AB1
SHA256:5CC3CA457938CEB84245C24F7A555FF60CE0E7AC6A3B2D83526B93FFBC456911
4328WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR4328.49687\Rar$Scan26932.battext
MD5:177EF9B29501C697AA77789CADC89E0A
SHA256:EC863E713B286F04EFC1451DBB74A25C4A9D08085A26A173D03A02E4FC77A3EC
4328WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR4328.49687\KMSoffline 2.4.7 Portable.rar\KMSoffline 2.4.7 Portable\KMSoffline.exeexecutable
MD5:314DC7558C2F493F568B63D33EE9080E
SHA256:5AD85A6781A37567898D772427FDBF12DBADA151A222EC58376D060FF4B4FC24
4328WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR4328.49687\KMSoffline 2.4.7 Portable.rar\KMSoffline 2.4.7 Portable\KMSoffline_x64.exeexecutable
MD5:F2BF56AE769F3BCE08618506646E3E7A
SHA256:CDBF1D999E71A6162ABFEFA69E41C995887EB157BD54ECFD556FDF5D12B68783
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
17
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
736
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
736
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
192.168.100.255:138
whitelisted
736
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
736
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

No threats detected
No debug info