File name:

Activador.zip

Full analysis: https://app.any.run/tasks/c8bccfba-3d36-4095-b6bd-c8ccd7011194
Verdict: Malicious activity
Analysis date: December 14, 2023, 18:07:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

912C65FBF54CECB90F398BF79A3635A8

SHA1:

50E32E41E053390D112A0D16A9C6F8E58029A18B

SHA256:

543EA9BBFF390B77E7C45B645AD7EA1C6F52838A788F6A92772DE775E8AE65F1

SSDEEP:

98304:lOumKqav3ebKd9BBmhoZzmhamIOyDBh7RHsZ2UvhndEbmMggt2HYbPDArxGSmtef:b7+WCpe5a

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Activador.exe (PID: 1088)
      • Activador.exe (PID: 2300)
      • Activador.tmp (PID: 600)
    • Creates a writable file in the system directory

      • Activador.tmp (PID: 600)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 3144)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • Activador.tmp (PID: 600)
    • Process drops legitimate windows executable

      • Activador.tmp (PID: 600)
    • Executing commands from ".cmd" file

      • Activador.tmp (PID: 600)
    • Starts CMD.EXE for commands execution

      • Activador.tmp (PID: 600)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 1860)
    • Creates or modifies Windows services

      • KMSELDI.exe (PID: 240)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3048)
    • Checks supported languages

      • Activador.exe (PID: 2300)
      • Activador.tmp (PID: 2620)
      • Activador.exe (PID: 1088)
      • Activador.tmp (PID: 600)
      • UninsHs.exe (PID: 1608)
      • KMSELDI.exe (PID: 240)
      • AutoPico.exe (PID: 3396)
      • wmpnscfg.exe (PID: 2128)
      • KMSELDI.exe (PID: 2380)
    • Reads the computer name

      • Activador.tmp (PID: 2620)
      • Activador.tmp (PID: 600)
      • KMSELDI.exe (PID: 240)
      • AutoPico.exe (PID: 3396)
      • wmpnscfg.exe (PID: 2128)
      • KMSELDI.exe (PID: 2380)
    • Create files in a temporary directory

      • Activador.exe (PID: 2300)
      • Activador.tmp (PID: 600)
      • Activador.exe (PID: 1088)
    • Creates files in the program directory

      • Activador.tmp (PID: 600)
      • AutoPico.exe (PID: 3396)
      • KMSELDI.exe (PID: 240)
      • KMSELDI.exe (PID: 2380)
    • Reads the machine GUID from the registry

      • KMSELDI.exe (PID: 240)
      • AutoPico.exe (PID: 3396)
      • KMSELDI.exe (PID: 2380)
    • Reads Environment values

      • KMSELDI.exe (PID: 240)
      • AutoPico.exe (PID: 3396)
      • KMSELDI.exe (PID: 2380)
    • Reads product name

      • KMSELDI.exe (PID: 240)
      • AutoPico.exe (PID: 3396)
      • KMSELDI.exe (PID: 2380)
    • Reads Microsoft Office registry keys

      • AutoPico.exe (PID: 3396)
      • KMSELDI.exe (PID: 240)
      • KMSELDI.exe (PID: 2380)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2128)
      • KMSELDI.exe (PID: 2488)
      • KMSELDI.exe (PID: 2380)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2015:12:01 21:51:40
ZipCRC: 0x50991a2b
ZipCompressedSize: 3188037
ZipUncompressedSize: 3222904
ZipFileName: Activador.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
15
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe no specs activador.exe no specs activador.tmp no specs activador.exe activador.tmp no specs cmd.exe no specs uninshs.exe no specs cmd.exe no specs sc.exe no specs schtasks.exe no specs kmseldi.exe autopico.exe wmpnscfg.exe no specs kmseldi.exe no specs kmseldi.exe

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Program Files\KMSpico\KMSELDI.exe" /silent /backupC:\Program Files\KMSpico\KMSELDI.exe
Activador.tmp
User:
admin
Company:
@ByELDI
Integrity Level:
HIGH
Description:
KMS GUI ELDI
Exit code:
4294967295
Version:
37.0.0.0
Modules
Images
c:\program files\kmspico\kmseldi.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
600"C:\Users\admin\AppData\Local\Temp\is-KV1PH.tmp\Activador.tmp" /SL5="$13016C,2946007,69120,C:\Users\admin\AppData\Local\Temp\Rar$EXa3048.26323\Activador.exe" /SPAWNWND=$E012E /NOTIFYWND=$1001F6 C:\Users\admin\AppData\Local\Temp\is-KV1PH.tmp\Activador.tmpActivador.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-kv1ph.tmp\activador.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1088"C:\Users\admin\AppData\Local\Temp\Rar$EXa3048.26323\Activador.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3048.26323\Activador.exeWinRAR.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
KMSpico Setup
Exit code:
0
Version:
10.1.9
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3048.26323\activador.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1608"C:\Program Files\KMSpico\UninsHs.exe" /r0=KMSpico,default,C:\Users\admin\AppData\Local\Temp\Rar$EXa3048.26323\Activador.exeC:\Program Files\KMSpico\UninsHs.exeActivador.tmp
User:
admin
Company:
Han-soft
Integrity Level:
HIGH
Description:
Uninstall for InnoSetup by Han-soft
Exit code:
0
Version:
2.1.0.283
Modules
Images
c:\program files\kmspico\uninshs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
1860"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Service.cmd""C:\Windows\System32\cmd.exeActivador.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2128"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2300"C:\Users\admin\AppData\Local\Temp\Rar$EXa3048.26323\Activador.exe" /SPAWNWND=$E012E /NOTIFYWND=$1001F6 C:\Users\admin\AppData\Local\Temp\Rar$EXa3048.26323\Activador.exe
Activador.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
KMSpico Setup
Exit code:
0
Version:
10.1.9
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3048.26323\activador.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2380"C:\Program Files\KMSpico\KMSELDI.exe" C:\Program Files\KMSpico\KMSELDI.exe
explorer.exe
User:
admin
Company:
@ByELDI
Integrity Level:
HIGH
Description:
KMS GUI ELDI
Exit code:
0
Version:
37.0.0.0
Modules
Images
c:\program files\kmspico\kmseldi.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2488"C:\Program Files\KMSpico\KMSELDI.exe" C:\Program Files\KMSpico\KMSELDI.exeexplorer.exe
User:
admin
Company:
@ByELDI
Integrity Level:
MEDIUM
Description:
KMS GUI ELDI
Exit code:
3221226540
Version:
37.0.0.0
Modules
Images
c:\program files\kmspico\kmseldi.exe
c:\windows\system32\ntdll.dll
2620"C:\Users\admin\AppData\Local\Temp\is-E2OVN.tmp\Activador.tmp" /SL5="$1001F6,2946007,69120,C:\Users\admin\AppData\Local\Temp\Rar$EXa3048.26323\Activador.exe" C:\Users\admin\AppData\Local\Temp\is-E2OVN.tmp\Activador.tmpActivador.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-e2ovn.tmp\activador.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
Total events
4 749
Read events
4 694
Write events
49
Delete events
6

Modification events

(PID) Process:(3048) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
22
Suspicious files
35
Text files
718
Unknown types
0

Dropped files

PID
Process
Filename
Type
2300Activador.exeC:\Users\admin\AppData\Local\Temp\is-KV1PH.tmp\Activador.tmpexecutable
MD5:1778C1F66FF205875A6435A33229AB3C
SHA256:95C06ACAC4FE4598840E5556F9613D43AA1039C52DAC64536F59E45A70F79DA6
600Activador.tmpC:\Program Files\KMSpico\is-ANMCN.tmpexecutable
MD5:30C7E8E918403B9247315249A8842CE5
SHA256:6D4FA6727CA952B7B44FA9F3538D84B64E06C76908C76FADE7846532A7115A49
3048WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3048.26323\Activador.exeexecutable
MD5:1A5FC26D8596C2573C7A5E480FB94724
SHA256:3F1EA290FBA74C05430E50488A3CE7C146F7328FCE21F6F41A098FD68FA09DA6
600Activador.tmpC:\Program Files\KMSpico\is-19Q6R.tmpexecutable
MD5:CC4D231DF34E57F59EB970353C7D9DE2
SHA256:AFC8A00883A4EA07DF2DC1D4ED02F8A23B35C9456413B438A2D9CE3AE5076638
600Activador.tmpC:\Program Files\KMSpico\unins000.exeexecutable
MD5:30C7E8E918403B9247315249A8842CE5
SHA256:6D4FA6727CA952B7B44FA9F3538D84B64E06C76908C76FADE7846532A7115A49
600Activador.tmpC:\Windows\system32\is-UN5RA.tmpexecutable
MD5:3D733144477CADCF77009EF614413630
SHA256:392D73617FD0A55218261572ECE2F50301E0CFA29B5ED24C3F692130AA406AF3
600Activador.tmpC:\Program Files\KMSpico\is-QHTG9.tmpexecutable
MD5:3D733144477CADCF77009EF614413630
SHA256:392D73617FD0A55218261572ECE2F50301E0CFA29B5ED24C3F692130AA406AF3
600Activador.tmpC:\Windows\System32\Vestris.ResourceLib.dllexecutable
MD5:3D733144477CADCF77009EF614413630
SHA256:392D73617FD0A55218261572ECE2F50301E0CFA29B5ED24C3F692130AA406AF3
600Activador.tmpC:\Program Files\KMSpico\is-OHT2O.tmpexecutable
MD5:F15C15D2D2A29BC84C6DA752A1D403A9
SHA256:D934F4619C39F88D9630AAD2136AF719E6C20976B5FBFA77BBA3D97D3728D5E4
600Activador.tmpC:\Program Files\KMSpico\is-KHSP8.tmpexecutable
MD5:437B423586BC2DB5957EDB2B672CB7F1
SHA256:A0CA411AAEBD5D38D0536738FDEB72589A33FA7CA5CC0E9E7C98033D32611111
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
4
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
240
KMSELDI.exe
75.119.140.230:123
1.pool.ntp.org
unknown
3396
AutoPico.exe
176.9.157.155:123
1.pool.ntp.org
unknown

DNS requests

Domain
IP
Reputation
1.pool.ntp.org
  • 131.188.3.223
  • 51.75.67.47
  • 75.119.140.230
  • 176.9.157.155
whitelisted
2.pool.ntp.org
  • 51.75.67.47
  • 194.25.134.196
  • 176.9.157.155
  • 185.248.189.10
whitelisted
www.google.com
  • 142.250.186.132
whitelisted

Threats

No threats detected
No debug info