File name:

KMS_Suite.v8.9.EN.cmd

Full analysis: https://app.any.run/tasks/5f8a8eb6-3217-47d0-aebf-dfc12dede4be
Verdict: Malicious activity
Analysis date: April 15, 2021, 22:26:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with very long lines, with CRLF line terminators
MD5:

167A50507AF92AE8DD9906405E9F2962

SHA1:

A6B8000433D72B13213E698F7DB4252448225667

SHA256:

8B8C5D5FFC3CDACCCA76BCE8D68C70347CB6D8A476A1251195C92BEF206DADBC

SSDEEP:

6144:6ycETPZcQgKwsjcuhn/gUAlpLPcDXOEn2tcJadfBE7:xBxyKSutsb4DXOEn8c0s7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • cmd.exe (PID: 2488)
      • cmd.exe (PID: 2064)
      • cmd.exe (PID: 1448)
    • Starts Visual C# compiler

      • powershell.exe (PID: 2768)
    • Drops executable file immediately after starts

      • expand.exe (PID: 2324)
      • xcopy.exe (PID: 3164)
    • Application was dropped or rewritten from another process

      • center.exe (PID: 2956)
      • DisableX.exe (PID: 2604)
  • SUSPICIOUS

    • Checks supported languages

      • cmd.exe (PID: 2488)
      • powershell.exe (PID: 896)
      • cmd.exe (PID: 2064)
      • mode.com (PID: 328)
      • powershell.exe (PID: 2768)
      • csc.exe (PID: 2728)
      • cvtres.exe (PID: 2804)
      • cmd.exe (PID: 1448)
      • powershell.exe (PID: 2296)
      • mode.com (PID: 1656)
      • center.exe (PID: 2956)
      • cmd.exe (PID: 2320)
      • WScript.exe (PID: 2748)
      • cmd.exe (PID: 2856)
      • DisableX.exe (PID: 2604)
      • mode.com (PID: 2960)
      • cmd.exe (PID: 3136)
      • WMIC.exe (PID: 3168)
      • cmd.exe (PID: 2968)
      • mode.com (PID: 2152)
      • WMIC.exe (PID: 1224)
      • cmd.exe (PID: 3204)
      • WMIC.exe (PID: 4044)
      • cmd.exe (PID: 2636)
      • mode.com (PID: 3532)
      • cmd.exe (PID: 1196)
      • WMIC.exe (PID: 2120)
      • WScript.exe (PID: 2772)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 2488)
      • cmd.exe (PID: 1448)
    • Reads the date of Windows installation

      • powershell.exe (PID: 896)
      • powershell.exe (PID: 2768)
      • powershell.exe (PID: 2296)
    • Creates files in the user directory

      • powershell.exe (PID: 896)
      • powershell.exe (PID: 2768)
      • powershell.exe (PID: 2296)
    • Reads the computer name

      • powershell.exe (PID: 896)
      • powershell.exe (PID: 2768)
      • powershell.exe (PID: 2296)
      • WScript.exe (PID: 2748)
      • cmd.exe (PID: 1448)
      • WMIC.exe (PID: 1224)
      • WMIC.exe (PID: 4044)
      • WMIC.exe (PID: 3168)
      • WMIC.exe (PID: 2120)
      • WScript.exe (PID: 2772)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 896)
      • cmd.exe (PID: 2064)
      • cmd.exe (PID: 1448)
    • Drops a file that was compiled in debug mode

      • csc.exe (PID: 2728)
      • expand.exe (PID: 2324)
      • xcopy.exe (PID: 3164)
    • Drops a file with too old compile date

      • expand.exe (PID: 2324)
      • xcopy.exe (PID: 3164)
    • Executable content was dropped or overwritten

      • expand.exe (PID: 2324)
      • xcopy.exe (PID: 3164)
      • csc.exe (PID: 2728)
    • Application launched itself

      • cmd.exe (PID: 2064)
      • cmd.exe (PID: 1448)
    • Drops a file with a compile date too recent

      • csc.exe (PID: 2728)
    • Executes scripts

      • cmd.exe (PID: 1448)
    • Uses WMIC.EXE to obtain a system information

      • cmd.exe (PID: 3136)
      • cmd.exe (PID: 2968)
      • cmd.exe (PID: 3204)
      • cmd.exe (PID: 1196)
    • Reads Windows Product ID

      • reg.exe (PID: 2992)
    • Removes files from Windows directory

      • cmd.exe (PID: 1448)
    • Starts CHOICE.EXE (used to create a delay)

      • cmd.exe (PID: 1448)
  • INFO

    • Checks supported languages

      • reg.exe (PID: 2804)
      • xcopy.exe (PID: 3164)
      • reg.exe (PID: 1624)
      • expand.exe (PID: 2324)
      • findstr.exe (PID: 2984)
      • reg.exe (PID: 2992)
      • findstr.exe (PID: 2752)
      • findstr.exe (PID: 2716)
      • findstr.exe (PID: 860)
      • findstr.exe (PID: 3664)
      • findstr.exe (PID: 2312)
      • findstr.exe (PID: 2096)
      • findstr.exe (PID: 3232)
      • findstr.exe (PID: 604)
      • choice.exe (PID: 2244)
      • reg.exe (PID: 2532)
    • Dropped object may contain Bitcoin addresses

      • expand.exe (PID: 2324)
    • Checks Windows Trust Settings

      • WScript.exe (PID: 2748)
      • WScript.exe (PID: 2772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
82
Monitored processes
44
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start cmd.exe no specs reg.exe no specs powershell.exe no specs cmd.exe mode.com no specs powershell.exe no specs csc.exe cvtres.exe no specs expand.exe xcopy.exe cmd.exe no specs reg.exe no specs mode.com no specs powershell.exe no specs center.exe no specs wscript.exe no specs disablex.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs mode.com no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs reg.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs choice.exe no specs reg.exe no specs mode.com no specs cmd.exe no specs wmic.exe no specs wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
328mode con cols=78 lines=3C:\Windows\system32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DOS Device MODE Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
604findstr /v /a:4 /R "^f7f81a39-5f63-5b42-9efd-1f13b5431005quot; " [6] EXIT" nul C:\Windows\system32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
860findstr /v /a:6 /R "^f7f81a39-5f63-5b42-9efd-1f13b5431005quot; " SUPPORT MICROSOFT PRUDUCTS" nul C:\Windows\system32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
896powershell -NoProfile Start-Process -FilePath 'C:\Windows\system32\cmd.exe' -ArgumentList '/c """"""C:\Users\admin\AppData\Local\Temp\KMS_Suite.v8.9.EN.cmd""" 49127c4b-02dc-482e-ac4f-ec4d659b7547"""' -Verb RunAs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
1196C:\Windows\system32\cmd.exe /c wmic path Win32_OperatingSystem get BuildNumber /valueC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1224wmic Path Win32_OperatingSystem Get CSDVersion /format:LISTC:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1448cmd.exe /c KMS_Suite.cmdC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1624REG QUERY HKU\S-1-5-19\Environment C:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1656mode con: cols=90 lines=40C:\Windows\system32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DOS Device MODE Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2064"C:\Windows\system32\cmd.exe" /c ""C:\Users\admin\AppData\Local\Temp\KMS_Suite.v8.9.EN.cmd" 49127c4b-02dc-482e-ac4f-ec4d659b7547" C:\Windows\system32\cmd.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
6 149
Read events
5 955
Write events
194
Delete events
0

Modification events

(PID) Process:(896) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(896) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(896) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(896) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(896) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2768) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2296) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1448) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1448) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1448) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
25
Suspicious files
10
Text files
46
Unknown types
3

Dropped files

PID
Process
Filename
Type
896powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF109184.TMPbinary
MD5:
SHA256:
2768powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:
SHA256:
2768powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PS5HD3VVMJ82T5E3K5BM.tempbinary
MD5:
SHA256:
896powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\V3OCK066LCW5SHOB94O2.tempbinary
MD5:
SHA256:
2728csc.exeC:\Users\admin\AppData\Local\Temp\m02yqvdu.pdbpdb
MD5:
SHA256:
2768powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF10951e.TMPbinary
MD5:
SHA256:
2768powershell.exeC:\Users\admin\AppData\Local\Temp\m02yqvdu.cmdlinetext
MD5:
SHA256:
2728csc.exeC:\Users\admin\AppData\Local\Temp\CSC96C3.tmpres
MD5:
SHA256:
2728csc.exeC:\Users\admin\AppData\Local\Temp\m02yqvdu.dllexecutable
MD5:
SHA256:
2728csc.exeC:\Users\admin\AppData\Local\Temp\m02yqvdu.outtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144