File name:

KMS_Suite.v9.EN.rar

Full analysis: https://app.any.run/tasks/062646af-0c01-4178-9b41-8705879e46af
Verdict: Malicious activity
Analysis date: August 01, 2023, 23:29:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

985DDBCD777D4C8D55C30FE03A35CA56

SHA1:

BB62C4A4EFE68C776EE715BC4C050300E02C946C

SHA256:

8D792A7C132D0EBF6384F1C16D34E325B1E1CC90D6A8A90F62F972B7CAA80391

SSDEEP:

6144:d4rRk56Nzfm+T/PZYHcVc70WA8OoEdgCw9kYE/lOL9EYmAn:aRSkC+z2HcuQJx/G9jm2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts Visual C# compiler

      • powershell.exe (PID: 620)
    • Application was dropped or rewritten from another process

      • center.exe (PID: 2056)
      • DisableX.exe (PID: 2520)
  • SUSPICIOUS

    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 896)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 896)
      • cmd.exe (PID: 3284)
    • Uses .NET C# to load dll

      • powershell.exe (PID: 620)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 896)
      • cmd.exe (PID: 3284)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 896)
    • Executable content was dropped or overwritten

      • expand.exe (PID: 2468)
      • csc.exe (PID: 3932)
      • xcopy.exe (PID: 2192)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 896)
      • cmd.exe (PID: 3284)
    • Application launched itself

      • cmd.exe (PID: 896)
      • cmd.exe (PID: 3284)
    • The process executes VB scripts

      • cmd.exe (PID: 3284)
    • Reads the Internet Settings

      • wscript.exe (PID: 1736)
      • cmd.exe (PID: 3284)
      • WMIC.exe (PID: 3276)
      • WMIC.exe (PID: 2816)
      • WMIC.exe (PID: 3744)
    • Uses WMIC.EXE to obtain operating system information

      • cmd.exe (PID: 2476)
      • cmd.exe (PID: 3936)
      • cmd.exe (PID: 3900)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 3284)
    • Executing commands from ".cmd" file

      • cmd.exe (PID: 896)
  • INFO

    • Manual execution by a user

      • cmd.exe (PID: 896)
    • Checks supported languages

      • csc.exe (PID: 3932)
      • mode.com (PID: 2028)
      • cvtres.exe (PID: 4032)
      • mode.com (PID: 4064)
      • center.exe (PID: 2056)
      • mode.com (PID: 3212)
      • DisableX.exe (PID: 2520)
      • mode.com (PID: 3548)
      • mode.com (PID: 3016)
    • Create files in a temporary directory

      • csc.exe (PID: 3932)
      • expand.exe (PID: 2468)
      • xcopy.exe (PID: 2192)
      • cvtres.exe (PID: 4032)
    • The process checks LSA protection

      • csc.exe (PID: 3932)
      • cvtres.exe (PID: 4032)
      • WMIC.exe (PID: 3276)
      • WMIC.exe (PID: 2816)
      • WMIC.exe (PID: 3744)
    • Reads the machine GUID from the registry

      • cvtres.exe (PID: 4032)
      • csc.exe (PID: 3932)
    • The executable file from the user directory is run by the CMD process

      • center.exe (PID: 2056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
79
Monitored processes
40
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs cmd.exe net.exe no specs net1.exe no specs mode.com no specs powershell.exe no specs csc.exe cvtres.exe no specs expand.exe xcopy.exe cmd.exe no specs reg.exe no specs mode.com no specs powershell.exe no specs center.exe no specs wscript.exe no specs disablex.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs wmic.exe no specs wmic.exe no specs cmd.exe no specs cmd.exe no specs wmic.exe no specs mode.com no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs reg.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs choice.exe no specs mode.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
620powershell -nop -c $f=[IO.File]::ReadAllText($env:0)-split':bat2file\:.*';iex($f[1]); X(1) C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
896"C:\Windows\System32\cmd.exe" /C "C:\Users\admin\Desktop\KMS_Suite.v9.EN.cmd" C:\Windows\System32\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
1108findstr /v /a:7 /R "^f7f81a39-5f63-5b42-9efd-1f13b5431005quot; " [4] WINDOWS & OFFICE ACTIVATION STATUS CHECK" nul C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\findstr.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
1600cmd /v:on /c echo(^!param^!C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1640findstr /v /a:6 /R "^f7f81a39-5f63-5b42-9efd-1f13b5431005quot; " [1] ACTIVATION START FOR WINDOWS 10 & OFFICE (KMS Inject Method)" nul C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\findstr.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
1736"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\7660\bin\DisableX.vbs" C:\Windows\System32\wscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
1820findstr /v /a:4 /R "^f7f81a39-5f63-5b42-9efd-1f13b5431005quot; " [6] EXIT" nul C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\findstr.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
1868choice /C:123456 /N /M "YOUR CHOICE :"C:\Windows\System32\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Offers the user a choice
Exit code:
3
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
2028mode con cols=78 lines=3C:\Windows\System32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DOS Device MODE Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2056center.exe kF5nJ4D92hfOpc8C:\Users\admin\AppData\Local\Temp\7660\bin\center.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7660\bin\center.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\winmm.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
Total events
5 159
Read events
5 133
Write events
26
Delete events
0

Modification events

(PID) Process:(2972) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3284) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3284) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
28
Suspicious files
8
Text files
46
Unknown types
0

Dropped files

PID
Process
Filename
Type
620powershell.exeC:\Users\admin\AppData\Local\Temp\gu1hqkz4.mrj.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3932csc.exeC:\Users\admin\AppData\Local\Temp\upvfgn0e.outtext
MD5:6CCCB1E54BF3AC56881681E8F966818D
SHA256:0D21723E4F8C29F9CF0B61AE2C6B9E7369102D8C2C4E703EEA714CEB4AF21A6C
620powershell.exeC:\Users\admin\AppData\Local\Temp\1compressed
MD5:2F3B771C22DB25813A4530B5BAE62636
SHA256:9B6B0BDEDBC8B408D93F5FC4FC69605CE6547894D9B0A263920CD8911D2B44B4
2468expand.exeC:\Users\admin\AppData\Local\Temp\KMS_Suite\bin\Digital\Digital_KMS38.cmdtext
MD5:7ACB31D34D4D1E86A98B8C4C4E214D10
SHA256:3372925083552A8E3CB65B56F7E1886E567E00D6ADBE241401C361ABD65DE7ED
4032cvtres.exeC:\Users\admin\AppData\Local\Temp\RESB409.tmpbinary
MD5:46FADE9A871F85B51D58EE07C3486052
SHA256:273B403C67C715C18DB57A1ED1F8AF4BA21C900AFBBB471368CC758BE3EF4438
2468expand.exeC:\Users\admin\AppData\Local\Temp\KMS_Suite\bin\Digital\bin\slc.dllexecutable
MD5:B21C40AAF16BA46B2732618D089DB3A4
SHA256:9395A37C42E83568DC5ECB25D9E9FCA4C6C1C4F47E336FB6CCAE62DF5C696B4D
2468expand.exeC:\Users\admin\AppData\Local\Temp\KMS_Suite\bin\center.exeexecutable
MD5:0A847EAFDDC4529388E1A1B291354CF8
SHA256:69533D9B66B840B4764F901CD6A502D12453B604617A841F4C2C602FC87DF255
2468expand.exeC:\Users\admin\AppData\Local\Temp\KMS_Suite\KMS_Suite.cmdtext
MD5:1F6C48CA9B559F73A8CD4D147E0BB5AD
SHA256:85FD9262766F7C4E3D7696FF816F9DB88C81A0988C08565E5309F5A096BEE7B5
3932csc.exeC:\Users\admin\AppData\Local\Temp\CSC7C4C80CBEC8E4D64A72DAF288DFE9EF.TMPbinary
MD5:E81F9EFA8884F7CF35C0B107E31218D8
SHA256:94D72360481D58AB66E7BD9E96C30F51469D7407FF45225FCDB4814B8BF7EDA8
2468expand.exeC:\Users\admin\AppData\Local\Temp\KMS_Suite\bin\Digital\OEM_Digital\$OEM$\$\Setup\Scripts\digi.cmdtext
MD5:7ACB31D34D4D1E86A98B8C4C4E214D10
SHA256:3372925083552A8E3CB65B56F7E1886E567E00D6ADBE241401C361ABD65DE7ED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2640
svchost.exe
239.255.255.250:1900
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info