File name:

mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe

Full analysis: https://app.any.run/tasks/adf1f6f7-a11a-44fb-ad70-9f8c153601c9
Verdict: Malicious activity
Analysis date: July 18, 2024, 21:17:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

B18903F14C92F3B9D3D08CA13A39EFDD

SHA1:

D146AF98EB5CE7A3ECBFF8163EEF002458A1F442

SHA256:

AA00AAD043D88370E5225A1DABAE3EA49CC703A9575EDD41F24263B013C2F949

SSDEEP:

49152:731qg6nisr5yqA6LBTRc8V03n/T1tpDWqkKsK+1Kh/Q1Me3RKZ8xPauW14YrQQ9M:71RWiA5auLen/T1Xy3UgxauO4Yr39HM9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • Reads security settings of Internet Explorer

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • Executable content was dropped or overwritten

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
    • The process creates files with name similar to system file names

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • Starts CMD.EXE for commands execution

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • Reads the Internet Settings

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • Executing commands from ".cmd" file

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • The executable file from the user directory is run by the CMD process

      • autorun.exe (PID: 2956)
    • There is functionality for taking screenshot (YARA)

      • autorun.exe (PID: 2956)
  • INFO

    • Checks supported languages

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
    • Create files in a temporary directory

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
    • Reads the computer name

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • UPX packer has been detected

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:02:07 06:33:08+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 1036288
InitializedDataSize: 32768
UninitializedDataSize: 1454080
EntryPoint: 0x25fba0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.1.0.0
ProductVersionNumber: 1.1.0.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: FreeSoft
FileDescription: mini-KMS Activator
FileVersion: 1,1,0,0
ProductName: mini-KMS_Activator_v1.1_Office2010_VL.exe
InternalName: mini-KMS Activator v1.1 Office2010 VL
ProductVersion: 1,1,0,0
LegalCopyright: © 2010, FreeSoft
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start THREAT mini-kms_activator_v1.1_office.2010.vl.eng.exe cmd.exe no specs THREAT autorun.exe mini-kms_activator_v1.1_office.2010.vl.eng.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2748C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\E5D8.tmp\Start.cmd" "C:\Windows\System32\cmd.exemini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2956autorun.exe C:\Users\admin\AppData\Local\Temp\E5D8.tmp\autorun.exe
cmd.exe
User:
admin
Company:
FreeSoft
Integrity Level:
HIGH
Description:
mini-KMS Activator Office 2010 VL
Version:
1.1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\e5d8.tmp\autorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3212"C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe" C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\mini-kms_activator_v1.1_office.2010.vl.eng.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3424"C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe" C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\mini-kms_activator_v1.1_office.2010.vl.eng.exe
c:\windows\system32\ntdll.dll
Total events
2 486
Read events
2 478
Write events
8
Delete events
0

Modification events

(PID) Process:(3212) mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3212) mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3212) mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3212) mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
12
Suspicious files
3
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\slerror.xmltext
MD5:DF1EF05879E06C5F09F3E1022F37B5CB
SHA256:D49ADF2DABBBF6AA43CE4E336AF4F768207DF75302EBF568A94A5350AAC988C5
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\autorun.exeexecutable
MD5:9756DC84DD17E58C4B4AABA3279364D3
SHA256:0FCE14A187AAE773CE1A30E331AAD0B36EA5D1B830E450F81EB7E9F4899EE9CC
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\srvany.exeexecutable
MD5:4635935FC972C582632BF45C26BFCB0E
SHA256:ABD4AFD71B3C2BD3F741BBE3CEC52C4FA63AC78D353101D2E7DC4DE2725D1CA1
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\osppc.dllexecutable
MD5:1D9C3D7A1F8838E6280FA3F7D1FE4ED8
SHA256:0BD922965118D54D1027CDB628FA0DFB7AD1D6DF0910C80DB3F140C9255101D8
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\Act.cmdtext
MD5:79E06297E83AE463087327904C1AA48D
SHA256:B9792C46FBBD61D26D7C1C25BB6933D095D4A1F7440812C3DD12A76A3ACAEC59
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\service.inftext
MD5:9EE35B92CE83972E9D38F57B6B885057
SHA256:AEFB41EB7A52009D9490A4C09C2DD4B6BEED3B3614CD2A7BAA36384DFE395D0C
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\Chk.cmdtext
MD5:7FF09FDC5094E3A981F6A25284FBF495
SHA256:DD0F1FB2BBF0D5E11F8A301FA8D3FDBC28A716B8B2F0AC7C682C3A502842FB2A
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\KeyMng.cmdtext
MD5:2C1FC9AAD29390F0C123487687E07534
SHA256:55C60EC24755E8C490B913980B996BE7955DC04B4BBEA714E1BB370AD623ED2E
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\Rest.cmdtext
MD5:4610691442CA75573BD806CFC65012D8
SHA256:6004D5968FFB6D98D16FFCBF1BC66DC9DDEB924339B3152E6FEA709F3FA458AE
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\KMSIns.cmdtext
MD5:D7CF750405B9B6FF7142358CFEB34A43
SHA256:6F0BD582C02955ADE299EF1EA5AB677261AA7FFD0DA66CD51BD64819E7E21EE6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
13
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
200
2.16.164.43:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1372
svchost.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1060
svchost.exe
GET
304
2.19.126.137:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9f83325acc8ca75
unknown
whitelisted
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
1372
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
1372
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1372
svchost.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
1372
svchost.exe
2.16.164.43:80
crl.microsoft.com
Akamai International B.V.
NL
unknown
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.174
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
  • 2.19.126.137
  • 2.19.126.163
whitelisted
crl.microsoft.com
  • 2.16.164.43
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted

Threats

No threats detected
No debug info