File name:

mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe

Full analysis: https://app.any.run/tasks/adf1f6f7-a11a-44fb-ad70-9f8c153601c9
Verdict: Malicious activity
Analysis date: July 18, 2024, 21:17:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

B18903F14C92F3B9D3D08CA13A39EFDD

SHA1:

D146AF98EB5CE7A3ECBFF8163EEF002458A1F442

SHA256:

AA00AAD043D88370E5225A1DABAE3EA49CC703A9575EDD41F24263B013C2F949

SSDEEP:

49152:731qg6nisr5yqA6LBTRc8V03n/T1tpDWqkKsK+1Kh/Q1Me3RKZ8xPauW14YrQQ9M:71RWiA5auLen/T1Xy3UgxauO4Yr39HM9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • Reads security settings of Internet Explorer

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • Starts CMD.EXE for commands execution

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • Executing commands from ".cmd" file

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • The process creates files with name similar to system file names

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • The executable file from the user directory is run by the CMD process

      • autorun.exe (PID: 2956)
    • Executable content was dropped or overwritten

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
    • Reads the Internet Settings

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • There is functionality for taking screenshot (YARA)

      • autorun.exe (PID: 2956)
  • INFO

    • Create files in a temporary directory

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
    • Checks supported languages

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
    • Reads the computer name

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
    • UPX packer has been detected

      • mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe (PID: 3212)
      • autorun.exe (PID: 2956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:02:07 06:33:08+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 1036288
InitializedDataSize: 32768
UninitializedDataSize: 1454080
EntryPoint: 0x25fba0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.1.0.0
ProductVersionNumber: 1.1.0.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: FreeSoft
FileDescription: mini-KMS Activator
FileVersion: 1,1,0,0
ProductName: mini-KMS_Activator_v1.1_Office2010_VL.exe
InternalName: mini-KMS Activator v1.1 Office2010 VL
ProductVersion: 1,1,0,0
LegalCopyright: © 2010, FreeSoft
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start THREAT mini-kms_activator_v1.1_office.2010.vl.eng.exe cmd.exe no specs THREAT autorun.exe mini-kms_activator_v1.1_office.2010.vl.eng.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2748C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\E5D8.tmp\Start.cmd" "C:\Windows\System32\cmd.exemini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2956autorun.exe C:\Users\admin\AppData\Local\Temp\E5D8.tmp\autorun.exe
cmd.exe
User:
admin
Company:
FreeSoft
Integrity Level:
HIGH
Description:
mini-KMS Activator Office 2010 VL
Version:
1.1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\e5d8.tmp\autorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3212"C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe" C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\mini-kms_activator_v1.1_office.2010.vl.eng.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3424"C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe" C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\mini-kms_activator_v1.1_office.2010.vl.eng.exe
c:\windows\system32\ntdll.dll
Total events
2 486
Read events
2 478
Write events
8
Delete events
0

Modification events

(PID) Process:(3212) mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3212) mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3212) mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3212) mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
12
Suspicious files
3
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\slerror.xmltext
MD5:DF1EF05879E06C5F09F3E1022F37B5CB
SHA256:D49ADF2DABBBF6AA43CE4E336AF4F768207DF75302EBF568A94A5350AAC988C5
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\instsrv.exeexecutable
MD5:9F7ACAAD365AF0D1A3CD9261E3208B9B
SHA256:F7B0A444B590EB8A6B46CEDF544BCB3117C85CAB02B599B45D61B8A590095C9C
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\choice.exeexecutable
MD5:11DDFBF834BB2C6F4D23297D80EE9E45
SHA256:4108605207EF00FCBBFE7ED7C3F96300601FB79F913D0E290538E8E02082CACC
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\cscript.exeexecutable
MD5:34098403F9D8F71CE2EC749122168E89
SHA256:12DF0B06A9B56DCE3EFDB85984F84B387B1A5B61C9EBBF5A3BD61A5FBB996F60
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\hidcon.exeexecutable
MD5:B2DADAB18C318443301D0087CD7200BA
SHA256:B88A4D442BCD94457FC75DC5A541DC3437FD01091A2B6500569C699260E65238
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\autorun.exeexecutable
MD5:9756DC84DD17E58C4B4AABA3279364D3
SHA256:0FCE14A187AAE773CE1A30E331AAD0B36EA5D1B830E450F81EB7E9F4899EE9CC
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\KeyMng.cmdtext
MD5:2C1FC9AAD29390F0C123487687E07534
SHA256:55C60EC24755E8C490B913980B996BE7955DC04B4BBEA714E1BB370AD623ED2E
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\Chk.cmdtext
MD5:7FF09FDC5094E3A981F6A25284FBF495
SHA256:DD0F1FB2BBF0D5E11F8A301FA8D3FDBC28A716B8B2F0AC7C682C3A502842FB2A
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\srvany.exeexecutable
MD5:4635935FC972C582632BF45C26BFCB0E
SHA256:ABD4AFD71B3C2BD3F741BBE3CEC52C4FA63AC78D353101D2E7DC4DE2725D1CA1
3212mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exeC:\Users\admin\AppData\Local\Temp\E5D8.tmp\Rearm.cmdtext
MD5:E0D4F5CFDE42FD34DFE2EB1EFB627940
SHA256:3029AFFFD7F5A3CD60B4AD57ED7F1926E07A31342EE247AFC7EB1BE25765C19C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
13
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1372
svchost.exe
GET
200
2.16.164.43:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1060
svchost.exe
GET
304
2.19.126.137:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9f83325acc8ca75
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
1372
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
1372
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1372
svchost.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
1372
svchost.exe
2.16.164.43:80
crl.microsoft.com
Akamai International B.V.
NL
unknown
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.174
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
  • 2.19.126.137
  • 2.19.126.163
whitelisted
crl.microsoft.com
  • 2.16.164.43
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted

Threats

No threats detected
No debug info