File name:

KMSAutoS.rar

Full analysis: https://app.any.run/tasks/4c306dd1-9ab3-4214-9f8b-47403be7e93c
Verdict: No threats detected
Analysis date: August 05, 2019, 08:17:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

E71157035CCE2006B964DA2AFCB582E4

SHA1:

C1C5D29433691EDABFCB71BF23E32766088CD397

SHA256:

E612A1B8AC2208144F0C8F0AE207B2C41C7B41FBC018274E999138E24DC275F2

SSDEEP:

6144:7N+YWMMCj9bjacSLvMUHcZZ+NKB1wIAd86SzbsyDbtF7:B+TCjFacDG6wtSzIa7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • KMSSS.exe (PID: 3820)
      • KMSSS.exe (PID: 3536)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2392)
    • Uses RUNDLL32.EXE to load library

      • WinRAR.exe (PID: 2392)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 1119
UncompressedSize: 1288
OperatingSystem: Win32
ModifyDate: 2013:12:03 23:19:23
PackingMethod: Normal
ArchivedFileName: KMSAutoS\bin\driver\oas_sert.cer
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start winrar.exe kmsss.exe no specs kmsss.exe no specs notepad.exe no specs rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
272"C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\admin\AppData\Local\Temp\Rar$DIa2392.13700\tap0901.cerC:\Windows\system32\rundll32.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2392"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\KMSAutoS.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3536"C:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\KMSSS.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\KMSSS.exeWinRAR.exe
User:
admin
Company:
MDL Forum, mod by Ratiborus
Integrity Level:
MEDIUM
Description:
KMS Server Emulator Service (XP)
Exit code:
0
Version:
1.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2392.10981\kmsautos\bin\kmsss.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
3756"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa2392.12589\KMSSS.logC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3820"C:\Users\admin\AppData\Local\Temp\Rar$EXa2392.11403\KMSAutoS\bin\KMSSS.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2392.11403\KMSAutoS\bin\KMSSS.exeWinRAR.exe
User:
admin
Company:
MDL Forum, mod by Ratiborus
Integrity Level:
MEDIUM
Description:
KMS Server Emulator Service (XP)
Exit code:
0
Version:
1.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2392.11403\kmsautos\bin\kmsss.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
Total events
507
Read events
478
Write events
29
Delete events
0

Modification events

(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2392) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\KMSAutoS.rar
(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2392) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
18
Suspicious files
5
Text files
7
Unknown types
10

Dropped files

PID
Process
Filename
Type
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\driver\x64TAP2\tapoas.infbinary
MD5:61243CB103543EE3163BF16DF69BCB54
SHA256:1652B1DE2F15EEACBD06E0AB14ADA5A466316FFD3AB88D4A2A46CFCBD25FDFA1
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\driver\tap0901.cerder
MD5:3D5FFD53BE77C32CBB147F32423C0A86
SHA256:669C56DB590C0308EA25C4508375BB88611B06B1AE689A895DC6B19F4DF5619C
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\driver\x64TAP2\tapoas.sysexecutable
MD5:927D0CDB3F96EFC1E98FB1A2C9FB67AD
SHA256:58F14DAA0EA21EA2F2A1D3D62C88BD8E5A0E0EF498B7B8D367BEEADE6A46843C
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\kmsauto.initext
MD5:
SHA256:
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\driver\x64WDV\WdfCoInstaller01009.dllexecutable
MD5:BE566E174EAF5B93B0474593CD8F2715
SHA256:CEE8496BFA1080FD84FC48BA4375625238900FE93EA739B2DC0300206FDE8330
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\KMSSS.logtext
MD5:
SHA256:
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\driver\oas_sert.cerder
MD5:0041584E5F66762B1FA9BE8910D0B92B
SHA256:BB27684B569CBB72DEC63EA6FDEF8E5F410CDAEB73717EEE1B36478DBCFF94CC
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\driver\x64TAP1\devcon.exeexecutable
MD5:3904D0698962E09DA946046020CBCB17
SHA256:A51E25ACC489948B31B1384E1DC29518D19B421D6BC0CED90587128899275289
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\driver\x64TAP2\devcon.exeexecutable
MD5:7F0C8F7B6F6D22ECD83013F2F26A71AE
SHA256:A4E561F666C08353C2226E8E264555C406893B0AD1B74FD05F4F29655E128809
2392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2392.10981\KMSAutoS\bin\driver\x64TAP1\OemVista.infbinary
MD5:864625122184689B4854483B51BD4C09
SHA256:4A4CC81DD6655906E817EBAEDE1692871A79B7000A5F9188B30082C06C71894B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
272
rundll32.exe
GET
200
104.18.11.39:80
http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt
US
der
1.69 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
272
rundll32.exe
104.18.11.39:80
cacerts.digicert.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
cacerts.digicert.com
  • 104.18.11.39
  • 104.18.10.39
whitelisted

Threats

No threats detected
No debug info