File name:

KMSpico.zip

Full analysis: https://app.any.run/tasks/5b5dc92b-94f9-4d66-b47c-62f512aad8e2
Verdict: Malicious activity
Analysis date: December 10, 2024, 20:29:34
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

D34E6F0A86C9EA7ACAA05869DF52045B

SHA1:

08D45A80E4BC9F6B089F4546319FD3579FEF93F0

SHA256:

E79A55C17A8D838EAD3CDE1630848FE2EDDC611E3D0742F47E8BDFAAE4279F8B

SSDEEP:

98304:7/do1NRCYJM2bDKekRYf2EIsMjNFMu3dFBAo1nB0VR9qQAGDw6U0xRJVCcp50WXX:2rn88

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6220)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 6188)
    • Executing a file with an untrusted certificate

      • KMSELDI.exe (PID: 4076)
      • AutoPico.exe (PID: 6792)
    • Changes image file execution options

      • KMSELDI.exe (PID: 4076)
      • AutoPico.exe (PID: 6792)
      • KMSELDI.exe (PID: 1616)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6220)
      • KMSpico.tmp (PID: 6512)
    • Executable content was dropped or overwritten

      • KMSpico.exe (PID: 6484)
      • KMSpico.exe (PID: 6652)
      • KMSpico.tmp (PID: 6680)
      • KMSELDI.exe (PID: 4076)
      • KMSELDI.exe (PID: 1616)
      • AutoPico.exe (PID: 6792)
    • Reads the Windows owner or organization settings

      • KMSpico.tmp (PID: 6680)
    • Process drops legitimate windows executable

      • KMSpico.tmp (PID: 6680)
    • Starts CMD.EXE for commands execution

      • KMSpico.tmp (PID: 6680)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 4052)
    • Executing commands from ".cmd" file

      • KMSpico.tmp (PID: 6680)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6220)
    • Create files in a temporary directory

      • KMSpico.exe (PID: 6484)
      • KMSpico.exe (PID: 6652)
    • Checks supported languages

      • KMSpico.exe (PID: 6484)
      • KMSpico.tmp (PID: 6512)
      • KMSpico.tmp (PID: 6680)
      • KMSpico.exe (PID: 6652)
      • OEM-DM.exe (PID: 1804)
      • KMSELDI.exe (PID: 4076)
      • AutoPico.exe (PID: 6792)
      • KMSELDI.exe (PID: 1616)
      • OEM-DM.exe (PID: 6964)
    • Process checks computer location settings

      • KMSpico.tmp (PID: 6512)
    • Reads the computer name

      • KMSpico.tmp (PID: 6512)
      • KMSpico.tmp (PID: 6680)
      • AutoPico.exe (PID: 6792)
      • OEM-DM.exe (PID: 1804)
      • OEM-DM.exe (PID: 1016)
      • OEM-DM.exe (PID: 6964)
    • The sample compiled with english language support

      • KMSpico.tmp (PID: 6680)
    • Creates files in the program directory

      • KMSpico.tmp (PID: 6680)
      • KMSELDI.exe (PID: 4076)
      • KMSELDI.exe (PID: 1616)
    • Reads the machine GUID from the registry

      • KMSELDI.exe (PID: 4076)
      • KMSELDI.exe (PID: 1616)
    • Reads Microsoft Office registry keys

      • KMSELDI.exe (PID: 4076)
    • Manual execution by a user

      • KMSELDI.exe (PID: 4504)
      • KMSELDI.exe (PID: 1616)
    • Reads Environment values

      • KMSELDI.exe (PID: 1616)
      • AutoPico.exe (PID: 6792)
    • Reads product name

      • KMSELDI.exe (PID: 1616)
      • AutoPico.exe (PID: 6792)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2014:06:29 20:26:32
ZipCRC: 0xce1d8a24
ZipCompressedSize: 2895393
ZipUncompressedSize: 2930552
ZipFileName: KMSpico.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
23
Malicious processes
6
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe kmspico.exe kmspico.tmp no specs kmspico.exe kmspico.tmp cmd.exe no specs cmd.exe no specs conhost.exe no specs kmseldi.exe conhost.exe no specs sc.exe no specs schtasks.exe no specs schtasks.exe no specs oem-dm.exe no specs conhost.exe no specs uninshs.exe no specs autopico.exe oem-dm.exe no specs conhost.exe no specs kmseldi.exe no specs kmseldi.exe oem-dm.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1016"C:\Program Files\KMSpico\OEM-DM.exe"C:\Program Files\KMSpico\OEM-DM.exeAutoPico.exe
User:
admin
Integrity Level:
HIGH
Description:
MSDM Key Dump
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\program files\kmspico\oem-dm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1616"C:\Program Files\KMSpico\KMSELDI.exe" C:\Program Files\KMSpico\KMSELDI.exe
explorer.exe
User:
admin
Company:
@ByELDI
Integrity Level:
HIGH
Description:
KMS GUI ELDI
Version:
33.3.0.0
Modules
Images
c:\program files\kmspico\kmseldi.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1804"C:\Program Files\KMSpico\OEM-DM.exe"C:\Program Files\KMSpico\OEM-DM.exeKMSELDI.exe
User:
admin
Integrity Level:
HIGH
Description:
MSDM Key Dump
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\program files\kmspico\oem-dm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2072\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeOEM-DM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3564SCHTASKS /Create /TN "Service KMSELDI" /TR "sc.exe start "Service KMSELDI"" /SC DAILY /ST 04:59:59 /RI 330 /DU 12:00 /RU SYSTEM /RL Highest /FC:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
2147500037
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
3724\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4052"C:\WINDOWS\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Service.cmd""C:\Windows\System32\cmd.exeKMSpico.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
4076"C:\Program Files\KMSpico\KMSELDI.exe" /backup /silentC:\Program Files\KMSpico\KMSELDI.exe
KMSpico.tmp
User:
admin
Company:
@ByELDI
Integrity Level:
HIGH
Description:
KMS GUI ELDI
Exit code:
0
Version:
33.3.0.0
Modules
Images
c:\program files\kmspico\kmseldi.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4504"C:\Program Files\KMSpico\KMSELDI.exe" C:\Program Files\KMSpico\KMSELDI.exeexplorer.exe
User:
admin
Company:
@ByELDI
Integrity Level:
MEDIUM
Description:
KMS GUI ELDI
Exit code:
3221226540
Version:
33.3.0.0
Modules
Images
c:\program files\kmspico\kmseldi.exe
c:\windows\system32\ntdll.dll
Total events
8 177
Read events
8 081
Write events
89
Delete events
7

Modification events

(PID) Process:(6220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\KMSpico.zip
(PID) Process:(6220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6680) KMSpico.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System
Operation:delete valueName:EnableSmartScreen
Value:
(PID) Process:(6680) KMSpico.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System
Operation:writeName:EnableSmartScreen
Value:
0
Executable files
22
Suspicious files
11
Text files
877
Unknown types
22

Dropped files

PID
Process
Filename
Type
6680KMSpico.tmpC:\Program Files\KMSpico\unins000.exeexecutable
MD5:CB2A3134D2B385C7D1E36E027EBDB446
SHA256:87E452110634DDB811C0FDE5A98B362CD7E86034A2CE1C994B50366A93CC5050
6484KMSpico.exeC:\Users\admin\AppData\Local\Temp\is-8KHQP.tmp\KMSpico.tmpexecutable
MD5:7060027EB4044B1D80C19F47CC87CDC7
SHA256:383D09D76BDFE36C4CD700A70D985D568BE66C54C3B15E53670CD646074F2383
6680KMSpico.tmpC:\Program Files\KMSpico\is-HSLSE.tmpbinary
MD5:67115DFDA5935F743CBF81F85C5E763C
SHA256:BE090348B66D8B4A478DB2C958AF92A04A4BEA631E346323E0A5B355CD80C0E7
6652KMSpico.exeC:\Users\admin\AppData\Local\Temp\is-RLSFQ.tmp\KMSpico.tmpexecutable
MD5:7060027EB4044B1D80C19F47CC87CDC7
SHA256:383D09D76BDFE36C4CD700A70D985D568BE66C54C3B15E53670CD646074F2383
6680KMSpico.tmpC:\Users\admin\AppData\Local\Temp\is-94CJ6.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
6680KMSpico.tmpC:\Program Files\KMSpico\DevComponents.DotNetBar2.dllbinary
MD5:67115DFDA5935F743CBF81F85C5E763C
SHA256:BE090348B66D8B4A478DB2C958AF92A04A4BEA631E346323E0A5B355CD80C0E7
6680KMSpico.tmpC:\Program Files\KMSpico\driver\is-26RES.tmpexecutable
MD5:AC9B2624EF366742C9AD32B86225A251
SHA256:02E1013EE8D548EDC3FBAFAB672977EA8C677CF1F0B57018652FCF2A2411CBFB
6680KMSpico.tmpC:\Users\admin\AppData\Local\Temp\is-94CJ6.tmp\_isetup\_setup64.tmpexecutable
MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89
SHA256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40
6680KMSpico.tmpC:\Program Files\KMSpico\driver\UnInstallDriver.cmdtext
MD5:4D389CB3A3A016D04E90AD9F4314238C
SHA256:72532E7DA1741269551C054D3A3461E11E182F27FBF225A06B31ADE7772AE613
6680KMSpico.tmpC:\Program Files\KMSpico\AutoPico.exeexecutable
MD5:EE81C6A4186274E057ADC1EE623137A5
SHA256:5DE1745C9B3B32EE1FC264B77BED27944EDBFEFF5A4B1B9B765F6BB30A9CB647
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
49
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7064
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7064
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.137:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.137:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
92.123.104.30:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.137
  • 23.48.23.191
whitelisted
google.com
  • 142.250.186.174
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.30
  • 92.123.104.23
  • 92.123.104.17
  • 92.123.104.27
  • 92.123.104.25
  • 92.123.104.26
  • 92.123.104.21
  • 92.123.104.18
  • 92.123.104.31
  • 92.123.104.28
  • 92.123.104.33
  • 92.123.104.22
  • 92.123.104.34
  • 92.123.104.19
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.136
  • 40.126.32.138
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.72
  • 40.126.32.74
  • 40.126.32.134
  • 40.126.32.76
whitelisted
go.microsoft.com
  • 69.192.162.125
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted

Threats

No threats detected
No debug info