File name:

mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe

Full analysis: https://app.any.run/tasks/4b7cd45c-856e-42ca-a36a-082a3f7d11bd
Verdict: Malicious activity
Analysis date: July 22, 2024, 02:23:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

BE7563A984DC5168CE14181B90432859

SHA1:

B98280F7310095DA26DE3E448BEB489998F74C54

SHA256:

E9045C4012CDFD4F2911DB303478527E2006AA3B148DFDBACAE85B4EE3B52E5E

SSDEEP:

49152:k35+TS4V9S2f7PW/CTlnJmo3Bfv+TW4y+jalVHWrOfwIKeAa0ad5hfE1Dq30f+Oy:GgTS4j3bJTRJmsfvqXy+juVsLIKbPad7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • autorun.exe (PID: 2948)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Reads security settings of Internet Explorer

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • cscript.exe (PID: 2092)
    • The process creates files with name similar to system file names

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Starts CMD.EXE for commands execution

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Reads the Internet Settings

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Executable content was dropped or overwritten

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • autorun.exe (PID: 2948)
    • Executing commands from ".cmd" file

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • The executable file from the user directory is run by the CMD process

      • cscript.exe (PID: 2092)
      • autorun.exe (PID: 2948)
    • Starts a Microsoft application from unusual location

      • cscript.exe (PID: 2092)
    • Checks Windows Trust Settings

      • cscript.exe (PID: 2092)
    • There is functionality for taking screenshot (YARA)

      • autorun.exe (PID: 2948)
  • INFO

    • Create files in a temporary directory

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • autorun.exe (PID: 2948)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3332)
      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • cscript.exe (PID: 2092)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3332)
      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • cscript.exe (PID: 2092)
      • autorun.exe (PID: 2948)
    • Reads Environment values

      • cscript.exe (PID: 2092)
    • Reads the machine GUID from the registry

      • cscript.exe (PID: 2092)
    • UPX packer has been detected

      • autorun.exe (PID: 2948)
      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:02:07 06:33:08+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 1015808
InitializedDataSize: 32768
UninitializedDataSize: 1536000
EntryPoint: 0x26e620
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.3.0.0
ProductVersionNumber: 1.3.0.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: FreeSoft
FileDescription: mini-KMS Activator
FileVersion: 1,3,0,0
ProductName: mini-KMS Activator v1.3 Office2010 VL ENG
InternalName: mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe
ProductVersion: 1,3,0,0
LegalCopyright: © 2010, FreeSoft
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
6
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start THREAT mini-kms_activator_v1.3_office2010_vl_eng.exe cmd.exe no specs cscript.exe no specs THREAT autorun.exe wmpnscfg.exe no specs mini-kms_activator_v1.3_office2010_vl_eng.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2092cscript HS_MESSAGE.vbs "Did you run the program as Administrator? " "Activation Tool" Q YESNO 30C:\Users\admin\AppData\Local\Temp\E377.tmp\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
6
Version:
5.8.7600.16385
Modules
Images
c:\users\admin\appdata\local\temp\e377.tmp\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2936C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\E377.tmp\Run.cmd" "C:\Windows\System32\cmd.exemini-KMS_Activator_v1.3_Office2010_VL_ENG.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2948autorun.exe C:\Users\admin\AppData\Local\Temp\E377.tmp\autorun.exe
cmd.exe
User:
admin
Company:
Linasoft
Integrity Level:
HIGH
Description:
AutoPlay Menu Loader
Version:
1.1.1.1
Modules
Images
c:\users\admin\appdata\local\temp\e377.tmp\autorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3192"C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe" C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\mini-kms_activator_v1.3_office2010_vl_eng.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3332"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3400"C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe" C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\mini-kms_activator_v1.3_office2010_vl_eng.exe
c:\windows\system32\ntdll.dll
Total events
2 658
Read events
2 650
Write events
8
Delete events
0

Modification events

(PID) Process:(3192) mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3192) mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3192) mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3192) mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
10
Suspicious files
2
Text files
7
Unknown types
1

Dropped files

PID
Process
Filename
Type
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\Run.cmdtext
MD5:0B851D375A6A8A8B04431D9635371F85
SHA256:706D9DDF9C333F9C77238D22500DFB294776220625755E5668DFF80246FC48FA
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\srvany.exeexecutable
MD5:4635935FC972C582632BF45C26BFCB0E
SHA256:ABD4AFD71B3C2BD3F741BBE3CEC52C4FA63AC78D353101D2E7DC4DE2725D1CA1
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\Help.txttext
MD5:09A15BE2B1AF5ABE0B4ABD4690C79F24
SHA256:63B647856DB0FDE1783372718631FAA4C2431C801EE54CC6BB5C7BF7D7EDC926
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\autorun.apmapw
MD5:748F99EC78FC9E2E3BBA87C6441DFD0E
SHA256:7D33CD2203C3E4268855F00D897F51EAF4B1D4F06E198D3A05D5F923E3CCD794
2948autorun.exeC:\Users\admin\AppData\Local\Temp\apm1DD.tmpbinary
MD5:7F048EBF832F4C72CA92E7D97B0F566E
SHA256:8EEF83F28AA3D333BBA6FB595AF829A734A8333122A9E67CBE029D204127499B
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\hs_message.vbstext
MD5:AF0559E0301B2F75FA7CE812C5296DE8
SHA256:56A32A3CD84010B6517ED492AE6EADAC54E5A903F4A0D21B4DB32431416D82A2
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\ospp.vbstext
MD5:BE4C7DE95BE73E8A83FF9B3189A93E00
SHA256:FFB385E1A5846334CA3D3C448CE379585A97D2CDA505E5C4BB923D37011AC6FF
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\ospprearm.exeexecutable
MD5:7FFAE006610A85317FBB092A2D65D1A9
SHA256:F10ACD6E32BC4D7CC74FEB9E84FEC18A77AEB2838EBF2AA7E3280BA1C7F3FCA2
2948autorun.exeC:\Users\admin\AppData\Local\Temp\apm1AD.tmpexecutable
MD5:3D4839228C7EE77E28832879EEB17340
SHA256:5D6FF8A11CDA6D5B1E6D8A5562594379A082CEE18F402A8A0A26B8CABE428954
2948autorun.exeC:\Users\admin\AppData\Local\Temp\apm1DE.tmpbinary
MD5:F4AC318A68081B2D2D7DD817DFDE5F0B
SHA256:F6595E48C3840B0D3D124DD5AD3D03F8FC4E2E114F8EBEB54330A34C5C6B5064
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
13
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1372
svchost.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1060
svchost.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9f83325acc8ca75
unknown
whitelisted
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
1372
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2564
svchost.exe
239.255.255.250:3702
whitelisted
4
System
192.168.100.255:138
whitelisted
1372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1372
svchost.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
1372
svchost.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
unknown
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
ctldl.windowsupdate.com
  • 199.232.210.172
  • 199.232.214.172
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.72
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted

Threats

No threats detected
No debug info