File name:

mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe

Full analysis: https://app.any.run/tasks/4b7cd45c-856e-42ca-a36a-082a3f7d11bd
Verdict: Malicious activity
Analysis date: July 22, 2024, 02:23:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

BE7563A984DC5168CE14181B90432859

SHA1:

B98280F7310095DA26DE3E448BEB489998F74C54

SHA256:

E9045C4012CDFD4F2911DB303478527E2006AA3B148DFDBACAE85B4EE3B52E5E

SSDEEP:

49152:k35+TS4V9S2f7PW/CTlnJmo3Bfv+TW4y+jalVHWrOfwIKeAa0ad5hfE1Dq30f+Oy:GgTS4j3bJTRJmsfvqXy+juVsLIKbPad7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • autorun.exe (PID: 2948)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Reads security settings of Internet Explorer

      • cscript.exe (PID: 2092)
      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Executable content was dropped or overwritten

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • autorun.exe (PID: 2948)
    • Process drops legitimate windows executable

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • The executable file from the user directory is run by the CMD process

      • cscript.exe (PID: 2092)
      • autorun.exe (PID: 2948)
    • Starts a Microsoft application from unusual location

      • cscript.exe (PID: 2092)
    • Checks Windows Trust Settings

      • cscript.exe (PID: 2092)
    • There is functionality for taking screenshot (YARA)

      • autorun.exe (PID: 2948)
    • The process creates files with name similar to system file names

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Reads the Internet Settings

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Executing commands from ".cmd" file

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
  • INFO

    • Create files in a temporary directory

      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • autorun.exe (PID: 2948)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3332)
      • cscript.exe (PID: 2092)
      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Checks supported languages

      • cscript.exe (PID: 2092)
      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
      • wmpnscfg.exe (PID: 3332)
      • autorun.exe (PID: 2948)
    • Reads Environment values

      • cscript.exe (PID: 2092)
    • UPX packer has been detected

      • autorun.exe (PID: 2948)
      • mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe (PID: 3192)
    • Reads the machine GUID from the registry

      • cscript.exe (PID: 2092)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:02:07 06:33:08+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 1015808
InitializedDataSize: 32768
UninitializedDataSize: 1536000
EntryPoint: 0x26e620
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.3.0.0
ProductVersionNumber: 1.3.0.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: FreeSoft
FileDescription: mini-KMS Activator
FileVersion: 1,3,0,0
ProductName: mini-KMS Activator v1.3 Office2010 VL ENG
InternalName: mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe
ProductVersion: 1,3,0,0
LegalCopyright: © 2010, FreeSoft
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
6
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start THREAT mini-kms_activator_v1.3_office2010_vl_eng.exe cmd.exe no specs cscript.exe no specs THREAT autorun.exe wmpnscfg.exe no specs mini-kms_activator_v1.3_office2010_vl_eng.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2092cscript HS_MESSAGE.vbs "Did you run the program as Administrator? " "Activation Tool" Q YESNO 30C:\Users\admin\AppData\Local\Temp\E377.tmp\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
6
Version:
5.8.7600.16385
Modules
Images
c:\users\admin\appdata\local\temp\e377.tmp\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2936C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\E377.tmp\Run.cmd" "C:\Windows\System32\cmd.exemini-KMS_Activator_v1.3_Office2010_VL_ENG.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2948autorun.exe C:\Users\admin\AppData\Local\Temp\E377.tmp\autorun.exe
cmd.exe
User:
admin
Company:
Linasoft
Integrity Level:
HIGH
Description:
AutoPlay Menu Loader
Version:
1.1.1.1
Modules
Images
c:\users\admin\appdata\local\temp\e377.tmp\autorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3192"C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe" C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\mini-kms_activator_v1.3_office2010_vl_eng.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3332"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3400"C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe" C:\Users\admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\mini-kms_activator_v1.3_office2010_vl_eng.exe
c:\windows\system32\ntdll.dll
Total events
2 658
Read events
2 650
Write events
8
Delete events
0

Modification events

(PID) Process:(3192) mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3192) mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3192) mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3192) mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
10
Suspicious files
2
Text files
7
Unknown types
1

Dropped files

PID
Process
Filename
Type
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\cscript.exeexecutable
MD5:34098403F9D8F71CE2EC749122168E89
SHA256:12DF0B06A9B56DCE3EFDB85984F84B387B1A5B61C9EBBF5A3BD61A5FBB996F60
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\ospprearm.exeexecutable
MD5:7FFAE006610A85317FBB092A2D65D1A9
SHA256:F10ACD6E32BC4D7CC74FEB9E84FEC18A77AEB2838EBF2AA7E3280BA1C7F3FCA2
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\hs_message.vbstext
MD5:AF0559E0301B2F75FA7CE812C5296DE8
SHA256:56A32A3CD84010B6517ED492AE6EADAC54E5A903F4A0D21B4DB32431416D82A2
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\hidcon.exeexecutable
MD5:B2DADAB18C318443301D0087CD7200BA
SHA256:B88A4D442BCD94457FC75DC5A541DC3437FD01091A2B6500569C699260E65238
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\PortQry.exeexecutable
MD5:C6AC67F4076CA431ACC575912C194245
SHA256:FB6CEBADD49D202C8C7B5CDD641BD16AAC8258429E8FACE365A94BD32E253B00
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\service.infini
MD5:9EE35B92CE83972E9D38F57B6B885057
SHA256:AEFB41EB7A52009D9490A4C09C2DD4B6BEED3B3614CD2A7BAA36384DFE395D0C
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\KMService.exeexecutable
MD5:BCA43E19E7013331D99FF788EA6B42A0
SHA256:B075602CF6BCB3284C44A640DAFFA49CC5AA8F469A20E4B242F2DDE85FCB4DBE
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\osppc.dllexecutable
MD5:1D9C3D7A1F8838E6280FA3F7D1FE4ED8
SHA256:0BD922965118D54D1027CDB628FA0DFB7AD1D6DF0910C80DB3F140C9255101D8
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\srvany.exeexecutable
MD5:4635935FC972C582632BF45C26BFCB0E
SHA256:ABD4AFD71B3C2BD3F741BBE3CEC52C4FA63AC78D353101D2E7DC4DE2725D1CA1
3192mini-KMS_Activator_v1.3_Office2010_VL_ENG.exeC:\Users\admin\AppData\Local\Temp\E377.tmp\Help.txttext
MD5:09A15BE2B1AF5ABE0B4ABD4690C79F24
SHA256:63B647856DB0FDE1783372718631FAA4C2431C801EE54CC6BB5C7BF7D7EDC926
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
13
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1372
svchost.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1060
svchost.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9f83325acc8ca75
unknown
whitelisted
1372
svchost.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
1372
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2564
svchost.exe
239.255.255.250:3702
whitelisted
4
System
192.168.100.255:138
whitelisted
1372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1372
svchost.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
1372
svchost.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
unknown
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
ctldl.windowsupdate.com
  • 199.232.210.172
  • 199.232.214.172
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.72
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted

Threats

No threats detected
No debug info