analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://cvws.icloud-content.com/B/AfeBSE-GgYLDj4PDy0XnTLYnq7kpASxyNhh_9O3eHPrOxnyveZOyWBWS/Activation.rar?o=AhNO4YijyPJmT4G0zYK7SimY4IlmLdgKzhm8xFK7k6ft&v=1&x=3&a=B5tuMM_rnope_7NCIqrHrXwZLI3dAxXRSQEACAHIAP93A0fWA1UoSQ&e=1552563153&k=A8Y0xpQkkjBQPYKhErBdmQ&fl=&r=3b93e0be-4de9-49e1-ae77-3c985f4653a6-1&ckc=com.apple.largeattachment&ckz=Apple-Webmail&y=1&p=34&s=-gjjIrjVBRMwfe3ZZne9xSnTnGQ&teh=1

Full analysis: https://app.any.run/tasks/1a791528-010a-4ac1-bc85-e10228451a30
Verdict: Malicious activity
Analysis date: February 28, 2019, 16:58:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

1BF3A62F2C5CAABA01393471CFD30C79

SHA1:

FABB97789AEBF49E0C159642F772B6D058745193

SHA256:

F013710493F1CD88A9989E971C7375FD014EA8FAE3637036AC7AD1F0A8F221AC

SSDEEP:

12:20RG2mbUXfvBdgUWqkUQVfUMQN/mDMLYN:2IGlbUX3/fzSVcMW/mQLA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • fver.exe (PID: 3568)
      • KMSAuto Net.exe (PID: 2980)
      • 7zaxxx.exe (PID: 3816)
      • KMSTools.exe (PID: 3728)
      • OInstall.exe (PID: 3616)
      • Setup16.exe (PID: 3364)
      • 7zaxxx.exe (PID: 1936)
      • 7zaxxx.exe (PID: 3652)
      • KMSCleaner.exe (PID: 1420)
      • fver.exe (PID: 2068)
      • GarbageCollector.exe (PID: 3252)
      • AAct.exe (PID: 3104)
      • 7zaxxx.exe (PID: 3720)
      • aact.dll (PID: 3524)
      • KMSTools.exe (PID: 2460)
    • Changes settings of System certificates

      • Setup16.exe (PID: 3364)
    • Loads dropped or rewritten executable

      • iexplore.exe (PID: 3336)
      • conhost.exe (PID: 3368)
      • AAct.exe (PID: 3104)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3884)
      • 7zaxxx.exe (PID: 3816)
      • OInstall.exe (PID: 3616)
      • KMSTools.exe (PID: 2460)
      • 7zaxxx.exe (PID: 1936)
      • 7zaxxx.exe (PID: 3652)
      • 7zaxxx.exe (PID: 3720)
      • AAct.exe (PID: 3104)
    • Reads Environment values

      • KMSAuto Net.exe (PID: 2980)
    • Starts CMD.EXE for commands execution

      • KMSAuto Net.exe (PID: 2980)
      • KMSTools.exe (PID: 2460)
      • OInstall.exe (PID: 3616)
      • AAct.exe (PID: 3104)
    • Adds / modifies Windows certificates

      • Setup16.exe (PID: 3364)
    • Changes IE settings (feature browser emulation)

      • GarbageCollector.exe (PID: 3252)
    • Reads internet explorer settings

      • GarbageCollector.exe (PID: 3252)
      • KMSAuto Net.exe (PID: 2980)
    • Creates files in the user directory

      • GarbageCollector.exe (PID: 3252)
    • Uses NETSH.EXE for network configuration

      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 3656)
      • cmd.exe (PID: 3668)
      • cmd.exe (PID: 3080)
      • cmd.exe (PID: 3732)
      • cmd.exe (PID: 2592)
    • Executes scripts

      • cmd.exe (PID: 2184)
      • cmd.exe (PID: 2744)
      • cmd.exe (PID: 2080)
      • cmd.exe (PID: 3576)
      • cmd.exe (PID: 2776)
      • cmd.exe (PID: 4056)
      • cmd.exe (PID: 2812)
      • cmd.exe (PID: 3644)
    • Uses REG.EXE to modify Windows registry

      • AAct.exe (PID: 3104)
    • Starts application with an unusual extension

      • AAct.exe (PID: 3104)
  • INFO

    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2996)
    • Application launched itself

      • iexplore.exe (PID: 2996)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2996)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2996)
    • Changes internet zones settings

      • iexplore.exe (PID: 2996)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3336)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
120
Monitored processes
56
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe winrar.exe notepad.exe no specs kmstools.exe no specs kmstools.exe fver.exe no specs fver.exe no specs cmd.exe no specs 7zaxxx.exe kmsauto net.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs oinstall.exe cmd.exe no specs setup16.exe taskmgr.exe no specs 7zaxxx.exe garbagecollector.exe 7zaxxx.exe kmscleaner.exe no specs 7zaxxx.exe aact.exe cmd.exe no specs cscript.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs aact.dll no specs conhost.exe no specs cmd.exe no specs cscript.exe no specs cmd.exe no specs cscript.exe no specs cmd.exe no specs cscript.exe no specs cmd.exe no specs cscript.exe no specs reg.exe no specs cmd.exe no specs cscript.exe no specs cmd.exe no specs cscript.exe no specs cmd.exe no specs cscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2996"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3336"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2996 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3884"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\Activation[1].rar"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3504"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa3884.15400\readme.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3728"C:\Users\admin\AppData\Local\Temp\Rar$EXa3884.16080\Activation\KMS_Tools_Portable_12_01_17\KMSTools.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3884.16080\Activation\KMS_Tools_Portable_12_01_17\KMSTools.exeWinRAR.exe
User:
admin
Company:
Ratiborus
Integrity Level:
MEDIUM
Exit code:
3221226540
2460"C:\Users\admin\AppData\Local\Temp\Rar$EXa3884.16080\Activation\KMS_Tools_Portable_12_01_17\KMSTools.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3884.16080\Activation\KMS_Tools_Portable_12_01_17\KMSTools.exe
WinRAR.exe
User:
admin
Company:
Ratiborus
Integrity Level:
HIGH
3568"C:\Users\admin\AppData\Local\Temp\fver.exe" /D /A "C:\Users\admin\AppData\Local\Temp\Rar$EXa3884.16080\Activation\KMS_Tools_Portable_12_01_17\Programs\KMSAuto Net 2016 v1.4.9 Portable\KMSAuto Net.exe"C:\Users\admin\AppData\Local\Temp\fver.exeKMSTools.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Version Resource Dump Utility
Exit code:
0
Version:
5.1.2600.0 (XPClient.010817-1148)
2068"C:\Users\admin\AppData\Local\Temp\fver.exe" /D /A "C:\Users\admin\AppData\Local\Temp\Rar$EXa3884.16080\Activation\KMS_Tools_Portable_12_01_17\Programs\Office 2013-2016 C2R Install v5.9.2\OInstall.exe"C:\Users\admin\AppData\Local\Temp\fver.exeKMSTools.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2948"C:\Windows\System32\cmd.exe" /c copy C:\Windows\system32\Tasks\KMSTools "C:\Users\admin\AppData\Local\Temp\KMSTools.tmp" /YC:\Windows\System32\cmd.exeKMSTools.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3816"C:\Users\admin\AppData\Local\Temp\7zaxxx.exe" x data.pak -pkmstools -y -bsp1 -o"C:\Users\admin\AppData\Local\Temp\Rar$EXa3884.16080\Activation\KMS_Tools_Portable_12_01_17\Programs" "KMSAuto Net"*C:\Users\admin\AppData\Local\Temp\7zaxxx.exe
KMSTools.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Standalone Console
Exit code:
0
Version:
15.14
Total events
1 929
Read events
1 520
Write events
0
Delete events
0

Modification events

No data
Executable files
15
Suspicious files
10
Text files
48
Unknown types
5

Dropped files

PID
Process
Filename
Type
2996iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2996iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab8BFA.tmp
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar8BFB.tmp
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab8C2B.tmp
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar8C2C.tmp
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab8D27.tmp
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar8D28.tmp
MD5:
SHA256:
2996iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF03ED0698473E99BE.TMP
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\Activation[1].rar
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
10
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3364
Setup16.exe
HEAD
301
2.18.68.82:80
http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/MRO.cab
unknown
whitelisted
3364
Setup16.exe
HEAD
200
2.16.186.83:80
http://officecdn.microsoft.com.edgesuite.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/MRO.cab
unknown
whitelisted
3364
Setup16.exe
GET
301
2.18.68.82:80
http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/MRO.cab
unknown
whitelisted
3364
Setup16.exe
HEAD
301
2.18.68.82:80
http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/MRO-E.cab
unknown
whitelisted
3364
Setup16.exe
GET
2.16.186.74:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
3364
Setup16.exe
GET
301
2.18.68.82:80
http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/MRO-E.cab
unknown
whitelisted
3364
Setup16.exe
GET
200
2.16.186.83:80
http://officecdn.microsoft.com.edgesuite.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/MRO-E.cab
unknown
compressed
16.0 Kb
whitelisted
3364
Setup16.exe
GET
200
2.16.186.74:80
http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl
unknown
der
550 b
whitelisted
3336
iexplore.exe
GET
200
2.16.186.81:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
55.2 Kb
whitelisted
3364
Setup16.exe
GET
301
2.18.68.82:80
http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.11231.20174.cab
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2996
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3252
GarbageCollector.exe
89.111.162.36:80
img15.nnm.me
Jsc ru-center
RU
unknown
3336
iexplore.exe
2.16.186.81:80
www.download.windowsupdate.com
Akamai International B.V.
whitelisted
3364
Setup16.exe
2.16.186.83:80
officecdn.microsoft.com.edgesuite.net
Akamai International B.V.
whitelisted
3336
iexplore.exe
17.248.146.12:443
cvws.icloud-content.com
Apple Inc.
US
unknown
2732
wmiprvse.exe
65.52.98.231:443
activation.sls.microsoft.com
Microsoft Corporation
US
whitelisted
3364
Setup16.exe
2.16.186.74:80
crl.microsoft.com
Akamai International B.V.
whitelisted
3364
Setup16.exe
2.18.68.82:80
officecdn.microsoft.com
Akamai International B.V.
whitelisted
2732
wmiprvse.exe
92.122.18.115:80
go.microsoft.com
Akamai Technologies, Inc.
GB
whitelisted

DNS requests

Domain
IP
Reputation
cvws.icloud-content.com
  • 17.248.146.12
  • 17.248.146.77
  • 17.248.146.240
  • 17.248.146.44
  • 17.248.146.76
  • 17.248.146.75
  • 17.248.146.239
  • 17.248.146.242
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.download.windowsupdate.com
  • 2.16.186.81
  • 2.16.186.56
  • 2.16.186.89
whitelisted
officecdn.microsoft.com
  • 2.18.68.82
whitelisted
officecdn.microsoft.com.edgesuite.net
  • 2.16.186.83
  • 2.16.186.90
  • 2.16.186.59
whitelisted
crl.microsoft.com
  • 2.16.186.74
  • 2.16.186.120
whitelisted
img15.nnm.me
  • 89.111.162.36
unknown
go.microsoft.com
  • 92.122.18.115
whitelisted
activation.sls.microsoft.com
  • 65.52.98.231
whitelisted

Threats

No threats detected
No debug info