Analysis
-
max time kernel
547s -
max time network
552s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-01-2022 18:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://keygenninja.net
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
http://keygenninja.net
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
http://keygenninja.net
Resource
win10v2004-en-20220113
General
-
Target
http://keygenninja.net
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
build.exeKMSAuto Net.exepid process 4948 build.exe 4360 KMSAuto Net.exe -
Sets service image path in registry 2 TTPs
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\KMSauto.zip:Zone.Identifier firefox.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
firefox.exe7zG.exe7zG.exedescription pid process Token: SeDebugPrivilege 3156 firefox.exe Token: SeDebugPrivilege 3156 firefox.exe Token: SeDebugPrivilege 3156 firefox.exe Token: SeDebugPrivilege 3156 firefox.exe Token: SeDebugPrivilege 3156 firefox.exe Token: SeDebugPrivilege 3156 firefox.exe Token: SeRestorePrivilege 3292 7zG.exe Token: 35 3292 7zG.exe Token: SeSecurityPrivilege 3292 7zG.exe Token: SeSecurityPrivilege 3292 7zG.exe Token: SeRestorePrivilege 2712 7zG.exe Token: 35 2712 7zG.exe Token: SeSecurityPrivilege 2712 7zG.exe Token: SeSecurityPrivilege 2712 7zG.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
firefox.exe7zG.exe7zG.exepid process 3156 firefox.exe 3156 firefox.exe 3156 firefox.exe 3156 firefox.exe 3292 7zG.exe 2712 7zG.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 3156 firefox.exe 3156 firefox.exe 3156 firefox.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
firefox.exepid process 3156 firefox.exe 3156 firefox.exe 3156 firefox.exe 3156 firefox.exe 3156 firefox.exe 3156 firefox.exe 3156 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 900 wrote to memory of 3156 900 firefox.exe firefox.exe PID 3156 wrote to memory of 2344 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 2344 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 3544 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe PID 3156 wrote to memory of 904 3156 firefox.exe firefox.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://keygenninja.net1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://keygenninja.net2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3156.0.1933596429\1738714300" -parentBuildID 20200403170909 -prefsHandle 1704 -prefMapHandle 1696 -prefsLen 1 -prefMapSize 219548 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3156 "\\.\pipe\gecko-crash-server-pipe.3156" 1800 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3156.3.1944671924\184640204" -childID 1 -isForBrowser -prefsHandle 2420 -prefMapHandle 2436 -prefsLen 78 -prefMapSize 219548 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3156 "\\.\pipe\gecko-crash-server-pipe.3156" 2484 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3156.13.1774102702\73544517" -childID 2 -isForBrowser -prefsHandle 3464 -prefMapHandle 3460 -prefsLen 945 -prefMapSize 219548 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3156 "\\.\pipe\gecko-crash-server-pipe.3156" 3492 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3156.20.511046736\928918083" -childID 3 -isForBrowser -prefsHandle 3808 -prefMapHandle 3804 -prefsLen 6936 -prefMapSize 219548 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3156 "\\.\pipe\gecko-crash-server-pipe.3156" 3820 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3156.27.1985394323\1262236062" -childID 4 -isForBrowser -prefsHandle 8168 -prefMapHandle 8172 -prefsLen 10764 -prefMapSize 219548 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3156 "\\.\pipe\gecko-crash-server-pipe.3156" 8160 tab3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 4afc02e6edc033e4fc1d29fcf3fa5e59 IlQUBDt6ekGQQj2n1bnoDg.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\KMSauto\" -spe -an -ai#7zMap19518:76:7zEvent275051⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\" -spe -an -ai#7zMap24813:104:7zEvent60971⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\script.vbs1⤵
-
C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\build.exe"C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\build.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\KMSAuto Net.exe"C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\KMSAuto Net.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Downloads\KMSauto.zipMD5
14063373723dbd5872ae443e8906f543
SHA14ca380f44f237a4efe30a0631806c4f560e4ebb1
SHA256c3c018be2ccfb5d88e79781f4e18de921df606ba799c2a69999b5a940cb0c169
SHA512fe9bec659a5a656514eeb04231e170aa6d21a3395c4d644656ffb8938b77ec8c8ca9c3692de88d8d7665f4904ba08908702a1f49141ecca2740e7419e3190024
-
C:\Users\Admin\Downloads\KMSauto\KMSauto-setup.exeMD5
1736e5fac5c7eec9cd04bf36c4259c6c
SHA1111db7cedcb00945d92217e2de2d90025120ea2c
SHA25629775a3f92792a858dd842588b76ba9205f24be7898e43851aba26b17e411203
SHA512211f7f2c798c1f2b4d69fe481b16796e79b99910e63ecb0863951654c804d07542dddcfc730166ce15ca143984b8ea17d662e0f0d34d9fa4c6f8207ce2063aeb
-
C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\KMSAuto Net.exeMD5
93a3a8ce440197d31168fac569082937
SHA1fad3066803a1ba8f9cb8bb7d1969eea0398b5ea0
SHA25622ef521964080e77d7006f9341d720683fa98409361c62a7bc4fe81ec474b1b2
SHA51208efe7e24d8d9e484d39c1381421c3fbbf231e46a5ac33c22bf3735a06c4a3d278a752c25afeb4217cc663a6c6955a55985056a7d5d5142e57c2ac5d99e5d0c8
-
C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\KMSAuto Net.exeMD5
7fc71f8f2091f7c81bc70254c240e45a
SHA1c20c3ca4e3ddcb64e8e3a3cf8299f3800608ac4d
SHA2562e032ee9d1328a5410966ab65fcb515045e3b50b5caaf8e7ba9eac225b68f52e
SHA51299dd09cea6690397f6b09d7154cea44d1a49aec64acb9406b386c5ab0888596df4aca1a4b2f301ad9f7ba53f600d596c583b8276c6ce4d1b2647ea97526b83bd
-
C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\build.exeMD5
f3afdb99001b373339d801a2bb52a071
SHA11194f3c3377cdcfca3f7c5843c8f002fe291335b
SHA2561550e90b235a43401b6c660a24849f96c0ae514dbbdc1336a12a286a5cbfeca7
SHA51257d76d81c72548d298d3324486cf7750ed76a212ff8aa1cc45d11f404a6933a0daa39d71d1115607e50e4464dce4178717aafe2dccdc6968974d0ea0e4b0dd59
-
C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\build.exeMD5
f3afdb99001b373339d801a2bb52a071
SHA11194f3c3377cdcfca3f7c5843c8f002fe291335b
SHA2561550e90b235a43401b6c660a24849f96c0ae514dbbdc1336a12a286a5cbfeca7
SHA51257d76d81c72548d298d3324486cf7750ed76a212ff8aa1cc45d11f404a6933a0daa39d71d1115607e50e4464dce4178717aafe2dccdc6968974d0ea0e4b0dd59
-
C:\Users\Admin\Downloads\KMSauto\KMSauto-setup\script.vbsMD5
0dea7d1c1544d71cc604cd364f5b9e52
SHA1c02058d9241ec21c9dd81f280fa2f988b6762544
SHA256fd3a646f5f862fb4eb34a1a7b4274a8be4a6afd8364e2f24a58c6dbde1e10214
SHA512abaf39f768931dd4c7cb749d6c5a280d443888b445beed4b12aa41bee5259407683e62cfaa7ab8e4d61ff223867356dcfd2de2eeed39a1f1273653b28f912ba1
-
memory/4948-137-0x00000000006D0000-0x0000000000718000-memory.dmpFilesize
288KB