Overview
overview
10Static
static
803bf25deb9...f2.zip
windows10_x64
1??????V17.0.exe
windows10_x64
30a4b3a05f7...e0.exe
windows10_x64
91286783ba7...da.exe
windows10_x64
92129e70155...a9.exe
windows10_x64
329cc23f499...31.exe
windows10_x64
13536ff0652...5a.exe
windows10_x64
13e6c4e569c...f0.exe
windows10_x64
154c7b99377...94.exe
windows10_x64
1595aa62880...0a.exe
windows10_x64
361eb576454...c7.exe
windows10_x64
5721fd78188...27.exe
windows10_x64
17a6bc0ae41...5f.exe
windows10_x64
37c0fdee367...b8.exe
windows10_x64
17e489f1f72...21.exe
windows10_x64
18a3a5aa3a0...20.exe
windows10_x64
88bec567244...2e.exe
windows10_x64
791e956fd59...21.exe
windows10_x64
194fe30df66...ff.exe
windows10_x64
10a0262556d4...a3.zip
windows10_x64
1heukms/HEU....1.exe
windows10_x64
8a355a148d6...0b.exe
windows10_x64
1b00ffa55cc...85.exe
windows10_x64
3dca66d16ee...1e.rar
windows10_x64
3mini-KMS_A...NG.exe
windows10_x64
9eb54cd2d61...fc.exe
windows10_x64
1eb83ccd27c...3b.exe
windows10_x64
10eb87a4c70b...03.exe
windows10_x64
3f05119aa88...eb.exe
windows10_x64
1fb01b16f03...ca.exe
windows10_x64
3fd6c69c345...20.exe
windows10_x64
10fe9e92957e...ca.exe
windows10_x64
8Resubmissions
28-03-2022 02:35
220328-c3bd6acaaj 10Analysis
-
max time kernel
189s -
max time network
282s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
28-03-2022 02:35
Behavioral task
behavioral1
Sample
03bf25deb99486e193a91bbcab909accc31ed63a23541944a1129dbacbade4f2.zip
Resource
win10-20220223-en
Behavioral task
behavioral2
Sample
??????V17.0.exe
Resource
win10-20220223-en
Behavioral task
behavioral3
Sample
0a4b3a05f79c66c047d02874b75208964d1930b5983a19e5365a6e4fe286f6e0.exe
Resource
win10-20220223-en
Behavioral task
behavioral4
Sample
1286783ba7602d5456c62fd69fd73bea63c739230352d54e962b03e8d4a6a3da.exe
Resource
win10-20220310-en
Behavioral task
behavioral5
Sample
2129e7015548f74908e22b4270a483d3f2c4a9e6335739c26c4c901fa86b77a9.exe
Resource
win10-20220310-en
Behavioral task
behavioral6
Sample
29cc23f49938a7cd221e161b2ebb6ee9d8399aa031869ee011a059d9bf5ff831.exe
Resource
win10-20220223-en
Behavioral task
behavioral7
Sample
3536ff0652b3dc66e28dd0700e28829f8d57713d43b92dc5445fe988e7795d5a.exe
Resource
win10-20220223-en
Behavioral task
behavioral8
Sample
3e6c4e569c9254a2d8e3d8ceccba13dc8b0e65b2172c2e9e1d3bf1a1b18e56f0.exe
Resource
win10-20220223-en
Behavioral task
behavioral9
Sample
54c7b993776472802f7a61d243eb7684a48dfaec1d3fdbabbcde8fef84a5d894.exe
Resource
win10-20220223-en
Behavioral task
behavioral10
Sample
595aa6288029577e27ccbcf265aa654ef600d3b058b06ad441ebfd37371bc50a.exe
Resource
win10-20220310-en
Behavioral task
behavioral11
Sample
61eb576454a7fd7435fc0469b86b9b8285d14daf7e172281ade900cef3dda7c7.exe
Resource
win10-20220310-en
Behavioral task
behavioral12
Sample
721fd781881c0cda7dc52ff2d24b4a9dabe9854317098bb863f8e591c773cb27.exe
Resource
win10-20220223-en
Behavioral task
behavioral13
Sample
7a6bc0ae4129f80c321dd2500a974a6b1e77829f76fddb57f36cbb886e6c295f.exe
Resource
win10-20220223-en
Behavioral task
behavioral14
Sample
7c0fdee3670cc53a22844d691307570a21ae3be3ce4b66e46bb6d9baad1774b8.exe
Resource
win10-20220223-en
Behavioral task
behavioral15
Sample
7e489f1f72cac9f1c88bdc6be554c78b5a14197d63d1bae7e41de638e903af21.exe
Resource
win10-20220223-en
Behavioral task
behavioral16
Sample
8a3a5aa3a0b6366f18192afa46ae0bec911941359e488c25587b19bc55600f20.exe
Resource
win10-20220223-en
Behavioral task
behavioral17
Sample
8bec56724443b4142ceea109f5179fe34f2c6ab51a0996b822b928e818201e2e.exe
Resource
win10-20220223-en
Behavioral task
behavioral18
Sample
91e956fd598ecef4c04bc0d4b5852ac91aa260d7252a2020ddf1ce15d0d10521.exe
Resource
win10-20220310-en
Behavioral task
behavioral19
Sample
94fe30df66ffa19efb5d4d95f11212273c008788410c6e59e251589ce1cea5ff.exe
Resource
win10-20220223-en
Behavioral task
behavioral20
Sample
a0262556d45bb84c1e5d907fe3c7071793d39ba2bb8f5a1f775ec3fea35a0fa3.zip
Resource
win10-20220310-en
Behavioral task
behavioral21
Sample
heukms/HEU_KMS_Activator_v19.5.1.exe
Resource
win10-20220223-en
Behavioral task
behavioral22
Sample
a355a148d687d4d2c03c63f9d142fb3eb423700d46668345c17bfc83ece7100b.exe
Resource
win10-20220223-en
Behavioral task
behavioral23
Sample
b00ffa55cc974a66746bf571818810ec123ad541dc8dd8a967d644f7a65bf085.exe
Resource
win10-20220223-en
Behavioral task
behavioral24
Sample
dca66d16eeb26f3805ae66bac53c261c2c274c88b7ea364d9b155b39a26e2e1e.rar
Resource
win10-20220223-en
Behavioral task
behavioral25
Sample
mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe
Resource
win10-20220310-en
Behavioral task
behavioral26
Sample
eb54cd2d61507b9e98712de99834437224b1cef31a81544a47d93e470b8613fc.exe
Resource
win10-20220310-en
Behavioral task
behavioral27
Sample
eb83ccd27c799b395ceb8c2d812f816d86a5688eee9b9145c11bbb9d37b5e43b.exe
Resource
win10-20220223-en
Behavioral task
behavioral28
Sample
eb87a4c70b7ef88575c4f1fd1ac47361d20a738ba95d05b91a018a313fdea003.exe
Resource
win10-20220310-en
Behavioral task
behavioral29
Sample
f05119aa888842e9e2f48040c766ced23ea40f89d9c0160cafef0c7d5c96f5eb.exe
Resource
win10-20220223-en
Behavioral task
behavioral30
Sample
fb01b16f033d19e5533c9e0846c510649eaa5c21321d1a5b9b284ab2655424ca.exe
Resource
win10-20220223-en
Behavioral task
behavioral31
Sample
fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320.exe
Resource
win10-20220223-en
Behavioral task
behavioral32
Sample
fe9e92957e22f009fd22fba305caa0172d5dcdd11010b848dc75913e640473ca.exe
Resource
win10-20220223-en
General
-
Target
mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe
-
Size
1018KB
-
MD5
be7563a984dc5168ce14181b90432859
-
SHA1
b98280f7310095da26de3e448beb489998f74c54
-
SHA256
e9045c4012cdfd4f2911db303478527e2006aa3b148dfdbacae85b4ee3b52e5e
-
SHA512
363339b8c932c69473ae34daad38fb0f86979a6173a2ca570b28a767251299af97c81376a2b1c41f2eeabe86e6933a332f9c891d9eb2ba4893910fee1c6d3f12
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\apm567A.tmp acprotect -
Executes dropped EXE 2 IoCs
Processes:
cscript.exeautorun.exepid process 2448 cscript.exe 2156 autorun.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\apm567A.tmp upx -
Loads dropped DLL 1 IoCs
Processes:
autorun.exepid process 2156 autorun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
mini-KMS_Activator_v1.3_Office2010_VL_ENG.execmd.exedescription pid process target process PID 1552 wrote to memory of 1876 1552 mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe cmd.exe PID 1552 wrote to memory of 1876 1552 mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe cmd.exe PID 1552 wrote to memory of 1876 1552 mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe cmd.exe PID 1876 wrote to memory of 2448 1876 cmd.exe cscript.exe PID 1876 wrote to memory of 2448 1876 cmd.exe cscript.exe PID 1876 wrote to memory of 2448 1876 cmd.exe cscript.exe PID 1876 wrote to memory of 2156 1876 cmd.exe autorun.exe PID 1876 wrote to memory of 2156 1876 cmd.exe autorun.exe PID 1876 wrote to memory of 2156 1876 cmd.exe autorun.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe"C:\Users\Admin\AppData\Local\Temp\mini-KMS_Activator_v1.3_Office2010_VL_ENG.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4544.tmp\Run.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\4544.tmp\cscript.execscript HS_MESSAGE.vbs "Did you run the program as Administrator? " "Activation Tool" Q YESNO 303⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\4544.tmp\autorun.exeautorun.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4544.tmp\HS_MESSAGE.vbsFilesize
796B
MD5af0559e0301b2f75fa7ce812c5296de8
SHA1205ddd069a599d20f0e91e17bbf3250eb339cc9e
SHA25656a32a3cd84010b6517ed492ae6eadac54e5a903f4a0d21b4db32431416d82a2
SHA512b80b0a1e9f142b16fcd54b24b23b637115454bf637d1abbaf8f9076a33148331e26668dadaa16202fbdbfcdcb152db519a26cee52a01af82149fdf2af2e70db0
-
C:\Users\Admin\AppData\Local\Temp\4544.tmp\Run.cmdFilesize
1KB
MD50b851d375a6a8a8b04431d9635371f85
SHA14cf97a4f0e3b04e476b4492cce7409a5c20b68ef
SHA256706d9ddf9c333f9c77238d22500dfb294776220625755e5668dff80246fc48fa
SHA512b5bbf8aaed186aaca7c87f2c8528ea669da3ac4fc3d09f136c56244b78369f2105d707fe37f2cd7b546c9ad676758184daa6799324838bb59bf1bd0d561fb35d
-
C:\Users\Admin\AppData\Local\Temp\4544.tmp\autorun.apmFilesize
193KB
MD5748f99ec78fc9e2e3bba87c6441dfd0e
SHA1a87a9290cd1678c3ac0e69bbed924791a27bc540
SHA2567d33cd2203c3e4268855f00d897f51eaf4b1d4f06e198d3a05d5f923e3ccd794
SHA5129c320ed5b6a52384037b885cd8dcb850112466c0d47d78290ffd6f2955c59e847c303fa5778cfeb6f195fbf4cb5cbbfeabad121c478bbb2f67edb57470bbf368
-
C:\Users\Admin\AppData\Local\Temp\4544.tmp\autorun.exeFilesize
1.4MB
MD5c98d6abc5ae3fcd85f2ae09d95f584cb
SHA134a2fd801509cc81f3cd2fa8fa341143cbee1d93
SHA256c8d480b605a9e3c13f411cd3a6da44ed460704f3e529719bdc536d983ceb024d
SHA5124449171b6209c181b3b620ebac69ab899abcf4914e867eac6eb4ccc78dc990317daf513cc9884a81bb17b8013031835678b6f74357fbd948ea6d25cabdf70bb4
-
C:\Users\Admin\AppData\Local\Temp\4544.tmp\autorun.exeFilesize
1.4MB
MD5c98d6abc5ae3fcd85f2ae09d95f584cb
SHA134a2fd801509cc81f3cd2fa8fa341143cbee1d93
SHA256c8d480b605a9e3c13f411cd3a6da44ed460704f3e529719bdc536d983ceb024d
SHA5124449171b6209c181b3b620ebac69ab899abcf4914e867eac6eb4ccc78dc990317daf513cc9884a81bb17b8013031835678b6f74357fbd948ea6d25cabdf70bb4
-
C:\Users\Admin\AppData\Local\Temp\4544.tmp\cscript.exeFilesize
149KB
MD534098403f9d8f71ce2ec749122168e89
SHA10aed0994e4b43bc3ecc2106dc1c1d3210c82b7d7
SHA25612df0b06a9b56dce3efdb85984f84b387b1a5b61c9ebbf5a3bd61a5fbb996f60
SHA512e5b27d305b2a1c411bffbbf6c6534a92ce17af807c69344ed31a2fee42639ac5fef97ef4a654c4d6b2b8d42ba808856b857e9b4d8c008a7ba98adbab6c6b9372
-
C:\Users\Admin\AppData\Local\Temp\4544.tmp\cscript.exeFilesize
149KB
MD534098403f9d8f71ce2ec749122168e89
SHA10aed0994e4b43bc3ecc2106dc1c1d3210c82b7d7
SHA25612df0b06a9b56dce3efdb85984f84b387b1a5b61c9ebbf5a3bd61a5fbb996f60
SHA512e5b27d305b2a1c411bffbbf6c6534a92ce17af807c69344ed31a2fee42639ac5fef97ef4a654c4d6b2b8d42ba808856b857e9b4d8c008a7ba98adbab6c6b9372
-
\Users\Admin\AppData\Local\Temp\apm567A.tmpFilesize
146KB
MD53d4839228c7ee77e28832879eeb17340
SHA1ebe4a6388c8c6831837e232b48b8f4266b7f711e
SHA2565d6ff8a11cda6d5b1e6d8a5562594379a082cee18f402a8a0a26b8cabe428954
SHA512f3c534524eaa4b51ee44a6c1d05a142c0d10d9c1c48db79b60903dd948d5712b367479b82cd85fa8ee094dcd2569c0fd85a36c10c97deab59e49e1f1f4da6c56
-
memory/1876-118-0x0000000000000000-mapping.dmp
-
memory/2156-124-0x0000000000000000-mapping.dmp
-
memory/2448-120-0x0000000000000000-mapping.dmp