Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2023 03:30

General

  • Target

    KMSpico.rar

  • Size

    3.6MB

  • MD5

    7e5feda84e0420546e5741334c98e5af

  • SHA1

    557106a12926c4898f59dd7e39663f3b5fafc313

  • SHA256

    2a213313c073e2003e8c5c2bcbfc7a06fec960ed286cc59b4054b9899bda52cf

  • SHA512

    4e11536eafc8cfd4c0953414cd9a09993733d403e1a9370e3f9bf9db224c225d6c5c1c50e593366f79deac8c9f7db63e06fdf3fc6999536e124826091009e8b5

  • SSDEEP

    98304:F7zCLYdsM1uBemsPgJ4KKSUyUS8TNe16FxAcMhc:lzCLguwLP4bU1LTNiCXMq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\KMSpico.rar
    1⤵
    • Modifies registry class
    PID:492
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2692
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda63b9758,0x7ffda63b9768,0x7ffda63b9778
      2⤵
        PID:3632
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:2
        2⤵
          PID:1216
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:8
          2⤵
            PID:1052
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1764 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:8
            2⤵
              PID:1556
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:1
              2⤵
                PID:4128
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:1
                2⤵
                  PID:3996
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4680 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:1
                  2⤵
                    PID:4900
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:8
                    2⤵
                      PID:648
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5028 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:8
                      2⤵
                        PID:4520
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:8
                        2⤵
                          PID:4736
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5344 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:8
                          2⤵
                            PID:1204
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:8
                            2⤵
                              PID:2228
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1492
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:1284

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              62fff39ff45e0808e6b7a0f3e0a29849

                              SHA1

                              32be6f0379ac82cc37a228e922f16b362e7d67ac

                              SHA256

                              d24b919a95f5c80bf347750e1d5e70ae9d8ba6461c1681a3ae231c80bb9ea4c6

                              SHA512

                              27926b0b65ffde0f424ece6b38a1ef273a193a8b6a4ea04dbf3f2ba4ecec19310734313c0c33e12f294cc298087948a06ba46c2cc0aa7bbfd36b41b56d8aed3d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              371B

                              MD5

                              bd0b7aab7744142cb7d856014994cf48

                              SHA1

                              c0361619622a7873eecc18f9b8efdc3961508c26

                              SHA256

                              92c245f402da8270149beddd12ac8593140a327f8ea69dd7d118214210c0c52b

                              SHA512

                              d598d18993cb683a8f0a814a36181d0dde168675e8756ee8bf4d0927a8363f05ca1809b46c3012dc4c97c22deeb53b72476b100a203bcdafd428601b1fd223b1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              4998bfaf3e90a915fbb55ef0b0678ce5

                              SHA1

                              78658100932866a667e4230cdaf1c2c1bae28dff

                              SHA256

                              7678f040633ccea088c1b0803f74235068a3f5e6f3e4c55bb3a796a9bcc67bba

                              SHA512

                              911d1d378aaab0601e1bee8d445042d676324861a3b60416d54ea8bb964595bcb121937ceb6701bd1f55fd49f9c2c2f0d3b3da9b3e595fec1830de572a5ad9b2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              2147cab2c40b8983fcf715c00cfc2bcb

                              SHA1

                              5e3cdea00f74d7af52dfa7d476741279f8d18089

                              SHA256

                              36456f9d670dc0e4669a11555919947a94cab954fd0825a9f9e8c9a898d48192

                              SHA512

                              cc812b53d25c4eb8ed47de86bcf901b838e502bb9facf64f810682e25dddee4a7277fce703641c8a4bd890facb5a7eefa79a37ed1fac7370a8c560f5a14a7452

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              12876cb83b9101adfd56b946029ff2e3

                              SHA1

                              20935c0d5cafa2da186320e9d754afbb614d6c73

                              SHA256

                              cb29830ee139ae3edf7601e9112eb38ea365f4eb0de6bf25c740647306f632ff

                              SHA512

                              fcbb1c2d7ad4c7545e12f013c91b146eb95bed4116ece5c487640d245d2e3f89f78a7f0ba95996c635da982bc221ad755d7a041bc9ef95577d3bb893b802426e

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              178KB

                              MD5

                              9db7b1d7c60f9bd0c8a2e15cc3601077

                              SHA1

                              8960696f3400e9bb43965c3a637010d9a1095ffc

                              SHA256

                              0a37be722c47e0c64a83a04baf34a6cde55abd7b05ed3c5b05a1c5fd61ed7194

                              SHA512

                              c3ac6c6e828bc2a252ad108574bf41a42abd840609c1b0072fff01672c9a509a671b354aaf084ce23fa46b5f40069dba9a6270df5a1dd5a012f66349f9913bf7

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd