Behavioral task
behavioral1
Sample
HEU_KMS_Activator_v30.4.0/!果核剥壳 - 全网更新最快.url
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
HEU_KMS_Activator_v30.4.0/!果核剥壳 - 全网更新最快.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
HEU_KMS_Activator_v30.4.0/HEU_KMS_Activator_30.4.0.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
HEU_KMS_Activator_v30.4.0/HEU_KMS_Activator_30.4.0.exe
Resource
win10v2004-20230915-en
General
-
Target
b7d76485df97e2bd1a346c691f26e7a1e0d8aa7c38dead7378870ab9dd665fb6
-
Size
4.3MB
-
MD5
791244f4d30d502bc4e66e23d2765ab2
-
SHA1
76b8428c939d313018d13622c0436de025e07f02
-
SHA256
b7d76485df97e2bd1a346c691f26e7a1e0d8aa7c38dead7378870ab9dd665fb6
-
SHA512
4e5a5a113e0b38a89b513df3709359ae3d5ff94a73c792be18d9596d8cb6c1b40a1f5c85e6ac6a858d1d7448b24206583b8e4d36324599c3648ff6f53a28c87c
-
SSDEEP
98304:FkCoG/s4kn73Uh1gwrUt86mY/HuABbNoeFATWfdMGNvQVqIye6K+v:FkCoG/sc1YyY/JntFXFMivQEI3V+v
Malware Config
Signatures
-
resource yara_rule static1/unpack001/HEU_KMS_Activator_v30.4.0/HEU_KMS_Activator_30.4.0.exe upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule static1/unpack002/out.upx autoit_exe -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/HEU_KMS_Activator_v30.4.0/HEU_KMS_Activator_30.4.0.exe unpack002/out.upx
Files
-
b7d76485df97e2bd1a346c691f26e7a1e0d8aa7c38dead7378870ab9dd665fb6.zip
-
HEU_KMS_Activator_v30.4.0/!关注微信 - 更多福利.png.png
-
HEU_KMS_Activator_v30.4.0/!果核剥壳 - 全网更新最快.url.url
-
HEU_KMS_Activator_v30.4.0/HEU_KMS_Activator_30.4.0.exe.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 4.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 372KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 619KB - Virtual size: 618KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ