Behavioral task
behavioral1
Sample
HEU_KMS_Activator_v30.3.0/HEU_KMS_Activator_30.3.0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
HEU_KMS_Activator_v30.3.0/HEU_KMS_Activator_30.3.0.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
HEU_KMS_Activator_v30.3.0/J - ˬɾڣ.url
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
HEU_KMS_Activator_v30.3.0/J - ˬɾڣ.url
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
HEU_KMS_Activator_v30.3.0/.url
Resource
win7-20231025-en
Behavioral task
behavioral6
Sample
HEU_KMS_Activator_v30.3.0/.url
Resource
win10v2004-20231023-en
General
-
Target
f1afaa52fc2bdf058d7c86bf8aa58633fba0a7b68c6e439f160523dab4f15d65.zip.zip
-
Size
4.3MB
-
MD5
64f4234ad291503c545f84c31f48629b
-
SHA1
b971eb275cc04209cae89e90913acf3b7a81828a
-
SHA256
1afd101a0e36baeef4ca4d26c2d3eb793e1014d6c89841f1c59dfc3fe756d3a8
-
SHA512
2048ae4724cb1ee1a5fe702fd512eefeee60f213d8b84eab9d74818bc91657063181d94942e44476e3ffb2b3a78b49f28cd71fc8bcc80172507235a1b4113f88
-
SSDEEP
98304:Tl4r3jx2I7hN90nLzi9XXhHOGoViJ6DBY4mq3sDkNAkiSkH9RlUFsj:TluQIFN9AsXXoVi+74QAkdCnj
Malware Config
Signatures
-
resource yara_rule static1/unpack002/HEU_KMS_Activator_v30.3.0/HEU_KMS_Activator_30.3.0.exe upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule static1/unpack003/out.upx autoit_exe -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack002/HEU_KMS_Activator_v30.3.0/HEU_KMS_Activator_30.3.0.exe unpack003/out.upx
Files
-
f1afaa52fc2bdf058d7c86bf8aa58633fba0a7b68c6e439f160523dab4f15d65.zip.zip.zip
Password: infected
-
f1afaa52fc2bdf058d7c86bf8aa58633fba0a7b68c6e439f160523dab4f15d65.zip.zip
-
HEU_KMS_Activator_v30.3.0/HEU3030_Debug.txt
-
HEU_KMS_Activator_v30.3.0/HEU_KMS_Activator_30.3.0.exe.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 4.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 372KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 619KB - Virtual size: 618KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
HEU_KMS_Activator_v30.3.0/J - ˬɾڣ.url.url
-
HEU_KMS_Activator_v30.3.0/Źں.jpg.jpg
-
http://weixin.qq.com/r/AiiutiXEk3jsrWHV930Q
-
-
HEU_KMS_Activator_v30.3.0/.url.url
-
HEU_KMS_Activator_v30.3.0/־.txt