Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
7Activator/...ot.cmd
windows7-x64
1Activator/...ot.cmd
windows10-2004-x64
8Activator/...or.cmd
windows7-x64
8Activator/...or.cmd
windows10-2004-x64
8Activator/...ce.cmd
windows7-x64
8Activator/...ce.cmd
windows10-2004-x64
8Activator/...ws.cmd
windows7-x64
1Activator/...ws.cmd
windows10-2004-x64
8Activator/...TO.exe
windows7-x64
7Activator/...TO.exe
windows10-2004-x64
7Activator/...or.lnk
windows7-x64
1Activator/...or.lnk
windows10-2004-x64
1Activator/...er.exe
windows7-x64
1Activator/...er.exe
windows10-2004-x64
1Activator/...it.exe
windows7-x64
7Activator/...it.exe
windows10-2004-x64
7mini-KMS_A...NG.exe
windows7-x64
7mini-KMS_A...NG.exe
windows10-2004-x64
7mini-KMS_A...US.exe
windows7-x64
7mini-KMS_A...US.exe
windows10-2004-x64
7Analysis
-
max time kernel
28s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 14:32
Behavioral task
behavioral1
Sample
Activator/ActivationNextBoot.cmd
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Activator/ActivationNextBoot.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Activator/Activator.cmd
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Activator/Activator.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Activator/ActivatorOffice.cmd
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Activator/ActivatorOffice.cmd
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Activator/ActivatorWindows.cmd
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
Activator/ActivatorWindows.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Activator/KMSAuto/KMSAUTO.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Activator/KMSAuto/KMSAUTO.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Activator/KMSAuto/KMSAuto - Windows & Office Activator.lnk
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
Activator/KMSAuto/KMSAuto - Windows & Office Activator.lnk
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
Activator/KMSAuto/KMSCleaner.exe
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Activator/KMSAuto/KMSCleaner.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Activator/KMSAuto/Wait.exe
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
Activator/KMSAuto/Wait.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral17
Sample
mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral19
Sample
mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe
Resource
win7-20231025-en
Behavioral task
behavioral20
Sample
mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe
Resource
win10v2004-20231020-en
General
-
Target
mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
-
Size
1.0MB
-
MD5
b18903f14c92f3b9d3d08ca13a39efdd
-
SHA1
d146af98eb5ce7a3ecbff8163eef002458a1f442
-
SHA256
aa00aad043d88370e5225a1dabae3ea49cc703a9575edd41f24263b013c2f949
-
SHA512
ea179a625c8fe9eeec5920fbfb868966c6605b61ca1e1421697682b9a703bb46107fb8db3acd46fae50b97506055e5dbdf9fd16119ec97fad5bc794e41bfa182
-
SSDEEP
24576:+PQRqBbikTHaaS3imkNQo1mLw+N4HtSzxGp1XCStb6ZDKb:LpoHar3BMQoEBu6UpNtoDKb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe -
Executes dropped EXE 1 IoCs
pid Process 3252 autorun.exe -
resource yara_rule behavioral18/memory/4524-0-0x0000000000400000-0x0000000000669000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4524 wrote to memory of 3260 4524 mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe 90 PID 4524 wrote to memory of 3260 4524 mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe 90 PID 4524 wrote to memory of 3260 4524 mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe 90 PID 3260 wrote to memory of 3252 3260 cmd.exe 93 PID 3260 wrote to memory of 3252 3260 cmd.exe 93 PID 3260 wrote to memory of 3252 3260 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe"C:\Users\Admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E947.tmp\Start.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\E947.tmp\autorun.exeautorun.exe3⤵
- Executes dropped EXE
PID:3252
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51B
MD55dbf6f6f2093d14dd0d2bdb71a333eb0
SHA1b81f0ffb620d6fe38958706f2c62fdeb816c5bb6
SHA2562c0434dbfb7befba658ccb67be2643484b76a49dadc26a3cbe7ffc3c6e2ec5da
SHA51205ba55f8070ffde23755dae6139e22b340744e2c6fe268d6bd5582d4f02a49f5bd9f934b650244b1e7b120a84f507293afef5dec98a0ce274a6035b06fff0410
-
Filesize
51B
MD55dbf6f6f2093d14dd0d2bdb71a333eb0
SHA1b81f0ffb620d6fe38958706f2c62fdeb816c5bb6
SHA2562c0434dbfb7befba658ccb67be2643484b76a49dadc26a3cbe7ffc3c6e2ec5da
SHA51205ba55f8070ffde23755dae6139e22b340744e2c6fe268d6bd5582d4f02a49f5bd9f934b650244b1e7b120a84f507293afef5dec98a0ce274a6035b06fff0410
-
Filesize
1.4MB
MD59756dc84dd17e58c4b4aaba3279364d3
SHA1d363c8527c6e98adfa1baaecfa0b5928cf4ccb30
SHA2560fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc
SHA512f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d
-
Filesize
1.4MB
MD59756dc84dd17e58c4b4aaba3279364d3
SHA1d363c8527c6e98adfa1baaecfa0b5928cf4ccb30
SHA2560fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc
SHA512f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d