Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
7Activator/...ot.cmd
windows7-x64
1Activator/...ot.cmd
windows10-2004-x64
8Activator/...or.cmd
windows7-x64
8Activator/...or.cmd
windows10-2004-x64
8Activator/...ce.cmd
windows7-x64
8Activator/...ce.cmd
windows10-2004-x64
8Activator/...ws.cmd
windows7-x64
1Activator/...ws.cmd
windows10-2004-x64
8Activator/...TO.exe
windows7-x64
7Activator/...TO.exe
windows10-2004-x64
7Activator/...or.lnk
windows7-x64
1Activator/...or.lnk
windows10-2004-x64
1Activator/...er.exe
windows7-x64
1Activator/...er.exe
windows10-2004-x64
1Activator/...it.exe
windows7-x64
7Activator/...it.exe
windows10-2004-x64
7mini-KMS_A...NG.exe
windows7-x64
7mini-KMS_A...NG.exe
windows10-2004-x64
7mini-KMS_A...US.exe
windows7-x64
7mini-KMS_A...US.exe
windows10-2004-x64
7Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 14:32
Behavioral task
behavioral1
Sample
Activator/ActivationNextBoot.cmd
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Activator/ActivationNextBoot.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Activator/Activator.cmd
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Activator/Activator.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Activator/ActivatorOffice.cmd
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Activator/ActivatorOffice.cmd
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Activator/ActivatorWindows.cmd
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
Activator/ActivatorWindows.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Activator/KMSAuto/KMSAUTO.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Activator/KMSAuto/KMSAUTO.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Activator/KMSAuto/KMSAuto - Windows & Office Activator.lnk
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
Activator/KMSAuto/KMSAuto - Windows & Office Activator.lnk
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
Activator/KMSAuto/KMSCleaner.exe
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Activator/KMSAuto/KMSCleaner.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Activator/KMSAuto/Wait.exe
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
Activator/KMSAuto/Wait.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral17
Sample
mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
mini-KMS_Activator_v1.1_Office.2010.VL.ENG.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral19
Sample
mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe
Resource
win7-20231025-en
Behavioral task
behavioral20
Sample
mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe
Resource
win10v2004-20231020-en
General
-
Target
mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe
-
Size
1.0MB
-
MD5
dd3ff103d7709467ac1390ab02eaca2c
-
SHA1
3020916fc4f7e073abb12333bfe32d9f1da85181
-
SHA256
b9ce9d101438ef819a5ac844f4ce4cd54f15686ae8cc47c3d2e669d275129d20
-
SHA512
222a66a69848dbf5273614ef81eebd71aa11b4b0ef93c544edcb198a13869583d07f95f0bd25dd7f7efae018ebf20f4ca2551c86fce6daf5851e396bb66adef0
-
SSDEEP
24576:qPQRqBbikTHaaS3imkNQo1mLw+N4HtSzxGp1XCStb6ZDK:vpoHar3BMQoEBu6UpNtoDK
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral19/files/0x0030000000015586-70.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2524 autorun.exe -
Loads dropped DLL 3 IoCs
pid Process 1976 cmd.exe 1976 cmd.exe 2524 autorun.exe -
resource yara_rule behavioral19/memory/1128-0-0x0000000000400000-0x0000000000669000-memory.dmp upx behavioral19/files/0x0030000000015586-70.dat upx behavioral19/memory/2524-72-0x0000000010000000-0x000000001007E000-memory.dmp upx behavioral19/memory/1128-80-0x0000000000400000-0x0000000000669000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1976 1128 mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe 27 PID 1128 wrote to memory of 1976 1128 mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe 27 PID 1128 wrote to memory of 1976 1128 mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe 27 PID 1128 wrote to memory of 1976 1128 mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe 27 PID 1976 wrote to memory of 2524 1976 cmd.exe 29 PID 1976 wrote to memory of 2524 1976 cmd.exe 29 PID 1976 wrote to memory of 2524 1976 cmd.exe 29 PID 1976 wrote to memory of 2524 1976 cmd.exe 29 PID 1976 wrote to memory of 2524 1976 cmd.exe 29 PID 1976 wrote to memory of 2524 1976 cmd.exe 29 PID 1976 wrote to memory of 2524 1976 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe"C:\Users\Admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\Start.cmd" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\autorun.exeautorun.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51B
MD55dbf6f6f2093d14dd0d2bdb71a333eb0
SHA1b81f0ffb620d6fe38958706f2c62fdeb816c5bb6
SHA2562c0434dbfb7befba658ccb67be2643484b76a49dadc26a3cbe7ffc3c6e2ec5da
SHA51205ba55f8070ffde23755dae6139e22b340744e2c6fe268d6bd5582d4f02a49f5bd9f934b650244b1e7b120a84f507293afef5dec98a0ce274a6035b06fff0410
-
Filesize
51B
MD55dbf6f6f2093d14dd0d2bdb71a333eb0
SHA1b81f0ffb620d6fe38958706f2c62fdeb816c5bb6
SHA2562c0434dbfb7befba658ccb67be2643484b76a49dadc26a3cbe7ffc3c6e2ec5da
SHA51205ba55f8070ffde23755dae6139e22b340744e2c6fe268d6bd5582d4f02a49f5bd9f934b650244b1e7b120a84f507293afef5dec98a0ce274a6035b06fff0410
-
Filesize
193KB
MD58e5f16c13b8f2c57b441bb942b8512a8
SHA1c9e0aa4781a0d0c58c575ce0cc58f6961df95f27
SHA2567f81c2104e5230c6c0618339d682e9803f9d26c58d1b7551525684515161b921
SHA512bbdfb7c249643ee6b03c2aa9b4a405f59e5ced725420140fd7120d9ef107f85e89d9693df850f9abfe5166ac85f0218abfa4f412801884e755ee95fe29bcad4a
-
Filesize
1.4MB
MD59756dc84dd17e58c4b4aaba3279364d3
SHA1d363c8527c6e98adfa1baaecfa0b5928cf4ccb30
SHA2560fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc
SHA512f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d
-
Filesize
1.4MB
MD59756dc84dd17e58c4b4aaba3279364d3
SHA1d363c8527c6e98adfa1baaecfa0b5928cf4ccb30
SHA2560fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc
SHA512f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d
-
Filesize
1.4MB
MD59756dc84dd17e58c4b4aaba3279364d3
SHA1d363c8527c6e98adfa1baaecfa0b5928cf4ccb30
SHA2560fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc
SHA512f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d
-
Filesize
1.4MB
MD59756dc84dd17e58c4b4aaba3279364d3
SHA1d363c8527c6e98adfa1baaecfa0b5928cf4ccb30
SHA2560fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc
SHA512f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d
-
Filesize
146KB
MD53d4839228c7ee77e28832879eeb17340
SHA1ebe4a6388c8c6831837e232b48b8f4266b7f711e
SHA2565d6ff8a11cda6d5b1e6d8a5562594379a082cee18f402a8a0a26b8cabe428954
SHA512f3c534524eaa4b51ee44a6c1d05a142c0d10d9c1c48db79b60903dd948d5712b367479b82cd85fa8ee094dcd2569c0fd85a36c10c97deab59e49e1f1f4da6c56