Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
Act_Office14_KMS.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Act_Office14_KMS.exe
Resource
win10v2004-20231215-en
General
-
Target
Act_Office14_KMS.exe
-
Size
808KB
-
MD5
617a304d0c78c2fb26fd55ab56ce2ec4
-
SHA1
bf3fdc2c71275f6117037aa2ee89f1fe509b7fb9
-
SHA256
895d20ed35cf6ebb4e98524f9d859da24a731a5afb0d119f8e2f63012ac34b38
-
SHA512
0f3d659e83a44ab936a5e2fed601eb60f8c4ae3ce2a9890b3d46dd397fe47cb99f81005cc246e32fc4cd8810a6f3994ecbc7b07ea237bba38a36f89e967cd359
-
SSDEEP
6144:2ifwIx8tVTFUs82tpE4BtQ3cOR7rBY/1pT5fZ9wDmpiU0EVa5Sjpgspai6TaifwN:JSLfE6qF+T5D2ybwIpX6TdSLf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2092 instsrv.exe -
Kills process with taskkill 2 IoCs
pid Process 1492 taskkill.exe 1296 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 5 IoCs
pid Process 2080 ping.exe 2996 PING.EXE 2000 PING.EXE 632 PING.EXE 1108 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2092 instsrv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1492 taskkill.exe Token: SeDebugPrivilege 1296 taskkill.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2208 2504 Act_Office14_KMS.exe 28 PID 2504 wrote to memory of 2208 2504 Act_Office14_KMS.exe 28 PID 2504 wrote to memory of 2208 2504 Act_Office14_KMS.exe 28 PID 2208 wrote to memory of 2260 2208 cmd.exe 30 PID 2208 wrote to memory of 2260 2208 cmd.exe 30 PID 2208 wrote to memory of 2260 2208 cmd.exe 30 PID 2504 wrote to memory of 2080 2504 Act_Office14_KMS.exe 34 PID 2504 wrote to memory of 2080 2504 Act_Office14_KMS.exe 34 PID 2504 wrote to memory of 2080 2504 Act_Office14_KMS.exe 34 PID 2504 wrote to memory of 328 2504 Act_Office14_KMS.exe 38 PID 2504 wrote to memory of 328 2504 Act_Office14_KMS.exe 38 PID 2504 wrote to memory of 328 2504 Act_Office14_KMS.exe 38 PID 328 wrote to memory of 1492 328 cmd.exe 40 PID 328 wrote to memory of 1492 328 cmd.exe 40 PID 328 wrote to memory of 1492 328 cmd.exe 40 PID 328 wrote to memory of 2996 328 cmd.exe 42 PID 328 wrote to memory of 2996 328 cmd.exe 42 PID 328 wrote to memory of 2996 328 cmd.exe 42 PID 2504 wrote to memory of 828 2504 Act_Office14_KMS.exe 43 PID 2504 wrote to memory of 828 2504 Act_Office14_KMS.exe 43 PID 2504 wrote to memory of 828 2504 Act_Office14_KMS.exe 43 PID 828 wrote to memory of 1296 828 cmd.exe 45 PID 828 wrote to memory of 1296 828 cmd.exe 45 PID 828 wrote to memory of 1296 828 cmd.exe 45 PID 828 wrote to memory of 2000 828 cmd.exe 46 PID 828 wrote to memory of 2000 828 cmd.exe 46 PID 828 wrote to memory of 2000 828 cmd.exe 46 PID 2504 wrote to memory of 1852 2504 Act_Office14_KMS.exe 47 PID 2504 wrote to memory of 1852 2504 Act_Office14_KMS.exe 47 PID 2504 wrote to memory of 1852 2504 Act_Office14_KMS.exe 47 PID 1852 wrote to memory of 1844 1852 cmd.exe 49 PID 1852 wrote to memory of 1844 1852 cmd.exe 49 PID 1852 wrote to memory of 1844 1852 cmd.exe 49 PID 1844 wrote to memory of 2968 1844 net.exe 50 PID 1844 wrote to memory of 2968 1844 net.exe 50 PID 1844 wrote to memory of 2968 1844 net.exe 50 PID 1852 wrote to memory of 632 1852 cmd.exe 51 PID 1852 wrote to memory of 632 1852 cmd.exe 51 PID 1852 wrote to memory of 632 1852 cmd.exe 51 PID 2504 wrote to memory of 1968 2504 Act_Office14_KMS.exe 52 PID 2504 wrote to memory of 1968 2504 Act_Office14_KMS.exe 52 PID 2504 wrote to memory of 1968 2504 Act_Office14_KMS.exe 52 PID 1968 wrote to memory of 2092 1968 cmd.exe 54 PID 1968 wrote to memory of 2092 1968 cmd.exe 54 PID 1968 wrote to memory of 2092 1968 cmd.exe 54 PID 1968 wrote to memory of 2092 1968 cmd.exe 54 PID 1968 wrote to memory of 1108 1968 cmd.exe 55 PID 1968 wrote to memory of 1108 1968 cmd.exe 55 PID 1968 wrote to memory of 1108 1968 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\Act_Office14_KMS.exe"C:\Users\Admin\AppData\Local\Temp\Act_Office14_KMS.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\cmd.exe"cmd.exe" /c cscript "C:\Program Files (x86)\Microsoft Office\Office14\ospp.vbs" /dstatus2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\cscript.execscript "C:\Program Files (x86)\Microsoft Office\Office14\ospp.vbs" /dstatus3⤵PID:2260
-
-
-
C:\Windows\system32\ping.exeping -n 2 localhost2⤵
- Runs ping.exe
PID:2080
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /f /im instsrv.exe & ping -n 1 localhost2⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\system32\taskkill.exetaskkill /f /im instsrv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\system32\PING.EXEping -n 1 localhost3⤵
- Runs ping.exe
PID:2996
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /f /im KMService.exe & ping -n 1 localhost2⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\system32\taskkill.exetaskkill /f /im KMService.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\system32\PING.EXEping -n 1 localhost3⤵
- Runs ping.exe
PID:2000
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop KMService & ping -n 1 localhost2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\net.exenet stop KMService3⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop KMService4⤵PID:2968
-
-
-
C:\Windows\system32\PING.EXEping -n 1 localhost3⤵
- Runs ping.exe
PID:632
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\instsrv.exe" KMService remove %WINDIR%\srvany.exe & ping -n 1 localhost2⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\instsrv.exeC:\Users\Admin\AppData\Local\Temp\instsrv.exe KMService remove C:\Windows\srvany.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2092
-
-
C:\Windows\system32\PING.EXEping -n 1 localhost3⤵
- Runs ping.exe
PID:1108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD59f7acaad365af0d1a3cd9261e3208b9b
SHA1b4c7049562e770093e707ac1329cb37ad6313a37
SHA256f7b0a444b590eb8a6b46cedf544bcb3117c85cab02b599b45d61b8a590095c9c
SHA5126847bb10cf08f7e594907b5d160768e60468b14a62cdd87ad33dcc0bc2b523549c1c91e9854069ca11ee074e43a6f41f11351201626922c02aaea41fd32c2a54