D:\Office\Target\x64\ship\licensing\x-none\CleanO15SPP.pdb
Overview
overview
4Static
static
3Pida Softw...64.dll
windows10-1703-x64
1Pida Softw...64.exe
windows10-1703-x64
1Pida Softw...86.exe
windows10-1703-x64
1Pida Softw...86.dll
windows10-1703-x64
1Pida Softw...te.cmd
windows10-1703-x64
4Pida Softw...te.cmd
windows10-1703-x64
4Pida Softw...up.cmd
windows10-1703-x64
4Pida Softw...bs.cmd
windows10-1703-x64
1Pida Softw...ic.cmd
windows10-1703-x64
4Pida Softw...e.html
windows10-1703-x64
4Pida Softw...64.dll
windows10-1703-x64
1Pida Softw...64.exe
windows10-1703-x64
1Pida Softw...86.exe
windows10-1703-x64
1Pida Softw...86.dll
windows10-1703-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/A64.dll
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/cleanosppx64.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/cleanosppx86.exe
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/x86.dll
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/setupcomplete.cmd
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/Activate.cmd
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/AutoRenewal-Setup.cmd
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/Check-Activation-Status-vbs.cmd
Resource
win10-20240221-en
Behavioral task
behavioral9
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/Check-Activation-Status-wmic.cmd
Resource
win10-20240221-en
Behavioral task
behavioral10
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/ReadMe.html
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/A64.dll
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/cleanosppx64.exe
Resource
win10-20240221-en
Behavioral task
behavioral13
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/cleanosppx86.exe
Resource
win10-20240214-en
Behavioral task
behavioral14
Sample
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/x86.dll
Resource
win10-20240221-en
General
-
Target
Pida Software Microsoft Original.rar
-
Size
147KB
-
MD5
fa863efde58c29d418a9fcaee4ec8474
-
SHA1
60cccb1d06f7af9588d07fff1da6c2cbbf11609b
-
SHA256
00a99203103cd7e8bbe31a00141b2d487d7834492f62a26f0242d0f153e167d5
-
SHA512
edca16e8a499edbb34d6aaea8ae8342a8f45c02333bb15336df341d0609833216c0dae03c9e832be7f469cd59b8c9e4b0f864b986bf8c8960542505e708a249b
-
SSDEEP
3072:OtNkToX7MPRzX18Ixe0twWQX7ScP7Dfym/eo6+pVKv6bJTFhvyyzN:OvQu7MPRRlsewWc7bff6o6CJbJTLvy2
Malware Config
Signatures
-
Unsigned PE 6 IoCs
Checks for missing Authenticode signature.
resource unpack001/Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/cleanosppx64.exe unpack001/Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/cleanosppx86.exe unpack001/Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/x86.dll unpack001/Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/cleanosppx64.exe unpack001/Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/cleanosppx86.exe unpack001/Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/x86.dll
Files
-
Pida Software Microsoft Original.rar.rar
Password: kms
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/A64.dll
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/SvcTrigger.xml
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/cleanosppx64.exe.exe windows:6 windows x64 arch:x64
Password: kms
3e0977438b3a99ae7d9af893f9538893
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcr100
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
wprintf
_amsg_exit
__wgetmainargs
__C_specific_handler
wcscpy_s
wcsncat_s
wcsncpy_s
wcsrchr
free
malloc
memset
_initterm_e
_initterm
__winitenv
exit
_cexit
_exit
_XcptFilter
_wcsicmp
kernel32
RaiseException
LoadLibraryA
FreeLibrary
LocalAlloc
LoadLibraryExW
GetModuleHandleW
GetVersionExW
SetErrorMode
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
Sleep
GetLastError
LocalFree
GetProcAddress
QueryPerformanceCounter
GetProcessHeap
HeapSetInformation
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
VirtualProtect
WerRegisterMemoryBlock
ole32
CLSIDFromString
StringFromCLSID
CoTaskMemFree
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 440B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/cleanosppx86.exe.exe windows:6 windows x86 arch:x86
Password: kms
0393153f08fe5c66b5966a4f45bd77d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
D:\Office\Target\x86\ship\licensing\x-none\CleanO15SPP.pdb
Imports
msvcr100
_controlfp_s
_invoke_watson
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
wprintf
_amsg_exit
__wgetmainargs
_cexit
wcscpy_s
wcsncat_s
wcsncpy_s
wcsrchr
free
malloc
memset
_configthreadlocale
_initterm_e
_initterm
__winitenv
exit
_XcptFilter
_exit
_wcsicmp
kernel32
RaiseException
LoadLibraryA
FreeLibrary
LocalAlloc
LoadLibraryExW
GetModuleHandleW
GetVersionExW
SetErrorMode
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
InterlockedCompareExchange
Sleep
InterlockedExchange
WerRegisterMemoryBlock
VirtualProtect
GetTickCount
GetLastError
LocalFree
GetProcAddress
QueryPerformanceCounter
GetProcessHeap
HeapSetInformation
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
ole32
CLSIDFromString
StringFromCLSID
CoTaskMemFree
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/bin/x86.dll.dll windows:6 windows x86 arch:x86
Password: kms
8a7f219820c2adf212c4edf3841eebff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
LdrDisableThreadCalloutsForDll
NtProtectVirtualMemory
RtlInitUnicodeString
LdrGetDllHandle
LdrLoadDll
RtlInitAnsiString
LdrGetProcedureAddress
RtlTimeToTimeFields
NtSetEvent
RtlRandomEx
NtQueryPerformanceCounter
NtQuerySystemTime
RtlTimeFieldsToTime
RtlAllocateHeap
LdrOpenImageFileOptionsKey
LdrQueryImageFileKeyOption
NtClose
_aulldvrm
strcmp
_wcsnicmp
memmove
memcpy
memset
wcslen
_wcsicmp
swprintf_s
memcmp
_alldiv
_allmul
_allshl
_aulldiv
_aullrem
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/$OEM$/$$/Setup/Scripts/setupcomplete.cmd.cmd .vbs
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/Activate.cmd.cmd .vbs
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/AutoRenewal-Setup.cmd.cmd .vbs
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/Check-Activation-Status-vbs.cmd.cmd .vbs
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/Check-Activation-Status-wmic.cmd.cmd .vbs
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/README.md
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/ReadMe.html
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/A64.dll
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/SvcTrigger.xml
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/cleanosppx64.exe.exe windows:6 windows x64 arch:x64
Password: kms
3e0977438b3a99ae7d9af893f9538893
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\Office\Target\x64\ship\licensing\x-none\CleanO15SPP.pdb
Imports
msvcr100
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
wprintf
_amsg_exit
__wgetmainargs
__C_specific_handler
wcscpy_s
wcsncat_s
wcsncpy_s
wcsrchr
free
malloc
memset
_initterm_e
_initterm
__winitenv
exit
_cexit
_exit
_XcptFilter
_wcsicmp
kernel32
RaiseException
LoadLibraryA
FreeLibrary
LocalAlloc
LoadLibraryExW
GetModuleHandleW
GetVersionExW
SetErrorMode
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
Sleep
GetLastError
LocalFree
GetProcAddress
QueryPerformanceCounter
GetProcessHeap
HeapSetInformation
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
VirtualProtect
WerRegisterMemoryBlock
ole32
CLSIDFromString
StringFromCLSID
CoTaskMemFree
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 440B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/cleanosppx86.exe.exe windows:6 windows x86 arch:x86
Password: kms
0393153f08fe5c66b5966a4f45bd77d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
D:\Office\Target\x86\ship\licensing\x-none\CleanO15SPP.pdb
Imports
msvcr100
_controlfp_s
_invoke_watson
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
wprintf
_amsg_exit
__wgetmainargs
_cexit
wcscpy_s
wcsncat_s
wcsncpy_s
wcsrchr
free
malloc
memset
_configthreadlocale
_initterm_e
_initterm
__winitenv
exit
_XcptFilter
_exit
_wcsicmp
kernel32
RaiseException
LoadLibraryA
FreeLibrary
LocalAlloc
LoadLibraryExW
GetModuleHandleW
GetVersionExW
SetErrorMode
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
InterlockedCompareExchange
Sleep
InterlockedExchange
WerRegisterMemoryBlock
VirtualProtect
GetTickCount
GetLastError
LocalFree
GetProcAddress
QueryPerformanceCounter
GetProcessHeap
HeapSetInformation
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
ole32
CLSIDFromString
StringFromCLSID
CoTaskMemFree
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Pida Software Microsoft Original/ActivadorWindows/KMS_VL_ALL-44/bin/x86.dll.dll windows:6 windows x86 arch:x86
Password: kms
8a7f219820c2adf212c4edf3841eebff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
LdrDisableThreadCalloutsForDll
NtProtectVirtualMemory
RtlInitUnicodeString
LdrGetDllHandle
LdrLoadDll
RtlInitAnsiString
LdrGetProcedureAddress
RtlTimeToTimeFields
NtSetEvent
RtlRandomEx
NtQueryPerformanceCounter
NtQuerySystemTime
RtlTimeFieldsToTime
RtlAllocateHeap
LdrOpenImageFileOptionsKey
LdrQueryImageFileKeyOption
NtClose
_aulldvrm
strcmp
_wcsnicmp
memmove
memcpy
memset
wcslen
_wcsicmp
swprintf_s
memcmp
_alldiv
_allmul
_allshl
_aulldiv
_aullrem
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ