Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/03/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
kmsactivator-cli.exe
Resource
win11-20240221-en
General
-
Target
kmsactivator-cli.exe
-
Size
39KB
-
MD5
ac4e2fa876ed1fa335a87cf480f876f4
-
SHA1
0b2e1c40c26d3e8e41a522fcfd5448c5e56f7592
-
SHA256
d3888fc99aecc1276b56285494d858b5e7bb9257fbc9bfab9bde95c74122175d
-
SHA512
e8ddcc7c5cb7880d30e2a50a53358d7f652bd97d23de9335601d20b0d3e3a45042a7cd7ebae1ccbfc3fe58a96efb5cfe72063c8882950b57b72b72f869c94e24
-
SSDEEP
768:Yl/YMBg3ehsdD3A8c0MOeaUV45Ww3j/V3NA0xvV:pLdD+0MON593j/Dxd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4640 3748 kmsactivator-cli.exe 81 PID 3748 wrote to memory of 4640 3748 kmsactivator-cli.exe 81 PID 3748 wrote to memory of 4640 3748 kmsactivator-cli.exe 81 PID 4640 wrote to memory of 2692 4640 cmd.exe 82 PID 4640 wrote to memory of 2692 4640 cmd.exe 82 PID 4640 wrote to memory of 2692 4640 cmd.exe 82 PID 4640 wrote to memory of 716 4640 cmd.exe 90 PID 4640 wrote to memory of 716 4640 cmd.exe 90 PID 4640 wrote to memory of 716 4640 cmd.exe 90 PID 4640 wrote to memory of 1908 4640 cmd.exe 93 PID 4640 wrote to memory of 1908 4640 cmd.exe 93 PID 4640 wrote to memory of 1908 4640 cmd.exe 93 PID 4640 wrote to memory of 1300 4640 cmd.exe 94 PID 4640 wrote to memory of 1300 4640 cmd.exe 94 PID 4640 wrote to memory of 1300 4640 cmd.exe 94 PID 4640 wrote to memory of 3816 4640 cmd.exe 104 PID 4640 wrote to memory of 3816 4640 cmd.exe 104 PID 4640 wrote to memory of 3816 4640 cmd.exe 104 PID 4640 wrote to memory of 3800 4640 cmd.exe 106 PID 4640 wrote to memory of 3800 4640 cmd.exe 106 PID 4640 wrote to memory of 3800 4640 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\kmsactivator-cli.exe"C:\Users\Admin\AppData\Local\Temp\kmsactivator-cli.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A2F7.tmp\kmsactivator-cli.bat""2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\choice.exechoice /n /c 1234567893⤵PID:2692
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ipk W269N-WFGWX-YVC9B-4J6C9-T83GX3⤵PID:716
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /skms kms8.msguides.com3⤵PID:1908
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ato3⤵PID:1300
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" -dli3⤵PID:3816
-
-
C:\Windows\SysWOW64\choice.exechoice /n /c 1234567893⤵PID:3800
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5afeacd1fe2ad550c55ebdb12de31a976
SHA17d6e7fe5535e11fde5914dfff049fc1d57ade8aa
SHA256ac8864fcb2fb6e6a628182c36b49a41e237dd3740125c53a58d39235b473dda1
SHA512347aa33b235e4101cef4972eb224daabb6b23f8eaf247c6eea6cecbb1bef7a55c9524cb0f6d2a83a9bbb1eddbeaa2db5fec28e5fbdb99ab63e02d8b98773b5c4