Analysis

  • max time kernel
    60s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 08:09

General

  • Target

    KMSAuto++v1.6.4.rar

  • Size

    17.3MB

  • MD5

    12527a9f23b70166bec6d442ef7900fb

  • SHA1

    513dd13e66729b62ecb2d4426b38fcd746675451

  • SHA256

    cfae3ff63f4e8e07d6577d96abedbfb16611b395c7af8e24cd4dd7da07563ca0

  • SHA512

    bb428e8d3c1150965b66f08a8d67dee65b40a5ee60bf91439b322d67f370109f791816710ed13e641fed9fd17a2d0d7f7b99b93d92afeba95dfce296e08adb32

  • SSDEEP

    393216:O4/ve8+GJXtX9++cWt1jhZTWxeBmnTd2MB2aD+D06+X4uNoT:O4HpXdtX9FfhZTWxepCiDH+ouNk

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\KMSAuto++v1.6.4.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\KMSAuto++v1.6.4.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\KMSAuto++v1.6.4.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1880
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\KMSAuto++v1.6.4.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2728
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1492
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0xc0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2728-27-0x000007FEFA4B0000-0x000007FEFA4E4000-memory.dmp

      Filesize

      208KB

    • memory/2728-26-0x000000013F070000-0x000000013F168000-memory.dmp

      Filesize

      992KB

    • memory/2728-29-0x000007FEFA490000-0x000007FEFA4A8000-memory.dmp

      Filesize

      96KB

    • memory/2728-30-0x000007FEFA470000-0x000007FEFA487000-memory.dmp

      Filesize

      92KB

    • memory/2728-32-0x000007FEFA3E0000-0x000007FEFA3F7000-memory.dmp

      Filesize

      92KB

    • memory/2728-31-0x000007FEFA400000-0x000007FEFA411000-memory.dmp

      Filesize

      68KB

    • memory/2728-34-0x000007FEFA3A0000-0x000007FEFA3BD000-memory.dmp

      Filesize

      116KB

    • memory/2728-33-0x000007FEFA3C0000-0x000007FEFA3D1000-memory.dmp

      Filesize

      68KB

    • memory/2728-28-0x000007FEF5FA0000-0x000007FEF6256000-memory.dmp

      Filesize

      2.7MB

    • memory/2728-35-0x000007FEFA380000-0x000007FEFA391000-memory.dmp

      Filesize

      68KB

    • memory/2728-36-0x000007FEF5D90000-0x000007FEF5F9B000-memory.dmp

      Filesize

      2.0MB

    • memory/2728-38-0x000007FEFA280000-0x000007FEFA2C1000-memory.dmp

      Filesize

      260KB

    • memory/2728-39-0x000007FEFA250000-0x000007FEFA271000-memory.dmp

      Filesize

      132KB

    • memory/2728-40-0x000007FEFA230000-0x000007FEFA248000-memory.dmp

      Filesize

      96KB

    • memory/2728-42-0x000007FEFA150000-0x000007FEFA161000-memory.dmp

      Filesize

      68KB

    • memory/2728-41-0x000007FEFA170000-0x000007FEFA181000-memory.dmp

      Filesize

      68KB

    • memory/2728-43-0x000007FEFA130000-0x000007FEFA141000-memory.dmp

      Filesize

      68KB

    • memory/2728-44-0x000007FEFA110000-0x000007FEFA12B000-memory.dmp

      Filesize

      108KB

    • memory/2728-45-0x000007FEFA0F0000-0x000007FEFA101000-memory.dmp

      Filesize

      68KB

    • memory/2728-46-0x000007FEFA0D0000-0x000007FEFA0E8000-memory.dmp

      Filesize

      96KB

    • memory/2728-47-0x000007FEF6F90000-0x000007FEF6FC0000-memory.dmp

      Filesize

      192KB

    • memory/2728-48-0x000007FEF6F20000-0x000007FEF6F87000-memory.dmp

      Filesize

      412KB

    • memory/2728-52-0x000007FEF6ED0000-0x000007FEF6EF8000-memory.dmp

      Filesize

      160KB

    • memory/2728-51-0x000007FEF6490000-0x000007FEF64E7000-memory.dmp

      Filesize

      348KB

    • memory/2728-50-0x000007FEF6F00000-0x000007FEF6F11000-memory.dmp

      Filesize

      68KB

    • memory/2728-58-0x000007FEF2170000-0x000007FEF2181000-memory.dmp

      Filesize

      68KB

    • memory/2728-57-0x000007FEF6420000-0x000007FEF6432000-memory.dmp

      Filesize

      72KB

    • memory/2728-56-0x000007FEF6440000-0x000007FEF6451000-memory.dmp

      Filesize

      68KB

    • memory/2728-55-0x000007FEF6460000-0x000007FEF6483000-memory.dmp

      Filesize

      140KB

    • memory/2728-54-0x000007FEF6980000-0x000007FEF6998000-memory.dmp

      Filesize

      96KB

    • memory/2728-53-0x000007FEF69A0000-0x000007FEF69C4000-memory.dmp

      Filesize

      144KB

    • memory/2728-37-0x000007FEF4690000-0x000007FEF5740000-memory.dmp

      Filesize

      16.7MB

    • memory/2728-49-0x000007FEF69D0000-0x000007FEF6A4C000-memory.dmp

      Filesize

      496KB

    • memory/2728-59-0x000007FEF2110000-0x000007FEF2167000-memory.dmp

      Filesize

      348KB