Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
KMSpico 11 FINAL (Office and Windows 10+8+7 Activator)/UnInstall_Service.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KMSpico 11 FINAL (Office and Windows 10+8+7 Activator)/UnInstall_Service.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
KMSpico 11 FINAL (Office and Windows 10+8+7 Activator)/kms.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
KMSpico 11 FINAL (Office and Windows 10+8+7 Activator)/kms.exe
Resource
win10v2004-20240802-en
General
-
Target
KMSpico 11 FINAL (Office and Windows 10+8+7 Activator)/UnInstall_Service.cmd
-
Size
146B
-
MD5
d228137b7b77d7ef3fcdc06ddabebeef
-
SHA1
9415587011a75484fce405287a548d488973fd09
-
SHA256
0552a48861a2c9825d51eeb0197a959dc85e4e960fb00cee89ccc4806eaadba8
-
SHA512
7ca92a5b8bb303adfe4281db23c65eb2e1b22434411c0cae02aa688cfa3091edfd315cc816cd6d5a37cf8f6e647b1931329c1051df45b6135e75d0c023224ef9
Malware Config
Signatures
-
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 756 sc.exe 3848 sc.exe 3944 sc.exe 2124 sc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3248 wrote to memory of 756 3248 cmd.exe 83 PID 3248 wrote to memory of 756 3248 cmd.exe 83 PID 3248 wrote to memory of 3848 3248 cmd.exe 84 PID 3248 wrote to memory of 3848 3248 cmd.exe 84 PID 3248 wrote to memory of 3944 3248 cmd.exe 85 PID 3248 wrote to memory of 3944 3248 cmd.exe 85 PID 3248 wrote to memory of 2124 3248 cmd.exe 86 PID 3248 wrote to memory of 2124 3248 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KMSpico 11 FINAL (Office and Windows 10+8+7 Activator)\UnInstall_Service.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\system32\sc.exesc stop "Service KMSELDI"2⤵
- Launches sc.exe
PID:756
-
-
C:\Windows\system32\sc.exesc delete "Service KMSELDI"2⤵
- Launches sc.exe
PID:3848
-
-
C:\Windows\system32\sc.exesc stop "KMSServerService"2⤵
- Launches sc.exe
PID:3944
-
-
C:\Windows\system32\sc.exesc delete "KMSServerService"2⤵
- Launches sc.exe
PID:2124
-