Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
Office 2019 KMS Activator Ultimate 1.4 Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Office 2019 KMS Activator Ultimate 1.4 Setup.exe
Resource
win10v2004-20240802-en
General
-
Target
Office 2019 KMS Activator Ultimate 1.4 Setup.exe
-
Size
2.5MB
-
MD5
4f2c137841704345eac8bba1e0f6d10c
-
SHA1
982dea8270400212c334c8161be0e2229df3e2e7
-
SHA256
2874cff787c58fe6dc93c54173005f3ba7a3a4883b0c9b7e8f6429a661bd31d5
-
SHA512
87363ef8a7ad5ce2d95a14fb0b5eb777d15d7090dbdbd2ce88478ecaf858e7a2924bc3eb2a37a13fbedd2a2546c4945bfb5390585da4673c553b0938c3082051
-
SSDEEP
49152:z75g4oxdEqym999kEASSsoqMSNGe+p8FKnHZyKU8lPpt5i:X5JIGqym94EUsoqzGgKHZNPq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Office 2019 KMS Activator Ultimate 1.4.exe -
Executes dropped EXE 2 IoCs
pid Process 3260 Office 2019 KMS Activator Ultimate 1.4 Setup.tmp 1492 Office 2019 KMS Activator Ultimate 1.4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Office 2019 KMS Activator Ultimate 1.4\Office 2019 KMS Activator Ultimate 1.4.exe Office 2019 KMS Activator Ultimate 1.4 Setup.tmp File created C:\Program Files\Office 2019 KMS Activator Ultimate 1.4\unins000.dat Office 2019 KMS Activator Ultimate 1.4 Setup.tmp File created C:\Program Files\Office 2019 KMS Activator Ultimate 1.4\is-UTIOE.tmp Office 2019 KMS Activator Ultimate 1.4 Setup.tmp File created C:\Program Files\Office 2019 KMS Activator Ultimate 1.4\is-AHIPK.tmp Office 2019 KMS Activator Ultimate 1.4 Setup.tmp File opened for modification C:\Program Files\Office 2019 KMS Activator Ultimate 1.4\unins000.dat Office 2019 KMS Activator Ultimate 1.4 Setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Office 2019 KMS Activator Ultimate 1.4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Office 2019 KMS Activator Ultimate 1.4 Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings Office 2019 KMS Activator Ultimate 1.4.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4468 WINWORD.EXE 4468 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3260 Office 2019 KMS Activator Ultimate 1.4 Setup.tmp 3260 Office 2019 KMS Activator Ultimate 1.4 Setup.tmp -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3260 Office 2019 KMS Activator Ultimate 1.4 Setup.tmp 1492 Office 2019 KMS Activator Ultimate 1.4.exe 1492 Office 2019 KMS Activator Ultimate 1.4.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 3260 2284 Office 2019 KMS Activator Ultimate 1.4 Setup.exe 81 PID 2284 wrote to memory of 3260 2284 Office 2019 KMS Activator Ultimate 1.4 Setup.exe 81 PID 2284 wrote to memory of 3260 2284 Office 2019 KMS Activator Ultimate 1.4 Setup.exe 81 PID 1492 wrote to memory of 4816 1492 Office 2019 KMS Activator Ultimate 1.4.exe 96 PID 1492 wrote to memory of 4816 1492 Office 2019 KMS Activator Ultimate 1.4.exe 96 PID 1492 wrote to memory of 4816 1492 Office 2019 KMS Activator Ultimate 1.4.exe 96 PID 4816 wrote to memory of 4296 4816 cmd.exe 98 PID 4816 wrote to memory of 4296 4816 cmd.exe 98 PID 4816 wrote to memory of 4296 4816 cmd.exe 98 PID 4816 wrote to memory of 432 4816 cmd.exe 99 PID 4816 wrote to memory of 432 4816 cmd.exe 99 PID 4816 wrote to memory of 432 4816 cmd.exe 99 PID 4816 wrote to memory of 4364 4816 cmd.exe 100 PID 4816 wrote to memory of 4364 4816 cmd.exe 100 PID 4816 wrote to memory of 4364 4816 cmd.exe 100 PID 4816 wrote to memory of 3164 4816 cmd.exe 101 PID 4816 wrote to memory of 3164 4816 cmd.exe 101 PID 4816 wrote to memory of 3164 4816 cmd.exe 101 PID 4816 wrote to memory of 4728 4816 cmd.exe 102 PID 4816 wrote to memory of 4728 4816 cmd.exe 102 PID 4816 wrote to memory of 4728 4816 cmd.exe 102 PID 4816 wrote to memory of 2228 4816 cmd.exe 103 PID 4816 wrote to memory of 2228 4816 cmd.exe 103 PID 4816 wrote to memory of 2228 4816 cmd.exe 103 PID 4816 wrote to memory of 4344 4816 cmd.exe 104 PID 4816 wrote to memory of 4344 4816 cmd.exe 104 PID 4816 wrote to memory of 4344 4816 cmd.exe 104 PID 4816 wrote to memory of 4404 4816 cmd.exe 105 PID 4816 wrote to memory of 4404 4816 cmd.exe 105 PID 4816 wrote to memory of 4404 4816 cmd.exe 105 PID 4816 wrote to memory of 1228 4816 cmd.exe 106 PID 4816 wrote to memory of 1228 4816 cmd.exe 106 PID 4816 wrote to memory of 1228 4816 cmd.exe 106 PID 4816 wrote to memory of 1512 4816 cmd.exe 107 PID 4816 wrote to memory of 1512 4816 cmd.exe 107 PID 4816 wrote to memory of 1512 4816 cmd.exe 107 PID 4816 wrote to memory of 3640 4816 cmd.exe 108 PID 4816 wrote to memory of 3640 4816 cmd.exe 108 PID 4816 wrote to memory of 3640 4816 cmd.exe 108 PID 4816 wrote to memory of 2900 4816 cmd.exe 109 PID 4816 wrote to memory of 2900 4816 cmd.exe 109 PID 4816 wrote to memory of 2900 4816 cmd.exe 109 PID 4816 wrote to memory of 1752 4816 cmd.exe 110 PID 4816 wrote to memory of 1752 4816 cmd.exe 110 PID 4816 wrote to memory of 1752 4816 cmd.exe 110 PID 1492 wrote to memory of 316 1492 Office 2019 KMS Activator Ultimate 1.4.exe 111 PID 1492 wrote to memory of 316 1492 Office 2019 KMS Activator Ultimate 1.4.exe 111 PID 1492 wrote to memory of 316 1492 Office 2019 KMS Activator Ultimate 1.4.exe 111 PID 316 wrote to memory of 948 316 cmd.exe 113 PID 316 wrote to memory of 948 316 cmd.exe 113 PID 316 wrote to memory of 948 316 cmd.exe 113 PID 316 wrote to memory of 4188 316 cmd.exe 114 PID 316 wrote to memory of 4188 316 cmd.exe 114 PID 316 wrote to memory of 4188 316 cmd.exe 114 PID 316 wrote to memory of 2296 316 cmd.exe 115 PID 316 wrote to memory of 2296 316 cmd.exe 115 PID 316 wrote to memory of 2296 316 cmd.exe 115 PID 316 wrote to memory of 3468 316 cmd.exe 116 PID 316 wrote to memory of 3468 316 cmd.exe 116 PID 316 wrote to memory of 3468 316 cmd.exe 116 PID 316 wrote to memory of 4500 316 cmd.exe 117 PID 316 wrote to memory of 4500 316 cmd.exe 117 PID 316 wrote to memory of 4500 316 cmd.exe 117 PID 316 wrote to memory of 4520 316 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\Office 2019 KMS Activator Ultimate 1.4 Setup.exe"C:\Users\Admin\AppData\Local\Temp\Office 2019 KMS Activator Ultimate 1.4 Setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\is-4T5JR.tmp\Office 2019 KMS Activator Ultimate 1.4 Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-4T5JR.tmp\Office 2019 KMS Activator Ultimate 1.4 Setup.tmp" /SL5="$A02CA,2362428,57856,C:\Users\Admin\AppData\Local\Temp\Office 2019 KMS Activator Ultimate 1.4 Setup.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3260
-
-
C:\Program Files\Office 2019 KMS Activator Ultimate 1.4\Office 2019 KMS Activator Ultimate 1.4.exe"C:\Program Files\Office 2019 KMS Activator Ultimate 1.4\Office 2019 KMS Activator Ultimate 1.4.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Office2019kms.cmd"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b ..\root\Licenses19\proplusvl_kms*.xrm-ms3⤵PID:4296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b ..\root\Licenses19\proplusvl_mak*.xrm-ms3⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:KTQRG3⤵
- System Location Discovery: System Language Discovery
PID:4364
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /inpkey:VQ9DP-NVHPH-T9HJC-J9PDT-KTQRG3⤵
- System Location Discovery: System Language Discovery
PID:3164
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.chinancce.com3⤵
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.srv.crsoo.com3⤵PID:4404
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:1228
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.loli.beer3⤵
- System Location Discovery: System Language Discovery
PID:3640
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵PID:2900
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\office2010kms.cmd"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:8R6BM3⤵
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:H3GVB3⤵PID:4188
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /inpkey:V7QKV-4XVVR-XYV4D-F7DFM-8R6BM3⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /inpkey:VYBBJ-TRJPB-QFQRF-QFT4D-H3GVB3⤵
- System Location Discovery: System Language Discovery
PID:3468
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.chinancce.com3⤵
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:4520
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.srv.crsoo.com3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵PID:5008
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.loli.beer3⤵
- System Location Discovery: System Language Discovery
PID:512
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:904
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Office2019kms.cmd"2⤵
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b ..\root\Licenses19\proplusvl_kms*.xrm-ms3⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b ..\root\Licenses19\proplusvl_mak*.xrm-ms3⤵PID:4728
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:KTQRG3⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /inpkey:VQ9DP-NVHPH-T9HJC-J9PDT-KTQRG3⤵PID:2596
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.chinancce.com3⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.srv.crsoo.com3⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.loli.beer3⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵PID:2296
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\office2016kms.cmd"2⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b ..\root\Licenses16\proplusvl_kms*.xrm-ms3⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b ..\root\Licenses16\proplusvl_mak*.xrm-ms3⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:WFG993⤵
- System Location Discovery: System Language Discovery
PID:3604
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:DRTFM3⤵
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:BTDRB3⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:CPQVG3⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /inpkey:XQNVK-8JYDB-WJ9W3-YJ8YR-WFG993⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.chinancce.com3⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:800
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.srv.crsoo.com3⤵
- System Location Discovery: System Language Discovery
PID:5136
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:5156
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:5164
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.loli.beer3⤵PID:5192
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:5212
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:5220
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\office2013kms.cmd"2⤵PID:5256
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:92CD43⤵
- System Location Discovery: System Language Discovery
PID:5312
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /unpkey:GVGXT3⤵
- System Location Discovery: System Language Discovery
PID:5332
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /inpkey:KBKQT-2NMXY-JJWGP-M62JB-92CD43⤵
- System Location Discovery: System Language Discovery
PID:5352
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /inpkey:YC7DK-G2NP3-2QQC3-J6H88-GVGXT3⤵
- System Location Discovery: System Language Discovery
PID:5372
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.chinancce.com3⤵
- System Location Discovery: System Language Discovery
PID:5400
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:5476
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:5484
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.srv.crsoo.com3⤵
- System Location Discovery: System Language Discovery
PID:5444
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:5520
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:5528
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /sethst:kms.loli.beer3⤵
- System Location Discovery: System Language Discovery
PID:184
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /act3⤵
- System Location Discovery: System Language Discovery
PID:5572
-
-
C:\Windows\SysWOW64\find.exefind /i "successful"3⤵
- System Location Discovery: System Language Discovery
PID:5580
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bestfreewareapps.com/office-2019-download-free.html2⤵PID:5640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe09e146f8,0x7ffe09e14708,0x7ffe09e147183⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,6594299824998134014,7464515736562261325,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:23⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,6594299824998134014,7464515736562261325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:33⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,6594299824998134014,7464515736562261325,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:83⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6594299824998134014,7464515736562261325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6594299824998134014,7464515736562261325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:13⤵PID:6096
-
-
-
C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5fd0e25d8ee64da9df1b2fa7bdc52585c
SHA12047cec593bcd14b3749aac7def1c3d20e29e167
SHA256ea894f2df80e384e1756cff59793ae1f66897c2d668bc5c7d4684d488a7a66a8
SHA51268d405d63a0a15da332054be70dca8b7a4490c14c2589eb4da3c70dfaec6fa9e29ee2bc06ccad04ccfa55f0b1e70fc2c79cb4aa3ea6b40e36e4a6c5fddfb5e11
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
5KB
MD5ba9af805afedab90e9e1f9bdaf4344d3
SHA12a187ba563bb2008be33f6076ede83aad7ce1795
SHA2563a009f63fcafefb10e2f3caea305cd571c1b75cff0105b7a8d8acb372ac23f35
SHA512e754cb97206d6c0ce7b92f820ed3534de9c0699040ca586d493eaf7b6f122a7ec05afd057ee57d95c95dd2987749872a6d9e61ab9ed0dc86e44f1eac337e3ff5
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\odc.officeapps.live.com\053C480C-058A-4B02-8652-B461F5B63057
Filesize1KB
MD585ad173999ed440af6120f3b4fd436fa
SHA1eebe3bae40b0c82db581b905e2a4c4a90055c9b3
SHA2562fb3e7ca57b5ec8657ff2b909c74dee246e7ed2b30abd60dec96fc4fb88bd165
SHA5123c506252a27bc4a3d718fc2ad89036850ee3c9d5fd79966fc5e28debe1844d96e8d2777e160e8537034129fd8109dff027bf5eb4a082c99d0db93730ec31427e
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\odc.officeapps.live.com\B0C172C9-D86F-4298-AE7B-2BC744DB914D
Filesize397B
MD52f82426450332b558a61ae9ca551abd9
SHA1abdbf8f8bdd7572bcdefbd1e0b7da8d3cf17144d
SHA25657d6315a8f1f11aaa111a9956ddd0d560f791f757c379ed77bbb5a1b5b577f52
SHA512dbc43dab6cbde98647c5a88cd508a1528ef79c030286cf82cb4cb03c4af81930ad1c3b2644ead9eceea27cd5772324f42a51f04f1693102254567205a6abf0b5
-
Filesize
1KB
MD5972f965adfab50d1cac978938540376f
SHA114b2358142e0e43646375f7f53f29cd58f30f1d9
SHA2562cdd8a1e3d5e143ce52833fee51c7931c8eea694dc1e41083e11228d357ab1ac
SHA512a1aeb48f51553a340298bf638679fde8e3e523e1e97777c60c7c6cff98e7508c30451052fdac03f9e617eba0a3c1d19f8b914bf26fc29ea4923b44a7131a3a50
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49
-
Filesize
1KB
MD5294daac6c70d28c3a57ca53c31621a4d
SHA160fc9303830dd86d708626dd203d4fd525862a16
SHA25607d0245fb238346060d126ca97bc1726f8e7d42fb92a37345f083a68dd7f76f9
SHA512c9ad43a0234f3261443efd1d61b9171828dc3d105f03054104473e1d26bf211e851cb0188b34545fe24ef54b1a4735ef7d30812d3cae9997594ed1e324d3af70
-
Filesize
1KB
MD51ab2084afafc840e6770009cef22ad6f
SHA1c113e1e15acc36a03f5b6da143c492e6ff60ab3f
SHA256e476b4ae6c634d3b27b308f0b8c85c9bf4fe1be26b4ed571637dbd6a8a21728a
SHA512382758feb4557bf0449cd257b37f7f96ebf57ee25f6fe44391c5f146a006087c6986e3ba1e72137dc1bd5c5d0fcb45bf0d19a5fd5b1a1b4531d8d2e6a1073d62
-
Filesize
2KB
MD5f8083e698fffb8cdd6b1ea263ce3eeaa
SHA1d212c9be01ddc5761ce558ecd971c46c8c8b3598
SHA256cc70cddbe3faf35f245a5777e6600e3d0c58f0c6839bc97fb9ab43c361144a06
SHA512cebae6c6d1499419f68547932e6f29ab81e4aef0028faad34932690cac47b81dcdd7c8206cdabd2936ebfa6156109ddb11e77bd84d87e8357ca9eeb9e7823e2c
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD529322d38cbc8e9e0881c76a22a0e02a3
SHA1914409ff4899d641b6228965924c1d3b00343f43
SHA256e0e502a4ed79de7bfa237bee1bae0ccf411b682f9c3c2b7ef88e8f0ca41308e9
SHA5125834bfa6b37dbc4a8998dcf088bb31b9b305404917a55bd542d9e24be9bba14b5aee7ec99c3b3d336130c2ee95d79ffe004a0ce34b76e86e786aa1a462c3c808