Behavioral task
behavioral1
Sample
HEU_KMS_Activator_v42.2.0/!果核剥壳 - 全网更新最快.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HEU_KMS_Activator_v42.2.0/!果核剥壳 - 全网更新最快.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
HEU_KMS_Activator_v42.2.0/HEU_KMS_Activator_v42.2.0.exe
Resource
win7-20240903-en
General
-
Target
8fc7a36cc60ebb0e0c490b7d5126105054c35d0679cf1fc06a4d6d2d29d564f8
-
Size
4.4MB
-
MD5
e7d9070f2998cd818e0dc08844b6822b
-
SHA1
1f226985381df1d2b2dec6dfe32f20022cf1e01a
-
SHA256
8fc7a36cc60ebb0e0c490b7d5126105054c35d0679cf1fc06a4d6d2d29d564f8
-
SHA512
727192dd282854b242fa6a9ceb94bbcc84a23bd9d8bd2cba898e2600655c990d96b66d0cdeb73a3ce6fd6c3d424cc67f3168b07f58009b16d50c779747f59d90
-
SSDEEP
98304:79Gp1JjKPfu7PJdJuGE//W4TCHdMB8gqlFQJiEM6Eq24KuR:ilKPcJfuGE/VegqlF7EM6MXuR
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule static1/unpack003/out.upx autoit_exe -
resource yara_rule static1/unpack001/HEU_KMS_Activator_v42.2.0/HEU_KMS_Activator_v42.2.0.exe upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/HEU_KMS_Activator_v42.2.0/HEU_KMS_Activator_v42.2.0.exe unpack003/out.upx
Files
-
8fc7a36cc60ebb0e0c490b7d5126105054c35d0679cf1fc06a4d6d2d29d564f8.zip
-
HEU_KMS_Activator_v42.2.0/!关注微信 - 更多福利.png.png
-
http://weixin.qq.com/r/wii4oJjEU8UsrdzD933Q
-
-
HEU_KMS_Activator_v42.2.0/!果核剥壳 - 全网更新最快.url.url
-
HEU_KMS_Activator_v42.2.0/HEU_KMS_Activator_v42.2.0.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 372KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 619KB - Virtual size: 618KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ