Overview
overview
8Static
static
3KMSAuto Ne...l.html
windows10-ltsc 2021-x64
4KMSAuto Ne...ET.url
windows10-ltsc 2021-x64
1Актив...on.exe
windows10-ltsc 2021-x64
7Актив....0.zip
windows10-ltsc 2021-x64
1RemoveWAT 2.2.6.0.exe
windows10-ltsc 2021-x64
1Staforce_v.13.exe
windows10-ltsc 2021-x64
7Актив...CT.exe
windows10-ltsc 2021-x64
дрова/7z.exe
windows10-ltsc 2021-x64
7$PLUGINSDI...ns.dll
windows10-ltsc 2021-x64
37-zip.chm
windows10-ltsc 2021-x64
17-zip.dll
windows10-ltsc 2021-x64
37z.dll
windows10-ltsc 2021-x64
37z.exe
windows10-ltsc 2021-x64
37z.exe
windows10-ltsc 2021-x64
37zCon.exe
windows10-ltsc 2021-x64
37zFM.exe
windows10-ltsc 2021-x64
37zG.exe
windows10-ltsc 2021-x64
3Uninstall.exe
windows10-ltsc 2021-x64
7$PLUGINSDI...ns.dll
windows10-ltsc 2021-x64
3дрова/AIMP2.exe
windows10-ltsc 2021-x64
6дрова...er.lnk
windows10-ltsc 2021-x64
3дрова/DTools.exe
windows10-ltsc 2021-x64
дрова...07.exe
windows10-ltsc 2021-x64
8дрова...er.lnk
windows10-ltsc 2021-x64
3дрова...er.exe
windows10-ltsc 2021-x64
6дрова/Rar.exe
windows10-ltsc 2021-x64
3дрова...er.exe
windows10-ltsc 2021-x64
3дрова/UnRAR.exe
windows10-ltsc 2021-x64
3дрова...ll.exe
windows10-ltsc 2021-x64
3дрова/WinRAR.exe
windows10-ltsc 2021-x64
3дрова...07.exe
windows10-ltsc 2021-x64
8дрова/klmcp.exe
windows10-ltsc 2021-x64
7Analysis
-
max time kernel
24s -
max time network
49s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-uk -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-uklocale:uk-uaos:windows10-ltsc 2021-x64systemwindows -
submitted
21-11-2024 07:51
Static task
static1
Behavioral task
behavioral1
Sample
KMSAuto Net 2015 v1.4.2 Portable/KMSAuto Net 2015 v1.4.2 Portable/Antivirus scan - VirusTotal.html
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral2
Sample
KMSAuto Net 2015 v1.4.2 Portable/KMSAuto Net 2015 v1.4.2 Portable/RSLOAD.NET.url
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral3
Sample
Активаторы/Disableactivation.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral4
Sample
Активаторы/RemoveWAT 2.2.6/RemoveWAT_2.2.6.0.zip
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral5
Sample
RemoveWAT 2.2.6.0.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral6
Sample
Staforce_v.13.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral7
Sample
Активаторы/ОЕМ-Активация/W7OEMACT.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral8
Sample
дрова/7z.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral10
Sample
7-zip.chm
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral11
Sample
7-zip.dll
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral12
Sample
7z.dll
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral13
Sample
7z.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral14
Sample
7z.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral15
Sample
7zCon.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral16
Sample
7zFM.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral17
Sample
7zG.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral20
Sample
дрова/AIMP2.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral21
Sample
дрова/Ace Player.lnk
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral22
Sample
дрова/DTools.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral23
Sample
дрова/Excel2007.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral24
Sample
дрова/Foxit Reader.lnk
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral25
Sample
дрова/FoxitReader.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral26
Sample
дрова/Rar.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral27
Sample
дрова/RarExtLoader.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral28
Sample
дрова/UnRAR.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral29
Sample
дрова/Uninstall.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral30
Sample
дрова/WinRAR.exe
Resource
win10ltsc2021-20241023-uk
Behavioral task
behavioral31
Sample
дрова/Word2007.exe
Resource
win10ltsc2021-20241023-uk
Errors
General
-
Target
Активаторы/ОЕМ-Активация/W7OEMACT.exe
-
Size
1.5MB
-
MD5
b822bf9b2224a4228f3249cc07e72114
-
SHA1
4a56d163082dc45e2ddf32286485fd933312c88e
-
SHA256
6c2924c4e4d64dc8c0cc9687653979a028b83d93e04d02487c055a97946585a9
-
SHA512
33833912a42a148ca514bf099a4d3ccc7d20c160f720ecd03798596a85db9c7bca4edea0d96711e5f7074bc70057560e0f5925624552c9e83a988005567d3377
-
SSDEEP
49152:GuXME6xymYzPIgGJgw234c3nWrWX2SW0yz:Guqyzzwg8Z23Z3nd2Sgz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation W7OEMACT.exe -
Executes dropped EXE 2 IoCs
pid Process 1804 OEM.exe 4180 OEM.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W7OEMACT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OEM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OEM.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "130" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3144 shutdown.exe Token: SeRemoteShutdownPrivilege 3144 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 228 LogonUI.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1804 2416 W7OEMACT.exe 81 PID 2416 wrote to memory of 1804 2416 W7OEMACT.exe 81 PID 2416 wrote to memory of 1804 2416 W7OEMACT.exe 81 PID 1804 wrote to memory of 4180 1804 OEM.exe 84 PID 1804 wrote to memory of 4180 1804 OEM.exe 84 PID 1804 wrote to memory of 4180 1804 OEM.exe 84 PID 4180 wrote to memory of 1820 4180 OEM.tmp 86 PID 4180 wrote to memory of 1820 4180 OEM.tmp 86 PID 4180 wrote to memory of 1820 4180 OEM.tmp 86 PID 1820 wrote to memory of 3960 1820 cmd.exe 88 PID 1820 wrote to memory of 3960 1820 cmd.exe 88 PID 1820 wrote to memory of 3960 1820 cmd.exe 88 PID 1820 wrote to memory of 3288 1820 cmd.exe 94 PID 1820 wrote to memory of 3288 1820 cmd.exe 94 PID 1820 wrote to memory of 3288 1820 cmd.exe 94 PID 1820 wrote to memory of 3144 1820 cmd.exe 95 PID 1820 wrote to memory of 3144 1820 cmd.exe 95 PID 1820 wrote to memory of 3144 1820 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Активаторы\ОЕМ-Активация\W7OEMACT.exe"C:\Users\Admin\AppData\Local\Temp\Активаторы\ОЕМ-Активация\W7OEMACT.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\OEM.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\OEM.exe" /VERYSILENT2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\is-FUNTK.tmp\OEM.tmp"C:\Users\Admin\AppData\Local\Temp\is-FUNTK.tmp\OEM.tmp" /SL5="$50254,712478,497152,C:\Users\Admin\AppData\Local\Temp\RarSFX0\OEM.exe" /VERYSILENT3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\OEM\Install.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cscript.execscript //nologo C:\Windows\system32\slmgr.vbs -ipk 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G5⤵
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\OEM\install.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:3288
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /t 0 /r5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a19055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194B
MD55e9ee33e1825530d41b4115106a52d34
SHA1bfa19294fa820d4524c6513b19af61190ace8191
SHA2565390ae2b6d389ec6c6c0f2886e028a501dcf54d54c8860e5adb6e7e80371a907
SHA51242c440c7c8a4ef49d63b737ad6b34a994d361933606e72bd0207206787b544bd8bc4925d4ee9e57c54d33896a3e72f76c5f9bdf43ca78a96f971a768c2bb5ba2
-
Filesize
10KB
MD5c453e90e05a130d53914c03049fd89cb
SHA1a500f0d1e8c70167161c22d2d43485c16846a595
SHA2560edd67afa30505af4d9d37ebdfd8d3fcc2040d1c185f6e3ca701d17cb15c06d0
SHA51212f1016a5d4a5f0b2bd54389276753013722969ac1445c6cabd244732669d3e361ecd1bc0ad6ee8a0c529234f96a75623971e43ef2f8e7bfc45f0f66c7e175a3
-
Filesize
1.3MB
MD51b6891e258c32dd4009ff07ef2ab54d0
SHA159fdea80d3b7ab1d9dc7b86309d791a843279970
SHA2566048bc9f3fdc561f21fb20c82ace961e6ac1849903b7ce39e875e64935bbc101
SHA512457d0b48988a4c1f3fa26bc744a5cd2d9f0a278bdb5761680ada0c9d85439d5d3f6fcf32614619b3df13a87f8b989f8cf663436cad70d51b21fd3c9841d22100
-
Filesize
1.5MB
MD5541c6aef3bf52130e9e38a27b439d8c8
SHA150ab19dae3cfd7f34f00947265b0c0732cd4c32b
SHA256d3fb5a30af7d9b0e9628bb28e6041caf5ebff6a1125d3da41f256a12f9ac09a3
SHA51244031a7139584066d8714b63716e24002a2627631294671cc30b8aeb03d5c03a4a3ac40f799c3814e70e2086181af2bcb6381e192f08f89b8a794d79b52a398c