General
-
Target
KMSTools Lite.exe
-
Size
19.2MB
-
Sample
241122-syrtcazjhn
-
MD5
c3c5adf650d5cf05bd1b08590d62cf53
-
SHA1
7781e1ecd78490ebaeb73314855efadff2bfeeed
-
SHA256
ed63b2a33066ef63bdb5b99c40d660f29653386b334f45d5296ead6fbcbc2861
-
SHA512
79550a7f9afccc4ee58e8f74df80653d566ceb067e9ef57baa8aeff14ace2f8730d8cc22d0fad523bb36dc6736cb112cbc21ecfe6cb657c7cd2d483026b84249
-
SSDEEP
393216:p0leyIB6YMU/OZ28Zrms74w4WKy7sI2MqJ6i9HDBt3EtuXKoR:p4K6YMU/OZThb7l46FqEQHDBt3EtuXK
Static task
static1
Behavioral task
behavioral1
Sample
KMSTools Lite.exe
Resource
win11-20241007-es
Malware Config
Extracted
https://mrodevicemgr.officeapps.live.com/mrodevicemgrsvc/api/v2/C2RReleaseData
Extracted
http://officecdn.microsoft.com/pr/7983bac0-e531-40cf-be00-fd24fe66619c/Office/Data/16.0.17932.20162/i640.cab
Extracted
http://officecdn.microsoft.com/pr/7983bac0-e531-40cf-be00-fd24fe66619c/Office/Data/16.0.17932.20162/i643082.cab
Targets
-
-
Target
KMSTools Lite.exe
-
Size
19.2MB
-
MD5
c3c5adf650d5cf05bd1b08590d62cf53
-
SHA1
7781e1ecd78490ebaeb73314855efadff2bfeeed
-
SHA256
ed63b2a33066ef63bdb5b99c40d660f29653386b334f45d5296ead6fbcbc2861
-
SHA512
79550a7f9afccc4ee58e8f74df80653d566ceb067e9ef57baa8aeff14ace2f8730d8cc22d0fad523bb36dc6736cb112cbc21ecfe6cb657c7cd2d483026b84249
-
SSDEEP
393216:p0leyIB6YMU/OZ28Zrms74w4WKy7sI2MqJ6i9HDBt3EtuXKoR:p4K6YMU/OZThb7l46FqEQHDBt3EtuXK
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Impair Defenses
1