General

  • Target

    KMSTools.zip

  • Size

    235.9MB

  • Sample

    241228-1sw5watjgl

  • MD5

    1cad8011c9780a23057803fcfb782b13

  • SHA1

    bec3141cbb57511ac672c08a1ecf12caa423ee2f

  • SHA256

    fd82570ab9005bb8112794a80707da320118e73d6b686df67ca40b0acd082af4

  • SHA512

    e691b23980a4fc8429ca54a545e911817f4c4d0299d10481447e0a0fb8528fa6e2adb5e8b7109f0259440caaf951bced0b85fe3da2400bc4f99b245708d05e4b

  • SSDEEP

    6291456:0cmBT4vTZgx40SDqt7gzzoHuKBKdwDQgtB7s:oBEJ0Se7mfKmXgfs

Malware Config

Targets

    • Target

      KMS Tools Lite Portable/Add_Defender_Exclusion.cmd

    • Size

      1KB

    • MD5

      efb1737fb3e0a36a7eec9e7e19a03e94

    • SHA1

      821a211e5cbe22ee8f02e284b4ee469f482f26d3

    • SHA256

      e5373f2f8736fae03e915b72737aff496facb9460c211b91c21bb2d7a232d36b

    • SHA512

      1119b229e5a9b99579454c80de00185511fc3c2a727ceb4b82824e678c21e16488e37423d05e8e89de6799aab6ee713d3ba5e81b612b3d15d7cbd64d18a4baee

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Target

      KMS Tools Lite Portable/KMS Tools Portable.chm

    • Size

      645KB

    • MD5

      16498d20922a580ad81241d9cf7dcdf0

    • SHA1

      dc05b5089e993e85ee8e10b174a15f6bb03e2532

    • SHA256

      7fbcbf065ce1626694df8c443c377d0478cf32601fe74b0fd742fbcfb4f94a3f

    • SHA512

      5696b2c214311bc1e6f77ff77109d85fd15dbaf04b0ebbca67bcfb3fd054f85ee7c4dfde489dd2ae87a311f39a2fc14d9849ccaf4caeea7c03d88de5973594fa

    • SSDEEP

      12288:05sHaRh+WTUuOGNfLecMT1oDe68MCUPAQiAnmApgxGhh/meSiPAF7:05rtTUgtLmordPACnmggonRYt

    Score
    1/10
    • Target

      KMS Tools Lite Portable/KMSTools Lite.exe

    • Size

      5.4MB

    • MD5

      db9c455f121b95bf2326ca1939dad9cf

    • SHA1

      6ea25badededb817ba6b18c830906cdbbaf04837

    • SHA256

      b8a7519e33c7e20dc3fe2383c7610e1610b9ffba438d2555c1f8b2114c094770

    • SHA512

      61200ea650659ed6e96431660056768f3024e012d5ed86e983ee04e424b550b4dc0bdbbb5e95c8d76d0202e1613842547b8149b650ca95b6a7e562a721568fb1

    • SSDEEP

      98304:TZ5uVBk4qgixN8bt2iGsDEmQUz9pMXnyhMiigWHDnETbvzb4EHMuZ:TXCu0bt2iGqLQaonyh9i9HDnszbdZ

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Rms family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Server Software Component: Terminal Services DLL

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      KMS Tools Lite Portable/data0.bin

    • Size

      213.0MB

    • MD5

      9a179115f8f2771db1e41f8dd9512b7f

    • SHA1

      e80018af5e320557f621b35acb2ac25d2dd8ec8f

    • SHA256

      d6229fed007c774f52a8fad1bbbd184fc036440a786bec9e0a839565ba521c77

    • SHA512

      2143b716a144693d804bf9d7458c804f3bff3432d11f0815dcadc9664347dcd5dcb0b0b5790ec3b92061cd58f5ba5a4cc1ea7fa5174d4d8db8668441a6c74d5c

    • SSDEEP

      6291456:OorliqWI/KmbMNHNGwxODJu43vyO0pyDWJ5Dr:OotWMb4IwAkU0pyk5Dr

    Score
    3/10
    • Target

      KMS Tools Lite Portable/data1.bin

    • Size

      19.2MB

    • MD5

      c3c5adf650d5cf05bd1b08590d62cf53

    • SHA1

      7781e1ecd78490ebaeb73314855efadff2bfeeed

    • SHA256

      ed63b2a33066ef63bdb5b99c40d660f29653386b334f45d5296ead6fbcbc2861

    • SHA512

      79550a7f9afccc4ee58e8f74df80653d566ceb067e9ef57baa8aeff14ace2f8730d8cc22d0fad523bb36dc6736cb112cbc21ecfe6cb657c7cd2d483026b84249

    • SSDEEP

      393216:p0leyIB6YMU/OZ28Zrms74w4WKy7sI2MqJ6i9HDBt3EtuXKoR:p4K6YMU/OZThb7l46FqEQHDBt3EtuXK

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks