General
-
Target
KMSTools.zip
-
Size
235.9MB
-
Sample
241228-1sw5watjgl
-
MD5
1cad8011c9780a23057803fcfb782b13
-
SHA1
bec3141cbb57511ac672c08a1ecf12caa423ee2f
-
SHA256
fd82570ab9005bb8112794a80707da320118e73d6b686df67ca40b0acd082af4
-
SHA512
e691b23980a4fc8429ca54a545e911817f4c4d0299d10481447e0a0fb8528fa6e2adb5e8b7109f0259440caaf951bced0b85fe3da2400bc4f99b245708d05e4b
-
SSDEEP
6291456:0cmBT4vTZgx40SDqt7gzzoHuKBKdwDQgtB7s:oBEJ0Se7mfKmXgfs
Behavioral task
behavioral1
Sample
KMS Tools Lite Portable/Add_Defender_Exclusion.cmd
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
KMS Tools Lite Portable/KMS Tools Portable.chm
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
KMS Tools Lite Portable/KMSTools Lite.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
KMS Tools Lite Portable/data0.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
KMS Tools Lite Portable/data1.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Targets
-
-
Target
KMS Tools Lite Portable/Add_Defender_Exclusion.cmd
-
Size
1KB
-
MD5
efb1737fb3e0a36a7eec9e7e19a03e94
-
SHA1
821a211e5cbe22ee8f02e284b4ee469f482f26d3
-
SHA256
e5373f2f8736fae03e915b72737aff496facb9460c211b91c21bb2d7a232d36b
-
SHA512
1119b229e5a9b99579454c80de00185511fc3c2a727ceb4b82824e678c21e16488e37423d05e8e89de6799aab6ee713d3ba5e81b612b3d15d7cbd64d18a4baee
Score8/10 -
-
-
Target
KMS Tools Lite Portable/KMS Tools Portable.chm
-
Size
645KB
-
MD5
16498d20922a580ad81241d9cf7dcdf0
-
SHA1
dc05b5089e993e85ee8e10b174a15f6bb03e2532
-
SHA256
7fbcbf065ce1626694df8c443c377d0478cf32601fe74b0fd742fbcfb4f94a3f
-
SHA512
5696b2c214311bc1e6f77ff77109d85fd15dbaf04b0ebbca67bcfb3fd054f85ee7c4dfde489dd2ae87a311f39a2fc14d9849ccaf4caeea7c03d88de5973594fa
-
SSDEEP
12288:05sHaRh+WTUuOGNfLecMT1oDe68MCUPAQiAnmApgxGhh/meSiPAF7:05rtTUgtLmordPACnmggonRYt
Score1/10 -
-
-
Target
KMS Tools Lite Portable/KMSTools Lite.exe
-
Size
5.4MB
-
MD5
db9c455f121b95bf2326ca1939dad9cf
-
SHA1
6ea25badededb817ba6b18c830906cdbbaf04837
-
SHA256
b8a7519e33c7e20dc3fe2383c7610e1610b9ffba438d2555c1f8b2114c094770
-
SHA512
61200ea650659ed6e96431660056768f3024e012d5ed86e983ee04e424b550b4dc0bdbbb5e95c8d76d0202e1613842547b8149b650ca95b6a7e562a721568fb1
-
SSDEEP
98304:TZ5uVBk4qgixN8bt2iGsDEmQUz9pMXnyhMiigWHDnETbvzb4EHMuZ:TXCu0bt2iGqLQaonyh9i9HDnszbdZ
-
Rms family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Remote Service Session Hijacking: RDP Hijacking
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Users
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
KMS Tools Lite Portable/data0.bin
-
Size
213.0MB
-
MD5
9a179115f8f2771db1e41f8dd9512b7f
-
SHA1
e80018af5e320557f621b35acb2ac25d2dd8ec8f
-
SHA256
d6229fed007c774f52a8fad1bbbd184fc036440a786bec9e0a839565ba521c77
-
SHA512
2143b716a144693d804bf9d7458c804f3bff3432d11f0815dcadc9664347dcd5dcb0b0b5790ec3b92061cd58f5ba5a4cc1ea7fa5174d4d8db8668441a6c74d5c
-
SSDEEP
6291456:OorliqWI/KmbMNHNGwxODJu43vyO0pyDWJ5Dr:OotWMb4IwAkU0pyk5Dr
Score3/10 -
-
-
Target
KMS Tools Lite Portable/data1.bin
-
Size
19.2MB
-
MD5
c3c5adf650d5cf05bd1b08590d62cf53
-
SHA1
7781e1ecd78490ebaeb73314855efadff2bfeeed
-
SHA256
ed63b2a33066ef63bdb5b99c40d660f29653386b334f45d5296ead6fbcbc2861
-
SHA512
79550a7f9afccc4ee58e8f74df80653d566ceb067e9ef57baa8aeff14ace2f8730d8cc22d0fad523bb36dc6736cb112cbc21ecfe6cb657c7cd2d483026b84249
-
SSDEEP
393216:p0leyIB6YMU/OZ28Zrms74w4WKy7sI2MqJ6i9HDBt3EtuXKoR:p4K6YMU/OZThb7l46FqEQHDBt3EtuXK
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Users
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2Virtualization/Sandbox Evasion
1