Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28-12-2024 21:55
Behavioral task
behavioral1
Sample
KMS Tools Lite Portable/Add_Defender_Exclusion.cmd
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
KMS Tools Lite Portable/KMS Tools Portable.chm
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
KMS Tools Lite Portable/KMSTools Lite.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
KMS Tools Lite Portable/data0.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
KMS Tools Lite Portable/data1.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
KMS Tools Lite Portable/Add_Defender_Exclusion.cmd
-
Size
1KB
-
MD5
efb1737fb3e0a36a7eec9e7e19a03e94
-
SHA1
821a211e5cbe22ee8f02e284b4ee469f482f26d3
-
SHA256
e5373f2f8736fae03e915b72737aff496facb9460c211b91c21bb2d7a232d36b
-
SHA512
1119b229e5a9b99579454c80de00185511fc3c2a727ceb4b82824e678c21e16488e37423d05e8e89de6799aab6ee713d3ba5e81b612b3d15d7cbd64d18a4baee
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 3036 powershell.exe 3036 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3036 powershell.exe 3036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3036 powershell.exe Token: SeIncreaseQuotaPrivilege 3036 powershell.exe Token: SeSecurityPrivilege 3036 powershell.exe Token: SeTakeOwnershipPrivilege 3036 powershell.exe Token: SeLoadDriverPrivilege 3036 powershell.exe Token: SeSystemProfilePrivilege 3036 powershell.exe Token: SeSystemtimePrivilege 3036 powershell.exe Token: SeProfSingleProcessPrivilege 3036 powershell.exe Token: SeIncBasePriorityPrivilege 3036 powershell.exe Token: SeCreatePagefilePrivilege 3036 powershell.exe Token: SeBackupPrivilege 3036 powershell.exe Token: SeRestorePrivilege 3036 powershell.exe Token: SeShutdownPrivilege 3036 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeSystemEnvironmentPrivilege 3036 powershell.exe Token: SeRemoteShutdownPrivilege 3036 powershell.exe Token: SeUndockPrivilege 3036 powershell.exe Token: SeManageVolumePrivilege 3036 powershell.exe Token: 33 3036 powershell.exe Token: 34 3036 powershell.exe Token: 35 3036 powershell.exe Token: 36 3036 powershell.exe Token: SeIncreaseQuotaPrivilege 3036 powershell.exe Token: SeSecurityPrivilege 3036 powershell.exe Token: SeTakeOwnershipPrivilege 3036 powershell.exe Token: SeLoadDriverPrivilege 3036 powershell.exe Token: SeSystemProfilePrivilege 3036 powershell.exe Token: SeSystemtimePrivilege 3036 powershell.exe Token: SeProfSingleProcessPrivilege 3036 powershell.exe Token: SeIncBasePriorityPrivilege 3036 powershell.exe Token: SeCreatePagefilePrivilege 3036 powershell.exe Token: SeBackupPrivilege 3036 powershell.exe Token: SeRestorePrivilege 3036 powershell.exe Token: SeShutdownPrivilege 3036 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeSystemEnvironmentPrivilege 3036 powershell.exe Token: SeRemoteShutdownPrivilege 3036 powershell.exe Token: SeUndockPrivilege 3036 powershell.exe Token: SeManageVolumePrivilege 3036 powershell.exe Token: 33 3036 powershell.exe Token: 34 3036 powershell.exe Token: 35 3036 powershell.exe Token: 36 3036 powershell.exe Token: SeIncreaseQuotaPrivilege 3036 powershell.exe Token: SeSecurityPrivilege 3036 powershell.exe Token: SeTakeOwnershipPrivilege 3036 powershell.exe Token: SeLoadDriverPrivilege 3036 powershell.exe Token: SeSystemProfilePrivilege 3036 powershell.exe Token: SeSystemtimePrivilege 3036 powershell.exe Token: SeProfSingleProcessPrivilege 3036 powershell.exe Token: SeIncBasePriorityPrivilege 3036 powershell.exe Token: SeCreatePagefilePrivilege 3036 powershell.exe Token: SeBackupPrivilege 3036 powershell.exe Token: SeRestorePrivilege 3036 powershell.exe Token: SeShutdownPrivilege 3036 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeSystemEnvironmentPrivilege 3036 powershell.exe Token: SeRemoteShutdownPrivilege 3036 powershell.exe Token: SeUndockPrivilege 3036 powershell.exe Token: SeManageVolumePrivilege 3036 powershell.exe Token: 33 3036 powershell.exe Token: 34 3036 powershell.exe Token: 35 3036 powershell.exe Token: 36 3036 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2124 2544 cmd.exe 93 PID 2544 wrote to memory of 2124 2544 cmd.exe 93 PID 2544 wrote to memory of 3036 2544 cmd.exe 94 PID 2544 wrote to memory of 3036 2544 cmd.exe 94 PID 2544 wrote to memory of 2416 2544 cmd.exe 95 PID 2544 wrote to memory of 2416 2544 cmd.exe 95
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KMS Tools Lite Portable\Add_Defender_Exclusion.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\reg.exereg query "HKU\S-1-5-19\Environment"2⤵PID:2124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -nologo -noninteractive -windowStyle hidden -noprofile -command Add-MpPreference -ThreatIDDefaultAction_Ids 2147685180 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 2147735507 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 2147736914 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 2147743522 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 2147734094 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 2147743421 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 2147765679 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 2147783203 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 251873 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 213927 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ThreatIDDefaultAction_Ids 2147722906 -ThreatIDDefaultAction_Actions Allow -Force; Add-MpPreference -ExclusionPath C:\Windows\KMSAutoS -Force; Add-MpPreference -ExclusionPath C:\Windows\System32\SppExtComObjHook.dll -Force; Add-MpPreference -ExclusionPath C:\Windows\System32\SppExtComObjPatcher.exe -Force; Add-MpPreference -ExclusionPath C:\Windows\AAct_Tools -Force; Add-MpPreference -ExclusionPath C:\Windows\AAct_Tools\AAct_x64.exe -Force; Add-MpPreference -ExclusionPath C:\Windows\AAct_Tools\AAct_files\KMSSS.exe -Force; Add-MpPreference -ExclusionPath C:\Windows\AAct_Tools\AAct_files -Force; Add-MpPreference -ExclusionPath C:\Windows\KMS -Force;2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\system32\reg.exereg query "HKU\S-1-5-19\Environment"2⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4048,i,7725352229495460145,1654775800534747848,262144 --variations-seed-version --mojo-platform-channel-handle=3188 /prefetch:81⤵PID:3864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82