Overview
overview
8Static
static
All-In-One...IO.cmd
windows10-1703-x64
1Separate-F...ot.cmd
windows10-1703-x64
1Separate-F...on.cmd
windows10-1703-x64
1Separate-F...bs.cmd
windows10-1703-x64
8Separate-F...mi.cmd
windows10-1703-x64
4Separate-F...er.cmd
windows10-1703-x64
1Separate-F...on.cmd
windows10-1703-x64
1Separate-F...on.cmd
windows10-1703-x64
1Separate-F...ey.cmd
windows10-1703-x64
1Separate-F...te.cmd
windows10-1703-x64
1Separate-F...64.exe
windows10-1703-x64
1Separate-F...86.exe
windows10-1703-x64
1Separate-F...e.html
windows10-1703-x64
1Analysis
-
max time kernel
380s -
max time network
1608s -
platform
windows10-1703_x64 -
resource
win10-20220812-es -
resource tags
arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
01-01-2023 17:49
Static task
static1
Behavioral task
behavioral1
Sample
All-In-One-Version/MAS_AIO.cmd
Resource
win10-20220812-es
Behavioral task
behavioral2
Sample
Separate-Files-Version/Activation_Troubleshoot.cmd
Resource
win10-20220812-es
Behavioral task
behavioral3
Sample
Separate-Files-Version/Change_Edition.cmd
Resource
win10-20220812-es
Behavioral task
behavioral4
Sample
Separate-Files-Version/Check-Activation-Status-vbs.cmd
Resource
win10-20220901-es
Behavioral task
behavioral5
Sample
Separate-Files-Version/Check-Activation-Status-wmi.cmd
Resource
win10-20220812-es
Behavioral task
behavioral6
Sample
Separate-Files-Version/Extract_OEM_Folder.cmd
Resource
win10-20220812-es
Behavioral task
behavioral7
Sample
Separate-Files-Version/HWID-KMS38_Activation/HWID_Activation.cmd
Resource
win10-20220901-es
Behavioral task
behavioral8
Sample
Separate-Files-Version/HWID-KMS38_Activation/KMS38_Activation.cmd
Resource
win10-20220812-es
Behavioral task
behavioral9
Sample
Separate-Files-Version/Install_HWID_Key.cmd
Resource
win10-20220812-es
Behavioral task
behavioral10
Sample
Separate-Files-Version/Online_KMS_Activation/Activate.cmd
Resource
win10-20220812-es
Behavioral task
behavioral11
Sample
Separate-Files-Version/Online_KMS_Activation/BIN/cleanosppx64.exe
Resource
win10-20220901-es
Behavioral task
behavioral12
Sample
Separate-Files-Version/Online_KMS_Activation/BIN/cleanosppx86.exe
Resource
win10-20220812-es
Behavioral task
behavioral13
Sample
Separate-Files-Version/ReadMe.html
Resource
win10-20220812-es
General
-
Target
Separate-Files-Version/Check-Activation-Status-wmi.cmd
-
Size
18KB
-
MD5
9532db59d6b3fe352aad951fe1fea3b0
-
SHA1
751db10cb85b7da9f9f2d1a8fae9df1d02e0e8c4
-
SHA256
1149b91927a002002f404115b12b10179ac198bec0365610ce5a74166b256ea6
-
SHA512
dea458e7fd48ae5e1105fc2a9d358f0633778031baf6ba2532c08c82e1ee50101b69031ed0cdd09f6378e81188bd2073f466a1f5388b874800ef7ed59c8ec799
-
SSDEEP
384:AeeEnXRdwyo44hN8ivJ9EaRVVY7UTdPU0EGT0SGFS:Aee4yWaNY7wdVEGQSGM
Malware Config
Signatures
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2100 sc.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4040 WMIC.exe Token: SeSecurityPrivilege 4040 WMIC.exe Token: SeTakeOwnershipPrivilege 4040 WMIC.exe Token: SeLoadDriverPrivilege 4040 WMIC.exe Token: SeSystemProfilePrivilege 4040 WMIC.exe Token: SeSystemtimePrivilege 4040 WMIC.exe Token: SeProfSingleProcessPrivilege 4040 WMIC.exe Token: SeIncBasePriorityPrivilege 4040 WMIC.exe Token: SeCreatePagefilePrivilege 4040 WMIC.exe Token: SeBackupPrivilege 4040 WMIC.exe Token: SeRestorePrivilege 4040 WMIC.exe Token: SeShutdownPrivilege 4040 WMIC.exe Token: SeDebugPrivilege 4040 WMIC.exe Token: SeSystemEnvironmentPrivilege 4040 WMIC.exe Token: SeRemoteShutdownPrivilege 4040 WMIC.exe Token: SeUndockPrivilege 4040 WMIC.exe Token: SeManageVolumePrivilege 4040 WMIC.exe Token: 33 4040 WMIC.exe Token: 34 4040 WMIC.exe Token: 35 4040 WMIC.exe Token: 36 4040 WMIC.exe Token: SeIncreaseQuotaPrivilege 4040 WMIC.exe Token: SeSecurityPrivilege 4040 WMIC.exe Token: SeTakeOwnershipPrivilege 4040 WMIC.exe Token: SeLoadDriverPrivilege 4040 WMIC.exe Token: SeSystemProfilePrivilege 4040 WMIC.exe Token: SeSystemtimePrivilege 4040 WMIC.exe Token: SeProfSingleProcessPrivilege 4040 WMIC.exe Token: SeIncBasePriorityPrivilege 4040 WMIC.exe Token: SeCreatePagefilePrivilege 4040 WMIC.exe Token: SeBackupPrivilege 4040 WMIC.exe Token: SeRestorePrivilege 4040 WMIC.exe Token: SeShutdownPrivilege 4040 WMIC.exe Token: SeDebugPrivilege 4040 WMIC.exe Token: SeSystemEnvironmentPrivilege 4040 WMIC.exe Token: SeRemoteShutdownPrivilege 4040 WMIC.exe Token: SeUndockPrivilege 4040 WMIC.exe Token: SeManageVolumePrivilege 4040 WMIC.exe Token: 33 4040 WMIC.exe Token: 34 4040 WMIC.exe Token: 35 4040 WMIC.exe Token: 36 4040 WMIC.exe Token: SeIncreaseQuotaPrivilege 2004 WMIC.exe Token: SeSecurityPrivilege 2004 WMIC.exe Token: SeTakeOwnershipPrivilege 2004 WMIC.exe Token: SeLoadDriverPrivilege 2004 WMIC.exe Token: SeSystemProfilePrivilege 2004 WMIC.exe Token: SeSystemtimePrivilege 2004 WMIC.exe Token: SeProfSingleProcessPrivilege 2004 WMIC.exe Token: SeIncBasePriorityPrivilege 2004 WMIC.exe Token: SeCreatePagefilePrivilege 2004 WMIC.exe Token: SeBackupPrivilege 2004 WMIC.exe Token: SeRestorePrivilege 2004 WMIC.exe Token: SeShutdownPrivilege 2004 WMIC.exe Token: SeDebugPrivilege 2004 WMIC.exe Token: SeSystemEnvironmentPrivilege 2004 WMIC.exe Token: SeRemoteShutdownPrivilege 2004 WMIC.exe Token: SeUndockPrivilege 2004 WMIC.exe Token: SeManageVolumePrivilege 2004 WMIC.exe Token: 33 2004 WMIC.exe Token: 34 2004 WMIC.exe Token: 35 2004 WMIC.exe Token: 36 2004 WMIC.exe Token: SeIncreaseQuotaPrivilege 2004 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2496 2968 cmd.exe 67 PID 2968 wrote to memory of 2496 2968 cmd.exe 67 PID 2968 wrote to memory of 2804 2968 cmd.exe 68 PID 2968 wrote to memory of 2804 2968 cmd.exe 68 PID 2968 wrote to memory of 4040 2968 cmd.exe 69 PID 2968 wrote to memory of 4040 2968 cmd.exe 69 PID 2968 wrote to memory of 4492 2968 cmd.exe 70 PID 2968 wrote to memory of 4492 2968 cmd.exe 70 PID 2968 wrote to memory of 2100 2968 cmd.exe 72 PID 2968 wrote to memory of 2100 2968 cmd.exe 72 PID 2968 wrote to memory of 4300 2968 cmd.exe 73 PID 2968 wrote to memory of 4300 2968 cmd.exe 73 PID 4300 wrote to memory of 904 4300 net.exe 74 PID 4300 wrote to memory of 904 4300 net.exe 74 PID 2968 wrote to memory of 2004 2968 cmd.exe 75 PID 2968 wrote to memory of 2004 2968 cmd.exe 75 PID 2968 wrote to memory of 4720 2968 cmd.exe 76 PID 2968 wrote to memory of 4720 2968 cmd.exe 76 PID 2968 wrote to memory of 3744 2968 cmd.exe 77 PID 2968 wrote to memory of 3744 2968 cmd.exe 77 PID 2968 wrote to memory of 3980 2968 cmd.exe 78 PID 2968 wrote to memory of 3980 2968 cmd.exe 78 PID 2968 wrote to memory of 1364 2968 cmd.exe 79 PID 2968 wrote to memory of 1364 2968 cmd.exe 79 PID 1364 wrote to memory of 2468 1364 cmd.exe 80 PID 1364 wrote to memory of 2468 1364 cmd.exe 80 PID 2968 wrote to memory of 3836 2968 cmd.exe 81 PID 2968 wrote to memory of 3836 2968 cmd.exe 81 PID 3836 wrote to memory of 3828 3836 cmd.exe 83 PID 3836 wrote to memory of 3828 3836 cmd.exe 83 PID 3836 wrote to memory of 1836 3836 cmd.exe 82 PID 3836 wrote to memory of 1836 3836 cmd.exe 82 PID 2968 wrote to memory of 1372 2968 cmd.exe 84 PID 2968 wrote to memory of 1372 2968 cmd.exe 84 PID 2968 wrote to memory of 1176 2968 cmd.exe 85 PID 2968 wrote to memory of 1176 2968 cmd.exe 85 PID 2968 wrote to memory of 3816 2968 cmd.exe 86 PID 2968 wrote to memory of 3816 2968 cmd.exe 86 PID 2968 wrote to memory of 976 2968 cmd.exe 87 PID 2968 wrote to memory of 976 2968 cmd.exe 87 PID 2968 wrote to memory of 4672 2968 cmd.exe 88 PID 2968 wrote to memory of 4672 2968 cmd.exe 88 PID 2968 wrote to memory of 4724 2968 cmd.exe 89 PID 2968 wrote to memory of 4724 2968 cmd.exe 89 PID 2968 wrote to memory of 4892 2968 cmd.exe 90 PID 2968 wrote to memory of 4892 2968 cmd.exe 90 PID 2968 wrote to memory of 5016 2968 cmd.exe 91 PID 2968 wrote to memory of 5016 2968 cmd.exe 91 PID 5016 wrote to memory of 1548 5016 cmd.exe 92 PID 5016 wrote to memory of 1548 5016 cmd.exe 92 PID 5016 wrote to memory of 3120 5016 cmd.exe 93 PID 5016 wrote to memory of 3120 5016 cmd.exe 93 PID 2968 wrote to memory of 3812 2968 cmd.exe 94 PID 2968 wrote to memory of 3812 2968 cmd.exe 94 PID 3812 wrote to memory of 4824 3812 cmd.exe 95 PID 3812 wrote to memory of 4824 3812 cmd.exe 95 PID 2968 wrote to memory of 1312 2968 cmd.exe 96 PID 2968 wrote to memory of 1312 2968 cmd.exe 96 PID 1312 wrote to memory of 1992 1312 cmd.exe 97 PID 1312 wrote to memory of 1992 1312 cmd.exe 97 PID 1312 wrote to memory of 4092 1312 cmd.exe 98 PID 1312 wrote to memory of 4092 1312 cmd.exe 98 PID 2968 wrote to memory of 4756 2968 cmd.exe 99 PID 2968 wrote to memory of 4756 2968 cmd.exe 99
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Separate-Files-Version\Check-Activation-Status-wmi.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:2496
-
-
C:\Windows\System32\findstr.exefindstr /rxc:".*" "Check-Activation-Status-wmi.cmd"2⤵PID:2804
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get CreationClassName /value2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\System32\find.exefind /i "ComputerSystem"2⤵PID:4492
-
-
C:\Windows\System32\sc.exesc query osppsvc2⤵
- Launches sc.exe
PID:2100
-
-
C:\Windows\System32\net.exenet start sppsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start sppsvc /y3⤵PID:904
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and PartialProductKey is not null) get ID /value2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\System32\findstr.exefindstr /i ID2⤵PID:4720
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where (ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663' and PartialProductKey is not null) get ID /value2⤵PID:3744
-
-
C:\Windows\System32\findstr.exefindstr /i ID2⤵PID:3980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and PartialProductKey is not null) get ID /value"2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and PartialProductKey is not null) get ID /value3⤵PID:2468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where ID='2de67392-b7a7-462a-b1ca-108dd189f588' get Description, DiscoveredKeyManagementServiceMachineName, DiscoveredKeyManagementServiceMachinePort, EvaluationEndDate, GracePeriodRemaining, ID, KeyManagementServiceMachine, KeyManagementServicePort, KeyManagementServiceProductKeyID, LicenseStatus, LicenseStatusReason, Name, PartialProductKey, ProductKeyID, VLActivationInterval, VLRenewalInterval, KeyManagementServiceLookupDomain, VLActivationTypeEnabled, DiscoveredKeyManagementServiceMachineIpAddress, ProductKeyChannel /value" | findstr =2⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\System32\findstr.exefindstr =3⤵PID:1836
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where ID='2de67392-b7a7-462a-b1ca-108dd189f588' get Description, DiscoveredKeyManagementServiceMachineName, DiscoveredKeyManagementServiceMachinePort, EvaluationEndDate, GracePeriodRemaining, ID, KeyManagementServiceMachine, KeyManagementServicePort, KeyManagementServiceProductKeyID, LicenseStatus, LicenseStatusReason, Name, PartialProductKey, ProductKeyID, VLActivationInterval, VLRenewalInterval, KeyManagementServiceLookupDomain, VLActivationTypeEnabled, DiscoveredKeyManagementServiceMachineIpAddress, ProductKeyChannel /value3⤵PID:3828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Windows(R) Operating System, VOLUME_KMSCLIENT channel"2⤵PID:1372
-
-
C:\Windows\System32\findstr.exefindstr /i VOLUME_KMSCLIENT2⤵PID:1176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Windows(R) Operating System, VOLUME_KMSCLIENT channel"2⤵PID:3816
-
-
C:\Windows\System32\findstr.exefindstr /i TIMEBASED_2⤵PID:976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Windows(R) Operating System, VOLUME_KMSCLIENT channel"2⤵PID:4672
-
-
C:\Windows\System32\findstr.exefindstr /i VIRTUAL_MACHINE_ACTIVATION2⤵PID:4724
-
-
C:\Windows\System32\cmd.execmd /c exit /b 32215491422⤵PID:4892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingService get ClientMachineID, KeyManagementServiceHostCaching /value" | findstr =2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingService get ClientMachineID, KeyManagementServiceHostCaching /value3⤵PID:1548
-
-
C:\Windows\System32\findstr.exefindstr =3⤵PID:3120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663' and PartialProductKey is not null) get ID /value"2⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where (ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663' and PartialProductKey is not null) get ID /value3⤵PID:4824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where ID='85dd8b5f-eaa4-4af3-a628-cce9e77c9a03' get Description, DiscoveredKeyManagementServiceMachineName, DiscoveredKeyManagementServiceMachinePort, EvaluationEndDate, GracePeriodRemaining, ID, KeyManagementServiceMachine, KeyManagementServicePort, KeyManagementServiceProductKeyID, LicenseStatus, LicenseStatusReason, Name, PartialProductKey, ProductKeyID, VLActivationInterval, VLRenewalInterval, KeyManagementServiceLookupDomain, VLActivationTypeEnabled, DiscoveredKeyManagementServiceMachineIpAddress, ProductKeyChannel /value" | findstr =2⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where ID='85dd8b5f-eaa4-4af3-a628-cce9e77c9a03' get Description, DiscoveredKeyManagementServiceMachineName, DiscoveredKeyManagementServiceMachinePort, EvaluationEndDate, GracePeriodRemaining, ID, KeyManagementServiceMachine, KeyManagementServicePort, KeyManagementServiceProductKeyID, LicenseStatus, LicenseStatusReason, Name, PartialProductKey, ProductKeyID, VLActivationInterval, VLRenewalInterval, KeyManagementServiceLookupDomain, VLActivationTypeEnabled, DiscoveredKeyManagementServiceMachineIpAddress, ProductKeyChannel /value3⤵PID:1992
-
-
C:\Windows\System32\findstr.exefindstr =3⤵PID:4092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Office 19, VOLUME_KMSCLIENT channel"2⤵PID:4756
-
-
C:\Windows\System32\findstr.exefindstr /i VOLUME_KMSCLIENT2⤵PID:4776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Office 19, VOLUME_KMSCLIENT channel"2⤵PID:4740
-
-
C:\Windows\System32\findstr.exefindstr /i TIMEBASED_2⤵PID:3176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Office 19, VOLUME_KMSCLIENT channel"2⤵PID:3168
-
-
C:\Windows\System32\findstr.exefindstr /i VIRTUAL_MACHINE_ACTIVATION2⤵PID:4592
-
-
C:\Windows\System32\cmd.execmd /c exit /b 32215491422⤵PID:4160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingService get ClientMachineID, KeyManagementServiceHostCaching /value" | findstr =2⤵PID:5108
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingService get ClientMachineID, KeyManagementServiceHostCaching /value3⤵PID:3056
-
-
C:\Windows\System32\findstr.exefindstr =3⤵PID:4696
-
-