Overview
overview
8Static
static
All-In-One...IO.cmd
windows10-1703-x64
1Separate-F...ot.cmd
windows10-1703-x64
1Separate-F...on.cmd
windows10-1703-x64
1Separate-F...bs.cmd
windows10-1703-x64
8Separate-F...mi.cmd
windows10-1703-x64
4Separate-F...er.cmd
windows10-1703-x64
1Separate-F...on.cmd
windows10-1703-x64
1Separate-F...on.cmd
windows10-1703-x64
1Separate-F...ey.cmd
windows10-1703-x64
1Separate-F...te.cmd
windows10-1703-x64
1Separate-F...64.exe
windows10-1703-x64
1Separate-F...86.exe
windows10-1703-x64
1Separate-F...e.html
windows10-1703-x64
1Analysis
-
max time kernel
1604s -
max time network
1607s -
platform
windows10-1703_x64 -
resource
win10-20220812-es -
resource tags
arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
01/01/2023, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
All-In-One-Version/MAS_AIO.cmd
Resource
win10-20220812-es
Behavioral task
behavioral2
Sample
Separate-Files-Version/Activation_Troubleshoot.cmd
Resource
win10-20220812-es
Behavioral task
behavioral3
Sample
Separate-Files-Version/Change_Edition.cmd
Resource
win10-20220812-es
Behavioral task
behavioral4
Sample
Separate-Files-Version/Check-Activation-Status-vbs.cmd
Resource
win10-20220901-es
Behavioral task
behavioral5
Sample
Separate-Files-Version/Check-Activation-Status-wmi.cmd
Resource
win10-20220812-es
Behavioral task
behavioral6
Sample
Separate-Files-Version/Extract_OEM_Folder.cmd
Resource
win10-20220812-es
Behavioral task
behavioral7
Sample
Separate-Files-Version/HWID-KMS38_Activation/HWID_Activation.cmd
Resource
win10-20220901-es
Behavioral task
behavioral8
Sample
Separate-Files-Version/HWID-KMS38_Activation/KMS38_Activation.cmd
Resource
win10-20220812-es
Behavioral task
behavioral9
Sample
Separate-Files-Version/Install_HWID_Key.cmd
Resource
win10-20220812-es
Behavioral task
behavioral10
Sample
Separate-Files-Version/Online_KMS_Activation/Activate.cmd
Resource
win10-20220812-es
Behavioral task
behavioral11
Sample
Separate-Files-Version/Online_KMS_Activation/BIN/cleanosppx64.exe
Resource
win10-20220901-es
Behavioral task
behavioral12
Sample
Separate-Files-Version/Online_KMS_Activation/BIN/cleanosppx86.exe
Resource
win10-20220812-es
Behavioral task
behavioral13
Sample
Separate-Files-Version/ReadMe.html
Resource
win10-20220812-es
General
-
Target
Separate-Files-Version/Install_HWID_Key.cmd
-
Size
15KB
-
MD5
a29a8d30d62d365dffba307ffcde9b25
-
SHA1
001863b0349c67a2c8bc54fd0cfaf1e58f505fa4
-
SHA256
a3dbe4b712888ff5d0b1caee65987806f36d379ecedd9ff059a069516a188c4d
-
SHA512
fd66d921fb648780a24cddfa473966a2a958be500b2c4907aa5d934270ae502f0261fffa92ba92349294c42fc7e2b093162f0288885d6316da92e1008014779d
-
SSDEEP
192:tIDP04IPIn3DX/GLeI2HActg5hC6UsG+ez3+NKhhXEZVjrBzkhibiwlVvsOHp+K7:qn3DX/RpggnnI7rBzzlrn7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2132 2856 cmd.exe 67 PID 2856 wrote to memory of 2132 2856 cmd.exe 67 PID 2856 wrote to memory of 696 2856 cmd.exe 68 PID 2856 wrote to memory of 696 2856 cmd.exe 68 PID 2856 wrote to memory of 3232 2856 cmd.exe 69 PID 2856 wrote to memory of 3232 2856 cmd.exe 69 PID 2856 wrote to memory of 3748 2856 cmd.exe 70 PID 2856 wrote to memory of 3748 2856 cmd.exe 70 PID 2856 wrote to memory of 4460 2856 cmd.exe 71 PID 2856 wrote to memory of 4460 2856 cmd.exe 71 PID 4460 wrote to memory of 4564 4460 cmd.exe 72 PID 4460 wrote to memory of 4564 4460 cmd.exe 72 PID 4460 wrote to memory of 400 4460 cmd.exe 73 PID 4460 wrote to memory of 400 4460 cmd.exe 73 PID 2856 wrote to memory of 1688 2856 cmd.exe 75 PID 2856 wrote to memory of 1688 2856 cmd.exe 75 PID 2856 wrote to memory of 4776 2856 cmd.exe 74 PID 2856 wrote to memory of 4776 2856 cmd.exe 74
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Separate-Files-Version\Install_HWID_Key.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\System32\findstr.exefindstr /rxc:".*" "Install_HWID_Key.cmd"2⤵PID:2132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:696
-
-
C:\Windows\System32\reg.exereg query "HKCU\Console" /v ForceV22⤵PID:3232
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:3748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo prompt $E | cmd2⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "3⤵PID:4564
-
-
C:\Windows\System32\cmd.execmd3⤵PID:400
-
-
-
C:\Windows\System32\find.exefind /i "C:\Users\Admin\AppData\Local\Temp"2⤵PID:4776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\Separate-Files-Version\Install_HWID_Key.cmd" "2⤵PID:1688
-