Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2023, 14:21

General

  • Target

    Microsoft-Activation-Scripts-master/MAS/Separate-Files-Version/Check-Activation-Status-vbs.cmd

  • Size

    8KB

  • MD5

    945711798605ca089ebbf216f17867b9

  • SHA1

    fe1c121fb983c2cfc979c36ee4731b7136b0135d

  • SHA256

    1818e67562f5affc6dc8df40a3c62b64012bd2105f75befd372787949d5c2fae

  • SHA512

    50216e05ec723d23a57214bb4363eb52b6f5005de48bfc7354026df5e049ecbac51243cb578c94a1e7fa831659b2a3f0cdf5f8faf29b037552b06ab21d5b77d8

  • SSDEEP

    192:BhoO0d/IZIZazZ9VZ5jZfuZcQZ0pZfSy9C/sC/QiO4TEoz6t9+rV:PoO0dEIZad3Z5tficE0rfSyo/h/QiO4T

Score
1/10

Malware Config

Signatures

  • Modifies registry key 1 TTPs 11 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Microsoft-Activation-Scripts-master\MAS\Separate-Files-Version\Check-Activation-Status-vbs.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\System32\findstr.exe
      findstr /v "$" "Check-Activation-Status-vbs.cmd"
      2⤵
        PID:2244
      • C:\Windows\System32\net.exe
        net start sppsvc /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 start sppsvc /y
          3⤵
            PID:1956
        • C:\Windows\System32\cscript.exe
          cscript //nologo slmgr.vbs /dli
          2⤵
            PID:2204
          • C:\Windows\System32\cscript.exe
            cscript //nologo slmgr.vbs /xpr
            2⤵
              PID:2752
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nul
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2788
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path
                3⤵
                • Modifies registry key
                PID:2052
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nul
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2520
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\16.0\Common\InstallRoot /v Path
                3⤵
                • Modifies registry key
                PID:2900
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2928
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path
                3⤵
                • Modifies registry key
                PID:1048
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2628
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path
                3⤵
                • Modifies registry key
                PID:2660
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\14.0\Common\InstallRoot /v Path" 2>nul
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1076
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Microsoft\Office\14.0\Common\InstallRoot /v Path
                3⤵
                • Modifies registry key
                PID:2548
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\Common\InstallRoot /v Path" 2>nul
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2768
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\Common\InstallRoot /v Path
                3⤵
                • Modifies registry key
                PID:2496
            • C:\Windows\System32\cscript.exe
              cscript //nologo "C:\Program Files (x86)\Microsoft Office\Office14\\ospp.vbs" /dstatus
              2⤵
                PID:2504
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath
                2⤵
                • Modifies registry key
                PID:2884
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\ClickToRun /v InstallPath
                2⤵
                • Modifies registry key
                PID:2876
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Microsoft\Office\15.0\ClickToRun /v InstallPath
                2⤵
                • Modifies registry key
                PID:1904
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\15.0\ClickToRun /v InstallPath
                2⤵
                • Modifies registry key
                PID:2864
              • C:\Windows\System32\reg.exe
                reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\CVH /f Click2run /k
                2⤵
                • Modifies registry key
                PID:2552

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\slmgr.vbs

              Filesize

              110KB

              MD5

              38482a5013d8ab40df0fb15eae022c57

              SHA1

              5a4a7f261307721656c11b5cc097cde1cf791073

              SHA256

              ac5c46b97345465a96e9ae1edaff44b191a39bf3d03dc1128090b8ffa92a16f8

              SHA512

              29c1348014ac448fb9c1a72bfd0ab16cdd62b628dc64827b02965b96ba851e9265c4426007181d2aa08f8fb7853142cc01fc6e4d89bec8fc25f3d340d3857331