Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2023, 14:21

General

  • Target

    Microsoft-Activation-Scripts-master/MAS/Separate-Files-Version/Check-Activation-Status-wmi.cmd

  • Size

    18KB

  • MD5

    55ea790635e39d3cfce2ae6d4af60417

  • SHA1

    70f1c2357ef3ca85cc92bb8cbfaac3a586e85e50

  • SHA256

    4dd86774e105d60589f0540f6d93e0f43942fa32203853b8dcea52035f50a0f9

  • SHA512

    cbbbcb1fabfa6b13c7c7fddb95d269a3cd752c2c568fa676ee3f7536a0095b4255ec17d4ac896b2e97bcc0000c3eb5c22a9eab27d1e994aa1167a3af4b2da2f4

  • SSDEEP

    384:AeI7EnXfdwyo44hN8ivJ9EaRVVY7UTdPU0EGT0SGFX:AecGyWaNY7wdVEGQSGR

Score
4/10

Malware Config

Signatures

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Microsoft-Activation-Scripts-master\MAS\Separate-Files-Version\Check-Activation-Status-wmi.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ver
      2⤵
        PID:4988
      • C:\Windows\System32\findstr.exe
        findstr /v "$" "Check-Activation-Status-wmi.cmd"
        2⤵
          PID:4972
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic path Win32_ComputerSystem get CreationClassName /value
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4912
        • C:\Windows\System32\find.exe
          find /i "ComputerSystem"
          2⤵
            PID:1072
          • C:\Windows\System32\sc.exe
            sc query osppsvc
            2⤵
            • Launches sc.exe
            PID:4784
          • C:\Windows\System32\net.exe
            net start sppsvc /y
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3556
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 start sppsvc /y
              3⤵
                PID:5060
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and PartialProductKey is not null) get ID /value
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3028
            • C:\Windows\System32\findstr.exe
              findstr /i ID
              2⤵
                PID:1608
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic path SoftwareLicensingProduct where (ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663' and PartialProductKey is not null) get ID /value
                2⤵
                  PID:4188
                • C:\Windows\System32\findstr.exe
                  findstr /i ID
                  2⤵
                    PID:3932
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and PartialProductKey is not null) get ID /value"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3548
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and PartialProductKey is not null) get ID /value
                      3⤵
                        PID:3368
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where ID='2de67392-b7a7-462a-b1ca-108dd189f588' get Description, DiscoveredKeyManagementServiceMachineName, DiscoveredKeyManagementServiceMachinePort, EvaluationEndDate, GracePeriodRemaining, ID, KeyManagementServiceMachine, KeyManagementServicePort, KeyManagementServiceProductKeyID, LicenseStatus, LicenseStatusReason, Name, PartialProductKey, ProductKeyID, VLActivationInterval, VLRenewalInterval, KeyManagementServiceLookupDomain, VLActivationTypeEnabled, DiscoveredKeyManagementServiceMachineIpAddress, ProductKeyChannel /value" | findstr =
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1864
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic path SoftwareLicensingProduct where ID='2de67392-b7a7-462a-b1ca-108dd189f588' get Description, DiscoveredKeyManagementServiceMachineName, DiscoveredKeyManagementServiceMachinePort, EvaluationEndDate, GracePeriodRemaining, ID, KeyManagementServiceMachine, KeyManagementServicePort, KeyManagementServiceProductKeyID, LicenseStatus, LicenseStatusReason, Name, PartialProductKey, ProductKeyID, VLActivationInterval, VLRenewalInterval, KeyManagementServiceLookupDomain, VLActivationTypeEnabled, DiscoveredKeyManagementServiceMachineIpAddress, ProductKeyChannel /value
                        3⤵
                          PID:3048
                        • C:\Windows\System32\findstr.exe
                          findstr =
                          3⤵
                            PID:2444
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Windows(R) Operating System, VOLUME_KMSCLIENT channel"
                          2⤵
                            PID:4932
                          • C:\Windows\System32\findstr.exe
                            findstr /i VOLUME_KMSCLIENT
                            2⤵
                              PID:1916
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Windows(R) Operating System, VOLUME_KMSCLIENT channel"
                              2⤵
                                PID:1892
                              • C:\Windows\System32\findstr.exe
                                findstr /i TIMEBASED_
                                2⤵
                                  PID:1752
                                • C:\Windows\System32\findstr.exe
                                  findstr /i VIRTUAL_MACHINE_ACTIVATION
                                  2⤵
                                    PID:2848
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Windows(R) Operating System, VOLUME_KMSCLIENT channel"
                                    2⤵
                                      PID:3096
                                    • C:\Windows\System32\cmd.exe
                                      cmd /c exit /b 3221549142
                                      2⤵
                                        PID:3544
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingService get ClientMachineID, KeyManagementServiceHostCaching /value" | findstr =
                                        2⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:4552
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic path SoftwareLicensingService get ClientMachineID, KeyManagementServiceHostCaching /value
                                          3⤵
                                            PID:1640
                                          • C:\Windows\System32\findstr.exe
                                            findstr =
                                            3⤵
                                              PID:5056
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663' and PartialProductKey is not null) get ID /value"
                                            2⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:2288
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic path SoftwareLicensingProduct where (ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663' and PartialProductKey is not null) get ID /value
                                              3⤵
                                                PID:4936
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where ID='85dd8b5f-eaa4-4af3-a628-cce9e77c9a03' get Description, DiscoveredKeyManagementServiceMachineName, DiscoveredKeyManagementServiceMachinePort, EvaluationEndDate, GracePeriodRemaining, ID, KeyManagementServiceMachine, KeyManagementServicePort, KeyManagementServiceProductKeyID, LicenseStatus, LicenseStatusReason, Name, PartialProductKey, ProductKeyID, VLActivationInterval, VLRenewalInterval, KeyManagementServiceLookupDomain, VLActivationTypeEnabled, DiscoveredKeyManagementServiceMachineIpAddress, ProductKeyChannel /value" | findstr =
                                              2⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:2724
                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                wmic path SoftwareLicensingProduct where ID='85dd8b5f-eaa4-4af3-a628-cce9e77c9a03' get Description, DiscoveredKeyManagementServiceMachineName, DiscoveredKeyManagementServiceMachinePort, EvaluationEndDate, GracePeriodRemaining, ID, KeyManagementServiceMachine, KeyManagementServicePort, KeyManagementServiceProductKeyID, LicenseStatus, LicenseStatusReason, Name, PartialProductKey, ProductKeyID, VLActivationInterval, VLRenewalInterval, KeyManagementServiceLookupDomain, VLActivationTypeEnabled, DiscoveredKeyManagementServiceMachineIpAddress, ProductKeyChannel /value
                                                3⤵
                                                  PID:2716
                                                • C:\Windows\System32\findstr.exe
                                                  findstr =
                                                  3⤵
                                                    PID:5032
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Office 19, VOLUME_KMSCLIENT channel"
                                                  2⤵
                                                    PID:2932
                                                  • C:\Windows\System32\findstr.exe
                                                    findstr /i VOLUME_KMSCLIENT
                                                    2⤵
                                                      PID:2772
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Office 19, VOLUME_KMSCLIENT channel"
                                                      2⤵
                                                        PID:2628
                                                      • C:\Windows\System32\findstr.exe
                                                        findstr /i TIMEBASED_
                                                        2⤵
                                                          PID:4804
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" echo Office 19, VOLUME_KMSCLIENT channel"
                                                          2⤵
                                                            PID:1924
                                                          • C:\Windows\System32\findstr.exe
                                                            findstr /i VIRTUAL_MACHINE_ACTIVATION
                                                            2⤵
                                                              PID:4464
                                                            • C:\Windows\System32\cmd.exe
                                                              cmd /c exit /b 1074065472
                                                              2⤵
                                                                PID:1108
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c powershell "$([DateTime]::Now.addMinutes(232808)).ToString('yyyy-MM-dd HH:mm:ss')" 2>nul
                                                                2⤵
                                                                  PID:3840
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell "$([DateTime]::Now.addMinutes(232808)).ToString('yyyy-MM-dd HH:mm:ss')"
                                                                    3⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:528
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingService get ClientMachineID, KeyManagementServiceHostCaching /value" | findstr =
                                                                  2⤵
                                                                    PID:448
                                                                    • C:\Windows\System32\findstr.exe
                                                                      findstr =
                                                                      3⤵
                                                                        PID:1500
                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                        wmic path SoftwareLicensingService get ClientMachineID, KeyManagementServiceHostCaching /value
                                                                        3⤵
                                                                          PID:4452

                                                                    Network

                                                                    MITRE ATT&CK Matrix

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xgaw2o2w.j4o.ps1

                                                                      Filesize

                                                                      60B

                                                                      MD5

                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                      SHA1

                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                      SHA256

                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                      SHA512

                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                    • memory/528-5-0x0000029DF4110000-0x0000029DF4132000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/528-10-0x00007FFA33850000-0x00007FFA34311000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/528-12-0x0000029DF41D0000-0x0000029DF41E0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/528-11-0x0000029DF41D0000-0x0000029DF41E0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/528-15-0x00007FFA33850000-0x00007FFA34311000-memory.dmp

                                                                      Filesize

                                                                      10.8MB