Overview
overview
4Static
static
3Microsoft-...IO.cmd
windows7-x64
4Microsoft-...IO.cmd
windows10-2004-x64
4Microsoft-...on.cmd
windows7-x64
4Microsoft-...on.cmd
windows10-2004-x64
4Microsoft-...on.cmd
windows7-x64
4Microsoft-...on.cmd
windows10-2004-x64
4Microsoft-...t.html
windows7-x64
1Microsoft-...t.html
windows10-2004-x64
1Microsoft-...at.dll
windows7-x64
1Microsoft-...at.dll
windows10-2004-x64
1Microsoft-...at.dll
windows7-x64
1Microsoft-...at.dll
windows10-2004-x64
1Microsoft-...at.cmd
windows7-x64
4Microsoft-...at.cmd
windows10-2004-x64
4Microsoft-...at.cmd
windows7-x64
4Microsoft-...at.cmd
windows10-2004-x64
4Microsoft-...on.cmd
windows7-x64
4Microsoft-...on.cmd
windows10-2004-x64
4Microsoft-...bs.cmd
windows7-x64
1Microsoft-...bs.cmd
windows10-2004-x64
1Microsoft-...mi.cmd
windows7-x64
4Microsoft-...mi.cmd
windows10-2004-x64
4Microsoft-...er.cmd
windows7-x64
4Microsoft-...er.cmd
windows10-2004-x64
4Microsoft-...ot.cmd
windows7-x64
4Microsoft-...ot.cmd
windows10-2004-x64
4Microsoft-...e.html
windows7-x64
1Microsoft-...e.html
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/All-In-One-Version/MAS_AIO.cmd
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/All-In-One-Version/MAS_AIO.cmd
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activators/HWID_Activation.cmd
Resource
win7-20231025-en
Behavioral task
behavioral4
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activators/HWID_Activation.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.html
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.dll
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.dll
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.cmd
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.cmd
Resource
win10v2004-20231025-en
Behavioral task
behavioral15
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.cmd
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Activat.cmd
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Change_Edition.cmd
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Change_Edition.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Check-Activation-Status-vbs.cmd
Resource
win7-20231025-en
Behavioral task
behavioral20
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Check-Activation-Status-vbs.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Check-Activation-Status-wmi.cmd
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Check-Activation-Status-wmi.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Extract_OEM_Folder.cmd
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Extract_OEM_Folder.cmd
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Troubleshoot.cmd
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Troubleshoot.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/_ReadMe.html
Resource
win7-20231020-en
Behavioral task
behavioral28
Sample
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/_ReadMe.html
Resource
win10v2004-20231023-en
General
-
Target
Microsoft-Activation-Scripts-2.2/Microsoft-Activation-Scripts-2.2/MAS/Separate-Files-Version/Change_Edition.cmd
-
Size
37KB
-
MD5
5f480dc2aa5d68547a4a5740aa1a5339
-
SHA1
835505d1be2f879dba6bf3f712232ed5013beac6
-
SHA256
be31e962df8b24db11f6a203206e23c287ecc060f820ba40d92641fea7471273
-
SHA512
25e66a036b2b794077872be9692f7b9a8edf129310bdc2d2c0eeecb1c179a1176905b8d81f84e52346ed2b0bfd721487ab2317f46dd7c712973f5e93003ecca3
-
SSDEEP
768:XnZi42JYV4AtJ0jij9H5EiXw5iWK4u34uHfIN:Xysx6+j9H5EiXw5iWdu34u/I
Malware Config
Signatures
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2828 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 powershell.exe 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2828 2096 cmd.exe 29 PID 2096 wrote to memory of 2828 2096 cmd.exe 29 PID 2096 wrote to memory of 2828 2096 cmd.exe 29 PID 2096 wrote to memory of 2836 2096 cmd.exe 30 PID 2096 wrote to memory of 2836 2096 cmd.exe 30 PID 2096 wrote to memory of 2836 2096 cmd.exe 30 PID 2096 wrote to memory of 2912 2096 cmd.exe 31 PID 2096 wrote to memory of 2912 2096 cmd.exe 31 PID 2096 wrote to memory of 2912 2096 cmd.exe 31 PID 2096 wrote to memory of 2920 2096 cmd.exe 32 PID 2096 wrote to memory of 2920 2096 cmd.exe 32 PID 2096 wrote to memory of 2920 2096 cmd.exe 32 PID 2096 wrote to memory of 2220 2096 cmd.exe 33 PID 2096 wrote to memory of 2220 2096 cmd.exe 33 PID 2096 wrote to memory of 2220 2096 cmd.exe 33 PID 2096 wrote to memory of 3048 2096 cmd.exe 34 PID 2096 wrote to memory of 3048 2096 cmd.exe 34 PID 2096 wrote to memory of 3048 2096 cmd.exe 34 PID 2096 wrote to memory of 2772 2096 cmd.exe 35 PID 2096 wrote to memory of 2772 2096 cmd.exe 35 PID 2096 wrote to memory of 2772 2096 cmd.exe 35 PID 2096 wrote to memory of 2648 2096 cmd.exe 36 PID 2096 wrote to memory of 2648 2096 cmd.exe 36 PID 2096 wrote to memory of 2648 2096 cmd.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Microsoft-Activation-Scripts-2.2\Microsoft-Activation-Scripts-2.2\MAS\Separate-Files-Version\Change_Edition.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\System32\sc.exesc query Null2⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\System32\find.exefind /i "RUNNING"2⤵PID:2836
-
-
C:\Windows\System32\findstr.exefindstr /v "$" "Change_Edition.cmd"2⤵PID:2912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:2920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\Microsoft-Activation-Scripts-2.2\Microsoft-Activation-Scripts-2.2\MAS\Separate-Files-Version\Change_Edition.cmd" "2⤵PID:2220
-
-
C:\Windows\System32\find.exefind /i "C:\Users\Admin\AppData\Local\Temp"2⤵PID:3048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe write-host -back '"Red"' -fore '"white"' '"==== ERROR ===="'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe write-host -back '"Black"' -fore '"Yellow"' '"Press any key to Exit..."'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD523347829534b7ab6282f2a61835aeafb
SHA1d5c922d9a49e47048f20de46702101042200451d
SHA25676db1a10eb89020584184e8f30b98cb7b27b5baf094c6ac29675ed496aa2f421
SHA512195a7211608596446f5ea4b90a053aeba9d73f66f8df57624bc60b3956302700d2ccb3f69a7fe00e4335b9fa631017cdb6e688f3cf4c917a3a8c6de615fc3ffa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\935KVAV46K8Y4IIY30CY.temp
Filesize7KB
MD523347829534b7ab6282f2a61835aeafb
SHA1d5c922d9a49e47048f20de46702101042200451d
SHA25676db1a10eb89020584184e8f30b98cb7b27b5baf094c6ac29675ed496aa2f421
SHA512195a7211608596446f5ea4b90a053aeba9d73f66f8df57624bc60b3956302700d2ccb3f69a7fe00e4335b9fa631017cdb6e688f3cf4c917a3a8c6de615fc3ffa