Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2023, 06:58

General

  • Target

    Separate-Files-Version/Activators/Check-Activation-Status-vbs.cmd

  • Size

    6KB

  • MD5

    b568aff717984da1f7c8b9cf522fb1e8

  • SHA1

    c00cd43aa95e8221b8ee6a9e758eb7b128139997

  • SHA256

    77ba40dcde775f0a7fb46182296a5b8f5f1150ed81d0759561f2100727344bc8

  • SHA512

    a5648a0af05acc36601208c97f572e09a74065a7b4f2e1d4c333da842c3aa46917e03e464422fa7f4134b90937048380c2699eaddf39f71fe2c9092c2d08c248

  • SSDEEP

    192:BDO0diZIZazZ9VZ5jZfuZcQZ0pZfSy9C/sC/QiO4TEoz6t9+r4:BO0d+IZad3Z5tficE0rfSyo/h/QiO4Ti

Score
1/10

Malware Config

Signatures

  • Modifies registry key 1 TTPs 11 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Separate-Files-Version\Activators\Check-Activation-Status-vbs.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\System32\net.exe
      net start sppsvc /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 start sppsvc /y
        3⤵
          PID:1752
      • C:\Windows\System32\cscript.exe
        cscript //nologo slmgr.vbs /dli
        2⤵
          PID:2696
        • C:\Windows\System32\cscript.exe
          cscript //nologo slmgr.vbs /xpr
          2⤵
            PID:2768
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2708
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path
              3⤵
              • Modifies registry key
              PID:856
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\16.0\Common\InstallRoot /v Path
              3⤵
              • Modifies registry key
              PID:2684
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path
              3⤵
              • Modifies registry key
              PID:2628
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2512
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path
              3⤵
              • Modifies registry key
              PID:2524
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\14.0\Common\InstallRoot /v Path" 2>nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2532
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Microsoft\Office\14.0\Common\InstallRoot /v Path
              3⤵
              • Modifies registry key
              PID:2544
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\Common\InstallRoot /v Path" 2>nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\Common\InstallRoot /v Path
              3⤵
              • Modifies registry key
              PID:2584
          • C:\Windows\System32\cscript.exe
            cscript //nologo "C:\Program Files (x86)\Microsoft Office\Office14\\ospp.vbs" /dstatus
            2⤵
              PID:1588
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath
              2⤵
              • Modifies registry key
              PID:3016
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\ClickToRun /v InstallPath
              2⤵
              • Modifies registry key
              PID:2400
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Microsoft\Office\15.0\ClickToRun /v InstallPath
              2⤵
              • Modifies registry key
              PID:2500
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\15.0\ClickToRun /v InstallPath
              2⤵
              • Modifies registry key
              PID:2800
            • C:\Windows\System32\reg.exe
              reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\CVH /f Click2run /k
              2⤵
              • Modifies registry key
              PID:2384

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\slmgr.vbs

                  Filesize

                  110KB

                  MD5

                  38482a5013d8ab40df0fb15eae022c57

                  SHA1

                  5a4a7f261307721656c11b5cc097cde1cf791073

                  SHA256

                  ac5c46b97345465a96e9ae1edaff44b191a39bf3d03dc1128090b8ffa92a16f8

                  SHA512

                  29c1348014ac448fb9c1a72bfd0ab16cdd62b628dc64827b02965b96ba851e9265c4426007181d2aa08f8fb7853142cc01fc6e4d89bec8fc25f3d340d3857331