Overview
overview
3Static
static
3All-In-One...76.cmd
windows7-x64
1All-In-One...76.cmd
windows10-2004-x64
1ReadMe.html
windows7-x64
1ReadMe.html
windows10-2004-x64
1Separate-F...y.html
windows7-x64
1Separate-F...y.html
windows10-2004-x64
1Separate-F...bs.cmd
windows7-x64
1Separate-F...bs.cmd
windows10-2004-x64
1Separate-F...Up.exe
windows10-2004-x64
1Separate-F...o.html
windows7-x64
1Separate-F...o.html
windows10-2004-x64
1Separate-F...te.exe
windows7-x64
Separate-F...te.exe
windows10-2004-x64
Separate-F...lc.dll
windows7-x64
1Separate-F...lc.dll
windows10-2004-x64
1Separate-F...te.exe
windows10-2004-x64
1Separate-F...lc.dll
windows7-x64
1Separate-F...lc.dll
windows10-2004-x64
1Separate-F...on.cmd
windows7-x64
1Separate-F...on.cmd
windows10-2004-x64
1Separate-F...on.cmd
windows7-x64
1Separate-F...on.cmd
windows10-2004-x64
1Separate-F...D.html
windows7-x64
1Separate-F...D.html
windows10-2004-x64
1Separate-F...8.html
windows7-x64
1Separate-F...8.html
windows10-2004-x64
1Separate-F...te.cmd
windows7-x64
1Separate-F...te.cmd
windows10-2004-x64
1Separate-F...o.html
windows7-x64
1Separate-F...o.html
windows10-2004-x64
1Separate-F...64.exe
windows7-x64
1Separate-F...64.exe
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2023, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
All-In-One-Version/MAS_1.5_AIO_CRC32_21D20776.cmd
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
All-In-One-Version/MAS_1.5_AIO_CRC32_21D20776.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
ReadMe.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
ReadMe.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Separate-Files-Version/Activators/Activations_Summary.html
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Separate-Files-Version/Activators/Activations_Summary.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Separate-Files-Version/Activators/Check-Activation-Status-vbs.cmd
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Separate-Files-Version/Activators/Check-Activation-Status-vbs.cmd
Resource
win10v2004-20231025-en
Behavioral task
behavioral9
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/ClipUp.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/_Info.html
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/_Info.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/arm64_gatherosstate.exe
Resource
win7-20231020-en
Behavioral task
behavioral13
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/arm64_gatherosstate.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/arm64_slc.dll
Resource
win7-20231023-en
Behavioral task
behavioral15
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/arm64_slc.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral16
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/gatherosstate.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/slc.dll
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/BIN/slc.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/HWID_Activation.cmd
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/HWID_Activation.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/KMS38_Activation.cmd
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/KMS38_Activation.cmd
Resource
win10v2004-20231025-en
Behavioral task
behavioral23
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/ReadMe_HWID.html
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/ReadMe_HWID.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/ReadMe_KMS38.html
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
Separate-Files-Version/Activators/HWID-KMS38_Activation/ReadMe_KMS38.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
Separate-Files-Version/Activators/Online_KMS_Activation/Activate.cmd
Resource
win7-20231020-en
Behavioral task
behavioral28
Sample
Separate-Files-Version/Activators/Online_KMS_Activation/Activate.cmd
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
Separate-Files-Version/Activators/Online_KMS_Activation/BIN/_Info.html
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
Separate-Files-Version/Activators/Online_KMS_Activation/BIN/_Info.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
Separate-Files-Version/Activators/Online_KMS_Activation/BIN/cleanosppx64.exe
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
Separate-Files-Version/Activators/Online_KMS_Activation/BIN/cleanosppx64.exe
Resource
win10v2004-20231020-en
General
-
Target
Separate-Files-Version/Activators/Check-Activation-Status-vbs.cmd
-
Size
6KB
-
MD5
b568aff717984da1f7c8b9cf522fb1e8
-
SHA1
c00cd43aa95e8221b8ee6a9e758eb7b128139997
-
SHA256
77ba40dcde775f0a7fb46182296a5b8f5f1150ed81d0759561f2100727344bc8
-
SHA512
a5648a0af05acc36601208c97f572e09a74065a7b4f2e1d4c333da842c3aa46917e03e464422fa7f4134b90937048380c2699eaddf39f71fe2c9092c2d08c248
-
SSDEEP
192:BDO0diZIZazZ9VZ5jZfuZcQZ0pZfSy9C/sC/QiO4TEoz6t9+r4:BO0d+IZad3Z5tficE0rfSyo/h/QiO4Ti
Malware Config
Signatures
-
Modifies registry key 1 TTPs 10 IoCs
pid Process 544 reg.exe 4924 reg.exe 4256 reg.exe 3400 reg.exe 1720 reg.exe 2316 reg.exe 716 reg.exe 4300 reg.exe 1004 reg.exe 3976 reg.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1232 2396 cmd.exe 84 PID 2396 wrote to memory of 1232 2396 cmd.exe 84 PID 1232 wrote to memory of 3888 1232 net.exe 85 PID 1232 wrote to memory of 3888 1232 net.exe 85 PID 2396 wrote to memory of 1956 2396 cmd.exe 86 PID 2396 wrote to memory of 1956 2396 cmd.exe 86 PID 2396 wrote to memory of 3168 2396 cmd.exe 91 PID 2396 wrote to memory of 3168 2396 cmd.exe 91 PID 2396 wrote to memory of 3272 2396 cmd.exe 92 PID 2396 wrote to memory of 3272 2396 cmd.exe 92 PID 3272 wrote to memory of 544 3272 cmd.exe 93 PID 3272 wrote to memory of 544 3272 cmd.exe 93 PID 2396 wrote to memory of 2700 2396 cmd.exe 94 PID 2396 wrote to memory of 2700 2396 cmd.exe 94 PID 2700 wrote to memory of 2316 2700 cmd.exe 95 PID 2700 wrote to memory of 2316 2700 cmd.exe 95 PID 2396 wrote to memory of 1696 2396 cmd.exe 96 PID 2396 wrote to memory of 1696 2396 cmd.exe 96 PID 1696 wrote to memory of 4924 1696 cmd.exe 97 PID 1696 wrote to memory of 4924 1696 cmd.exe 97 PID 2396 wrote to memory of 3196 2396 cmd.exe 98 PID 2396 wrote to memory of 3196 2396 cmd.exe 98 PID 3196 wrote to memory of 716 3196 cmd.exe 99 PID 3196 wrote to memory of 716 3196 cmd.exe 99 PID 2396 wrote to memory of 2788 2396 cmd.exe 100 PID 2396 wrote to memory of 2788 2396 cmd.exe 100 PID 2788 wrote to memory of 4256 2788 cmd.exe 101 PID 2788 wrote to memory of 4256 2788 cmd.exe 101 PID 2396 wrote to memory of 1500 2396 cmd.exe 102 PID 2396 wrote to memory of 1500 2396 cmd.exe 102 PID 1500 wrote to memory of 4300 1500 cmd.exe 103 PID 1500 wrote to memory of 4300 1500 cmd.exe 103 PID 2396 wrote to memory of 1004 2396 cmd.exe 104 PID 2396 wrote to memory of 1004 2396 cmd.exe 104 PID 2396 wrote to memory of 4476 2396 cmd.exe 105 PID 2396 wrote to memory of 4476 2396 cmd.exe 105 PID 4476 wrote to memory of 3400 4476 cmd.exe 106 PID 4476 wrote to memory of 3400 4476 cmd.exe 106 PID 2396 wrote to memory of 1576 2396 cmd.exe 107 PID 2396 wrote to memory of 1576 2396 cmd.exe 107 PID 2396 wrote to memory of 4044 2396 cmd.exe 111 PID 2396 wrote to memory of 4044 2396 cmd.exe 111 PID 4044 wrote to memory of 3976 4044 cmd.exe 112 PID 4044 wrote to memory of 3976 4044 cmd.exe 112 PID 2396 wrote to memory of 1720 2396 cmd.exe 113 PID 2396 wrote to memory of 1720 2396 cmd.exe 113
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Separate-Files-Version\Activators\Check-Activation-Status-vbs.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System32\net.exenet start sppsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start sppsvc /y3⤵PID:3888
-
-
-
C:\Windows\System32\cscript.execscript //nologo slmgr.vbs /dli2⤵PID:1956
-
-
C:\Windows\System32\cscript.execscript //nologo slmgr.vbs /xpr2⤵PID:3168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\16.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:2316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:4924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\14.0\Common\InstallRoot /v Path" 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\14.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:4256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\Common\InstallRoot /v Path" 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:4300
-
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath2⤵
- Modifies registry key
PID:1004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath" 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:3400
-
-
-
C:\Windows\System32\cscript.execscript //nologo "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus2⤵PID:1576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\ClickToRun /v InstallPath" 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:3976
-
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\14.0\CVH /f Click2run /k2⤵
- Modifies registry key
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD53903bcab32a4a853dfa54962112d4d02
SHA1ba6433fba48797cd43463441358004ac81b76a8b
SHA25695fc646d222d324db46f603a7f675c329fe59a567ed27fdaed2a572a19206816
SHA512db27b16ec8f8139c44c433d51350fbda6c8f8113e2e8178ff53298b4dace5ef93d65d7cc422f5a2d544d053471c36392da4acd2b7da8af38bb42344db70dbe0a