General
-
Target
Windows_Activator_Tool.bat
-
Size
435KB
-
Sample
240503-jst7vacd23
-
MD5
153799a818cb95fd5803fead4fbe3e7a
-
SHA1
20c374986e4050265de2914c3993f6b22d6de460
-
SHA256
835b99cbe7d16b1020a2b0fd94c356742528e94d66d445401b7057524c86ba3e
-
SHA512
88af58dad86dd07be1f9fdbf6854f05579f2093360da939f52e8fd4c25f7cbbcdef0f1fe95bcedce00e0c88bf6c0a069f44cdb7be4f0b469ea2722d80e7eaa8c
-
SSDEEP
3072:/xdR3S9mud2TrRMP0u+RciNiYbRd8nVFR3mP5sLtV7bJuAMTVFp6zGDNSCE2K0Y5:xbBHu+R7rLo97bJu9p6zGDNS0KROuCC
Static task
static1
Behavioral task
behavioral1
Sample
Windows_Activator_Tool.bat
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Windows_Activator_Tool.bat
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
Windows_Activator_Tool.bat
-
Size
435KB
-
MD5
153799a818cb95fd5803fead4fbe3e7a
-
SHA1
20c374986e4050265de2914c3993f6b22d6de460
-
SHA256
835b99cbe7d16b1020a2b0fd94c356742528e94d66d445401b7057524c86ba3e
-
SHA512
88af58dad86dd07be1f9fdbf6854f05579f2093360da939f52e8fd4c25f7cbbcdef0f1fe95bcedce00e0c88bf6c0a069f44cdb7be4f0b469ea2722d80e7eaa8c
-
SSDEEP
3072:/xdR3S9mud2TrRMP0u+RciNiYbRd8nVFR3mP5sLtV7bJuAMTVFp6zGDNSCE2K0Y5:xbBHu+R7rLo97bJu9p6zGDNS0KROuCC
Score8/10-
Creates new service(s)
-
Downloads MZ/PE file
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Registers COM server for autorun
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Scripting
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1