Overview
overview
8Static
static
3Microsoft-...IO.cmd
windows7-x64
4Microsoft-...IO.cmd
windows10-2004-x64
4Microsoft-...on.cmd
windows7-x64
4Microsoft-...on.cmd
windows10-2004-x64
4Microsoft-...on.cmd
windows7-x64
4Microsoft-...on.cmd
windows10-2004-x64
4Microsoft-...o.html
windows7-x64
3Microsoft-...o.html
windows10-2004-x64
3Microsoft-...32.dll
windows7-x64
3Microsoft-...32.dll
windows10-2004-x64
3Microsoft-...64.dll
windows7-x64
1Microsoft-...64.dll
windows10-2004-x64
1Microsoft-...on.cmd
windows7-x64
4Microsoft-...on.cmd
windows10-2004-x64
4Microsoft-...on.cmd
windows7-x64
4Microsoft-...on.cmd
windows10-2004-x64
4Microsoft-...on.cmd
windows7-x64
4Microsoft-...on.cmd
windows10-2004-x64
4Microsoft-...bs.cmd
windows7-x64
1Microsoft-...bs.cmd
windows10-2004-x64
8Microsoft-...mi.cmd
windows7-x64
4Microsoft-...mi.cmd
windows10-2004-x64
4Microsoft-...er.cmd
windows7-x64
4Microsoft-...er.cmd
windows10-2004-x64
4Microsoft-...ot.cmd
windows7-x64
4Microsoft-...ot.cmd
windows10-2004-x64
4Microsoft-...e.html
windows7-x64
3Microsoft-...e.html
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft-Activation-Scripts-2.1/MAS/All-In-One-Version/MAS_AIO.cmd
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Microsoft-Activation-Scripts-2.1/MAS/All-In-One-Version/MAS_AIO.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/HWID_Activation.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/HWID_Activation.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Ohook_Activation/BIN/Info.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Ohook_Activation/BIN/Info.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Ohook_Activation/BIN/sppc32.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Ohook_Activation/BIN/sppc32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Ohook_Activation/BIN/sppc64.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Ohook_Activation/BIN/sppc64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Ohook_Activation/Ohook_Activation.cmd
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Ohook_Activation/Ohook_Activation.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Online_KMS_Activation.cmd
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/Online_KMS_Activation.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Change_Edition.cmd
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Change_Edition.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Check-Activation-Status-vbs.cmd
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Check-Activation-Status-vbs.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Check-Activation-Status-wmi.cmd
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Check-Activation-Status-wmi.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Extract_OEM_Folder.cmd
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Extract_OEM_Folder.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Troubleshoot.cmd
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Troubleshoot.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/_ReadMe.html
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/_ReadMe.html
Resource
win10v2004-20240802-en
General
-
Target
Microsoft-Activation-Scripts-2.1/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
-
Size
54KB
-
MD5
c7dd86ca65b29d803226e7f2015dfb33
-
SHA1
b36327ca594af82d4556e79f534ef02c8c2a43f4
-
SHA256
d34d99de310658b4c6421362bc76e1a90e51e85ea74e186fd5b2e731e1d44536
-
SHA512
82f4012a0f759d8cdd2ea6463bfdde97ecbd159e0ea09d94e440109f50111dbee4dce6bfc87f6061a7d75f1fd7b7a10d42be76b0ec3fdf9084bedc5007959b93
-
SSDEEP
1536:xD83yqy0xDKGo6nNm85Yu341Em0Iy+lVTt3rA6s:xY3s/15jvg
Malware Config
Signatures
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2904 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2984 powershell.exe 2788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2984 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2904 2112 cmd.exe 31 PID 2112 wrote to memory of 2904 2112 cmd.exe 31 PID 2112 wrote to memory of 2904 2112 cmd.exe 31 PID 2112 wrote to memory of 2912 2112 cmd.exe 32 PID 2112 wrote to memory of 2912 2112 cmd.exe 32 PID 2112 wrote to memory of 2912 2112 cmd.exe 32 PID 2112 wrote to memory of 2972 2112 cmd.exe 33 PID 2112 wrote to memory of 2972 2112 cmd.exe 33 PID 2112 wrote to memory of 2972 2112 cmd.exe 33 PID 2112 wrote to memory of 2988 2112 cmd.exe 34 PID 2112 wrote to memory of 2988 2112 cmd.exe 34 PID 2112 wrote to memory of 2988 2112 cmd.exe 34 PID 2112 wrote to memory of 2984 2112 cmd.exe 35 PID 2112 wrote to memory of 2984 2112 cmd.exe 35 PID 2112 wrote to memory of 2984 2112 cmd.exe 35 PID 2112 wrote to memory of 2788 2112 cmd.exe 36 PID 2112 wrote to memory of 2788 2112 cmd.exe 36 PID 2112 wrote to memory of 2788 2112 cmd.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Microsoft-Activation-Scripts-2.1\MAS\Separate-Files-Version\Activators\KMS38_Activation.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\System32\sc.exesc query Null2⤵
- Launches sc.exe
PID:2904
-
-
C:\Windows\System32\find.exefind /i "RUNNING"2⤵PID:2912
-
-
C:\Windows\System32\findstr.exefindstr /v "$" "KMS38_Activation.cmd"2⤵PID:2972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:2988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe write-host -back '"Red"' -fore '"white"' '"==== ERROR ===="'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe write-host -back '"Black"' -fore '"Yellow"' '"Press any key to Exit..."'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ebda177c59442bcff0a13cc957a84a1c
SHA1b39f3ec43af9543e6b893deef66f06c16bbe850c
SHA256f6ea8eba177dba36a10be8ab19bf75d57339989ad49439831d82a9d97ac32828
SHA51246a9fc403ef6ad139b0c6f00c23d9cba03863904d9da4fee97363888c875ae6eac57cf49c5ad874a92b12501338602154f2547a668627dfc1298ab7f96262ae4