Edit tour

Windows Analysis Report
MAS_AIO.cmd

Overview

General Information

Sample Name:MAS_AIO.cmd
Analysis ID:1309496
MD5:0a292a0f55256127fe8bc9450b88e6ad
SHA1:c714f7d5732ed078effed3b8bb7d627677c8b8b4
SHA256:bf0ed9f1f396f4f23515c7ede67e5f415db11c53b6fdae9a0e10035030fb3418
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Passes commands via pipe to a shell (likely to bypass AV or HIPS)
Uses cmd line tools excessively to alter registry or file data
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
Queries the volume information (name, serial number etc) of a device
Uses reg.exe to modify the Windows registry

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 6468 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\MAS_AIO.cmd" " MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • conhost.exe (PID: 6476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • findstr.exe (PID: 6524 cmdline: findstr /rxc:".*" "MAS_AIO.cmd" MD5: BCC8F29B929DABF5489C9BE6587FF66D)
    • cmd.exe (PID: 6540 cmdline: C:\Windows\system32\cmd.exe /c ver MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • reg.exe (PID: 6560 cmdline: reg query "HKCU\Console" /v ForceV2 MD5: E3DACF0B31841FA02064B4457D44B357)
    • find.exe (PID: 6568 cmdline: find /i "0x0" MD5: 4B843EB20A160AC7E9217F9CD64DB6BA)
    • cmd.exe (PID: 6604 cmdline: C:\Windows\system32\cmd.exe /c echo prompt $E | cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • cmd.exe (PID: 6616 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E " MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • cmd.exe (PID: 6624 cmdline: cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • cmd.exe (PID: 6648 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" " MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • find.exe (PID: 6656 cmdline: find /i "C:\Users\user\AppData\Local\Temp" MD5: 4B843EB20A160AC7E9217F9CD64DB6BA)
    • fltMC.exe (PID: 6676 cmdline: fltmc MD5: 8F9F198191057C5E234DCD748D1CFC5B)
    • cmd.exe (PID: 6688 cmdline: C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • reg.exe (PID: 6700 cmdline: reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop MD5: E3DACF0B31841FA02064B4457D44B357)
    • mode.com (PID: 6716 cmdline: mode 76, 30 MD5: 1A3D2D975EB4A5AF22768F1E23C9A83C)
    • choice.exe (PID: 6736 cmdline: choice /C:12345670 /N MD5: EA29BC6BCB1EFCE9C9946C3602F3E754)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://eskonr.com/2012/01/how-to-fix-wmi-issues-automatically/
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://gist.github.com/ave9858/9fff6af726ba3ddc646285d1bbf37e71
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://github.com/Gamers-Against-Weed/Set-WindowsCbsEdition
Source: Null.2.drString found in binary or memory: https://github.com/abbodi1406/KMS_VL_ALL_AIO
Source: Null.2.drString found in binary or memory: https://massgrave.dev
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/command_line_switches.html
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/fix-wpa-registry.html
Source: Null.2.drString found in binary or memory: https://massgrave.dev/genuine-installation-media.html
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/hwid.html#Manual_Activation
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/kms38.html
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/kms38.html#Manual_Activation
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/licensing-servers-issue
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/oem-folder
Source: Null.2.drString found in binary or memory: https://massgrave.dev/troubleshoot
Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/troubleshoot.html
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Console" /v ForceV2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6476:120:WilError_01
Source: C:\Windows\System32\reg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: mal48.evad.winCMD@30/2@0/0
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\MAS_AIO.cmd" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /rxc:".*" "MAS_AIO.cmd"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ver
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Console" /v ForceV2
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "0x0"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fltMC.exe fltmc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 76, 30
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C:12345670 /N
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /rxc:".*" "MAS_AIO.cmd"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c verJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Console" /v ForceV2 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "0x0" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmdJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "C:\Users\user\AppData\Local\Temp" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fltMC.exe fltmc Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v DesktopJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 76, 30Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C:12345670 /NJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v DesktopJump to behavior

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmdJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /rxc:".*" "MAS_AIO.cmd"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c verJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Console" /v ForceV2 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "0x0" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmdJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "C:\Users\user\AppData\Local\Temp" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fltMC.exe fltmc Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v DesktopJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 76, 30Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C:12345670 /NJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v DesktopJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Command and Scripting Interpreter
Path Interception11
Process Injection
1
Disable or Modify Tools
OS Credential Dumping11
System Information Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Modify Registry
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1309496 Sample: MAS_AIO.cmd Startdate: 16/09/2023 Architecture: WINDOWS Score: 48 6 cmd.exe 1 2->6         started        signatures3 24 Uses cmd line tools excessively to alter registry or file data 6->24 26 Passes commands via pipe to a shell (likely to bypass AV or HIPS) 6->26 9 cmd.exe 1 6->9         started        12 cmd.exe 1 6->12         started        14 conhost.exe 6->14         started        16 9 other processes 6->16 process4 signatures5 28 Uses cmd line tools excessively to alter registry or file data 9->28 18 reg.exe 1 9->18         started        20 cmd.exe 1 12->20         started        22 cmd.exe 1 12->22         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
MAS_AIO.cmd0%ReversingLabs
MAS_AIO.cmd2%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://massgrave.dev0%Avira URL Cloudsafe
https://massgrave.dev/kms38.html#Manual_Activation0%Avira URL Cloudsafe
https://massgrave.dev/kms38.html0%Avira URL Cloudsafe
https://massgrave.dev/troubleshoot.html0%Avira URL Cloudsafe
https://massgrave.dev/command_line_switches.html0%Avira URL Cloudsafe
https://massgrave.dev/kms38.html#Manual_Activation1%VirustotalBrowse
https://massgrave.dev/genuine-installation-media.html0%Avira URL Cloudsafe
https://massgrave.dev/fix-wpa-registry.html0%Avira URL Cloudsafe
https://massgrave.dev/hwid.html#Manual_Activation0%Avira URL Cloudsafe
https://massgrave.dev/licensing-servers-issue0%Avira URL Cloudsafe
https://massgrave.dev/kms38.html1%VirustotalBrowse
https://massgrave.dev/genuine-installation-media.html0%VirustotalBrowse
https://massgrave.dev/oem-folder0%Avira URL Cloudsafe
https://massgrave.dev/command_line_switches.html0%VirustotalBrowse
https://massgrave.dev/troubleshoot0%Avira URL Cloudsafe
https://massgrave.dev/hwid.html#Manual_Activation1%VirustotalBrowse
https://massgrave.dev0%VirustotalBrowse
https://massgrave.dev/troubleshoot.html0%VirustotalBrowse
https://massgrave.dev/oem-folder0%VirustotalBrowse
https://massgrave.dev/licensing-servers-issue1%VirustotalBrowse
https://massgrave.dev/troubleshoot0%VirustotalBrowse
https://massgrave.dev/fix-wpa-registry.html0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/abbodi1406/KMS_VL_ALL_AIONull.2.drfalse
    high
    https://gist.github.com/ave9858/9fff6af726ba3ddc646285d1bbf37e71MAS_AIO.cmd, Null.2.drfalse
      high
      https://massgrave.dev/kms38.htmlMAS_AIO.cmd, Null.2.drfalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://massgrave.dev/command_line_switches.htmlMAS_AIO.cmd, Null.2.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://massgrave.dev/troubleshoot.htmlMAS_AIO.cmd, Null.2.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://massgrave.dev/kms38.html#Manual_ActivationMAS_AIO.cmd, Null.2.drfalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://github.com/Gamers-Against-Weed/Set-WindowsCbsEditionMAS_AIO.cmd, Null.2.drfalse
        high
        https://massgrave.devNull.2.drfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://massgrave.dev/genuine-installation-media.htmlNull.2.drfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://massgrave.dev/fix-wpa-registry.htmlMAS_AIO.cmd, Null.2.drfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://massgrave.dev/hwid.html#Manual_ActivationMAS_AIO.cmd, Null.2.drfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://massgrave.dev/licensing-servers-issueMAS_AIO.cmd, Null.2.drfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://eskonr.com/2012/01/how-to-fix-wmi-issues-automatically/MAS_AIO.cmd, Null.2.drfalse
          high
          https://massgrave.dev/oem-folderMAS_AIO.cmd, Null.2.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://massgrave.dev/troubleshootNull.2.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          No contacted IP infos
          Joe Sandbox Version:38.0.0 Beryl
          Analysis ID:1309496
          Start date and time:2023-09-16 21:30:52 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 4m 33s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:31
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:MAS_AIO.cmd
          Detection:MAL
          Classification:mal48.evad.winCMD@30/2@0/0
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .cmd
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): tse1.mm.bing.net, arc.msn.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          No simulations
          Process:C:\Windows\System32\fltMC.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):798
          Entropy (8bit):2.4084629661478183
          Encrypted:false
          SSDEEP:6:w0/2IOqZ7Q11aCVCACSFEYNMWzveSGaCMm8zMhjTN8IM82/08yYN3QGNQEn:wbI9ZwRcjitjNGpnm6XNR3m2YNgE
          MD5:E2A77496987140ED0715F6B80F99714B
          SHA1:E7476994C8230D6D1359A0B809769AD960A78629
          SHA-256:635A015532664D23794F57E0DEC06D8469D74D3D9D2B210DA3EF3717AF5BEB87
          SHA-512:E23C044ED1E14C90C39E086AFB0992E2AD828E216146BF4CC020564EAA62EC77BD695B043E0170CA2912B9E59FAC29FF56709D1AB5904A1107FE1393E4C90583
          Malicious:false
          Reputation:low
          Preview:..Filter Name Num Instances Altitude Frame..------------------------------ ------------- ------------ -----..VnXuSre 6 387500 0..Filetrace 4 385000 0..storqosflt 0 244000 0..wcifs 1 189900 0..CldFlt 0 180451 0..FileCrypt 0 141100 0..luafv 1 135000 0..npsvctrig 1 46000 0..Wof 2 40700 0..FileInfo 4 40500 0..
          File type:ASCII text, with very long lines (491), with CRLF line terminators
          Entropy (8bit):5.620239461523763
          TrID:
          • BibTeX references (5501/1) 100.00%
          File name:MAS_AIO.cmd
          File size:346'356 bytes
          MD5:0a292a0f55256127fe8bc9450b88e6ad
          SHA1:c714f7d5732ed078effed3b8bb7d627677c8b8b4
          SHA256:bf0ed9f1f396f4f23515c7ede67e5f415db11c53b6fdae9a0e10035030fb3418
          SHA512:1bfafb522a2814b106610a4b04b926df69aa71ccf2df7abe7546632d648f8338a2184dc9919924e77487cf3a145addff8c3f11441d77a3414b5af7afac0e66d3
          SSDEEP:3072:E3BTxa/P13savRbguAMTVFp6zGDNSOE2K5LxMt7EOGJGiA7GU:E9xaVfbgu9p6zGDNSoKhxMF7D
          TLSH:3B740843350250A502F33376DA27954FBB2DC193C321E6ACB57EC554BBAA38772F5A88
          File Content Preview:@setlocal DisableDelayedExpansion..@echo off....:: For command line switches, check https://massgrave.dev/command_line_switches.html..:: If you want to better understand script, read from MAS separate files version. ....::===============================
          Icon Hash:9686878b929a9886
          No network behavior found
          Target ID:0
          Start time:21:31:51
          Start date:16/09/2023
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\MAS_AIO.cmd" "
          Imagebase:0x7ff748b70000
          File size:273'920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:1
          Start time:21:31:51
          Start date:16/09/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff766460000
          File size:625'664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:21:31:52
          Start date:16/09/2023
          Path:C:\Windows\System32\findstr.exe
          Wow64 process (32bit):false
          Commandline:findstr /rxc:".*" "MAS_AIO.cmd"
          Imagebase:0x7ff69a7e0000
          File size:34'304 bytes
          MD5 hash:BCC8F29B929DABF5489C9BE6587FF66D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:3
          Start time:21:31:52
          Start date:16/09/2023
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\cmd.exe /c ver
          Imagebase:0x7ff748b70000
          File size:273'920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:4
          Start time:21:31:52
          Start date:16/09/2023
          Path:C:\Windows\System32\reg.exe
          Wow64 process (32bit):false
          Commandline:reg query "HKCU\Console" /v ForceV2
          Imagebase:0x7ff7d5ff0000
          File size:72'704 bytes
          MD5 hash:E3DACF0B31841FA02064B4457D44B357
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:5
          Start time:21:31:52
          Start date:16/09/2023
          Path:C:\Windows\System32\find.exe
          Wow64 process (32bit):false
          Commandline:find /i "0x0"
          Imagebase:0x7ff634680000
          File size:17'408 bytes
          MD5 hash:4B843EB20A160AC7E9217F9CD64DB6BA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:6
          Start time:21:31:53
          Start date:16/09/2023
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
          Imagebase:0x7ff748b70000
          File size:273'920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:7
          Start time:21:31:53
          Start date:16/09/2023
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "
          Imagebase:0x7ff748b70000
          File size:273'920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:8
          Start time:21:31:53
          Start date:16/09/2023
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:cmd
          Imagebase:0x7ff748b70000
          File size:273'920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:9
          Start time:21:31:53
          Start date:16/09/2023
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" "
          Imagebase:0x7ff748b70000
          File size:273'920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:10
          Start time:21:31:53
          Start date:16/09/2023
          Path:C:\Windows\System32\find.exe
          Wow64 process (32bit):false
          Commandline:find /i "C:\Users\user\AppData\Local\Temp"
          Imagebase:0x7ff634680000
          File size:17'408 bytes
          MD5 hash:4B843EB20A160AC7E9217F9CD64DB6BA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:11
          Start time:21:31:54
          Start date:16/09/2023
          Path:C:\Windows\System32\fltMC.exe
          Wow64 process (32bit):false
          Commandline:fltmc
          Imagebase:0x7ff74ce80000
          File size:30'208 bytes
          MD5 hash:8F9F198191057C5E234DCD748D1CFC5B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:12
          Start time:21:31:54
          Start date:16/09/2023
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop
          Imagebase:0x7ff748b70000
          File size:273'920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:13
          Start time:21:31:54
          Start date:16/09/2023
          Path:C:\Windows\System32\reg.exe
          Wow64 process (32bit):false
          Commandline:reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop
          Imagebase:0x7ff7d5ff0000
          File size:72'704 bytes
          MD5 hash:E3DACF0B31841FA02064B4457D44B357
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:14
          Start time:21:31:54
          Start date:16/09/2023
          Path:C:\Windows\System32\mode.com
          Wow64 process (32bit):false
          Commandline:mode 76, 30
          Imagebase:0x7ff68ea00000
          File size:31'232 bytes
          MD5 hash:1A3D2D975EB4A5AF22768F1E23C9A83C
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:15
          Start time:21:31:55
          Start date:16/09/2023
          Path:C:\Windows\System32\choice.exe
          Wow64 process (32bit):false
          Commandline:choice /C:12345670 /N
          Imagebase:0x7ff690bf0000
          File size:33'280 bytes
          MD5 hash:EA29BC6BCB1EFCE9C9946C3602F3E754
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          No disassembly