Windows
Analysis Report
MAS_AIO.cmd
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
cmd.exe (PID: 6084 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\MAS_A IO.cmd" " MD5: 4E2ACF4F8A396486AB4268C94A6A245F) conhost.exe (PID: 5764 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) findstr.exe (PID: 5660 cmdline:
findstr /r xc:".*" "M AS_AIO.cmd " MD5: BCC8F29B929DABF5489C9BE6587FF66D) cmd.exe (PID: 2612 cmdline:
C:\Windows \system32\ cmd.exe /c ver MD5: 4E2ACF4F8A396486AB4268C94A6A245F) reg.exe (PID: 1504 cmdline:
reg query "HKCU\Cons ole" /v Fo rceV2 MD5: E3DACF0B31841FA02064B4457D44B357) find.exe (PID: 1452 cmdline:
find /i "0 x0" MD5: 4B843EB20A160AC7E9217F9CD64DB6BA) cmd.exe (PID: 5164 cmdline:
C:\Windows \system32\ cmd.exe /c echo prom pt $E | cm d MD5: 4E2ACF4F8A396486AB4268C94A6A245F) cmd.exe (PID: 5176 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho prompt $E " MD5: 4E2ACF4F8A396486AB4268C94A6A245F) cmd.exe (PID: 5140 cmdline:
cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F) cmd.exe (PID: 2812 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho "C:\Use rs\user\De sktop\MAS_ AIO.cmd" " MD5: 4E2ACF4F8A396486AB4268C94A6A245F) find.exe (PID: 4592 cmdline:
find /i "C :\Users\us er\AppData \Local\Tem p" MD5: 4B843EB20A160AC7E9217F9CD64DB6BA) reg.exe (PID: 6096 cmdline:
reg query HKU\S-1-5- 19 MD5: E3DACF0B31841FA02064B4457D44B357) cmd.exe (PID: 976 cmdline:
C:\Windows \system32\ cmd.exe /c reg query "HKCU\Sof tware\Micr osoft\Wind ows\Curren tVersion\E xplorer\Us er Shell F olders" /v Desktop MD5: 4E2ACF4F8A396486AB4268C94A6A245F) reg.exe (PID: 4780 cmdline:
reg query "HKCU\Soft ware\Micro soft\Windo ws\Current Version\Ex plorer\Use r Shell Fo lders" /v Desktop MD5: E3DACF0B31841FA02064B4457D44B357) mode.com (PID: 3896 cmdline:
mode 76, 3 0 MD5: 1A3D2D975EB4A5AF22768F1E23C9A83C) choice.exe (PID: 3496 cmdline:
choice /C: 12345678 / N MD5: EA29BC6BCB1EFCE9C9946C3602F3E754)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDedcodeAndExecute | Yara detected Powershell dedcode and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDedcodeAndExecute | Yara detected Powershell dedcode and execute | Joe Security |
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Mutant created: |
Source: | Window detected: |
Persistence and Installation Behavior |
---|
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Command and Scripting Interpreter | Path Interception | 11 Process Injection | 1 Disable or Modify Tools | OS Credential Dumping | 11 System Information Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Modify Registry | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
2% | Virustotal | Browse | ||
0% | Metadefender | Browse | ||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox Version: | 35.0.0 Citrine |
Analysis ID: | 677007 |
Start date and time: 02/08/202200:26:34 | 2022-08-02 00:26:34 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 17s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | MAS_AIO.cmd |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 41 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.evad.winCMD@30/2@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, B ackgroundTransferHost.exe, bac kgroundTaskHost.exe, SgrmBroke r.exe, conhost.exe, WmiPrvSE.e xe, svchost.exe, wuapihost.exe - Excluded domains from analysis
(whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs .microsoft.com, store-images.s -microsoft.com, login.live.com , sls.update.microsoft.com, ct ldl.windowsupdate.com, display catalog.mp.microsoft.com, img- prod-cms-rt-microsoft-com.akam aized.net, arc.msn.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Process: | C:\Windows\System32\reg.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 281 |
Entropy (8bit): | 4.699912536640889 |
Encrypted: | false |
SSDEEP: | 3:+v8bH5IU6UcqWuRBkH5IU6UcJE5H5IU6UctS1op8bH5IU6Ucnde+vkH5IU6UcZfl:rbtWUkWe+SiSbsdFc+pk5RUpkI9+6 |
MD5: | 3561DC0B7AD3265A3AAD06F44FE9F3C8 |
SHA1: | 003022B9F13F4E9CF54DC6105C170086AA970A01 |
SHA-256: | 598E92B6694442828776DD0562DCE7121413A19F1647904CA1EA72D5F85D4C9F |
SHA-512: | 67CCCB782706DBCB78F25957882792EB5ECF78E0BE834F719772A7F5625FC75335745A5171D4641B99A4C99427A04862D9AF6EBB16944673016CF41FA26AB804 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.218800697441973 |
TrID: |
|
File name: | MAS_AIO.cmd |
File size: | 582147 |
MD5: | 1a3c418a19dec8b84aaf0201e0eaeaca |
SHA1: | 05073108beec6f35374cbdde14dba327011889b6 |
SHA256: | 8e94eefe902028aabf791aeacd0f021c08b8298f1fc845fbbebe460f66a8d4cb |
SHA512: | 6fafa36c2092ed11a65cb38ab64e6c6aa6c3cd9e91b3685cd666a77b301f088ba1fabe1e7e8501d8033e173786d471913fff2a6abee905cb154a5aa1dd3f0047 |
SSDEEP: | 6144:qd94QImQ+5/T5ntq3kX1vT6lDrGtSNFX/QG+D93KW/bgu1p+fzGnFSQiQBriM4c:qT4y5TDq4sDqKXl+Z7/bnpPiquM4c |
TLSH: | 89C47C42720260A601F33376D623914FBB1EC393C325E6ACB57EC1D47B9A78766F5688 |
File Content Preview: | @setlocal DisableDelayedExpansion..@echo off........::============================================================================..::..:: This script is a part of 'Microsoft Activation Scripts' (MAS) project...::..:: Homepage: massgrave.dev..:: |
Icon Hash: | 988686829e9ae600 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 00:27:34 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fa130000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 1 |
Start time: | 00:27:34 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c9170000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 2 |
Start time: | 00:27:35 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\findstr.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66ec70000 |
File size: | 34304 bytes |
MD5 hash: | BCC8F29B929DABF5489C9BE6587FF66D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Target ID: | 3 |
Start time: | 00:27:36 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fa130000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 4 |
Start time: | 00:27:36 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\reg.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff68e250000 |
File size: | 72704 bytes |
MD5 hash: | E3DACF0B31841FA02064B4457D44B357 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 5 |
Start time: | 00:27:37 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\find.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff653a00000 |
File size: | 17408 bytes |
MD5 hash: | 4B843EB20A160AC7E9217F9CD64DB6BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Target ID: | 6 |
Start time: | 00:27:40 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fa130000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 7 |
Start time: | 00:27:40 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fa130000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 8 |
Start time: | 00:27:41 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fa130000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 9 |
Start time: | 00:27:41 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fa130000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 10 |
Start time: | 00:27:42 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\find.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff653a00000 |
File size: | 17408 bytes |
MD5 hash: | 4B843EB20A160AC7E9217F9CD64DB6BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Target ID: | 12 |
Start time: | 00:27:42 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\reg.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff68e250000 |
File size: | 72704 bytes |
MD5 hash: | E3DACF0B31841FA02064B4457D44B357 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Target ID: | 13 |
Start time: | 00:27:43 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fa130000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Target ID: | 14 |
Start time: | 00:27:43 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\reg.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff68e250000 |
File size: | 72704 bytes |
MD5 hash: | E3DACF0B31841FA02064B4457D44B357 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Target ID: | 16 |
Start time: | 00:27:44 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\mode.com |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7bb220000 |
File size: | 31232 bytes |
MD5 hash: | 1A3D2D975EB4A5AF22768F1E23C9A83C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Target ID: | 17 |
Start time: | 00:27:48 |
Start date: | 02/08/2022 |
Path: | C:\Windows\System32\choice.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff704630000 |
File size: | 33280 bytes |
MD5 hash: | EA29BC6BCB1EFCE9C9946C3602F3E754 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |