Create Interactive Tour

Windows Analysis Report
MAS_AIO.cmd

Overview

General Information

Sample Name:MAS_AIO.cmd
Analysis ID:677007
MD5:1a3c418a19dec8b84aaf0201e0eaeaca
SHA1:05073108beec6f35374cbdde14dba327011889b6
SHA256:8e94eefe902028aabf791aeacd0f021c08b8298f1fc845fbbebe460f66a8d4cb
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Powershell dedcode and execute
Passes commands via pipe to a shell (likely to bypass AV or HIPS)
Uses cmd line tools excessively to alter registry or file data
Queries the volume information (name, serial number etc) of a device
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
Uses reg.exe to modify the Windows registry

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 6084 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\MAS_AIO.cmd" " MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • conhost.exe (PID: 5764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • findstr.exe (PID: 5660 cmdline: findstr /rxc:".*" "MAS_AIO.cmd" MD5: BCC8F29B929DABF5489C9BE6587FF66D)
    • cmd.exe (PID: 2612 cmdline: C:\Windows\system32\cmd.exe /c ver MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • reg.exe (PID: 1504 cmdline: reg query "HKCU\Console" /v ForceV2 MD5: E3DACF0B31841FA02064B4457D44B357)
    • find.exe (PID: 1452 cmdline: find /i "0x0" MD5: 4B843EB20A160AC7E9217F9CD64DB6BA)
    • cmd.exe (PID: 5164 cmdline: C:\Windows\system32\cmd.exe /c echo prompt $E | cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • cmd.exe (PID: 5176 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E " MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • cmd.exe (PID: 5140 cmdline: cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • cmd.exe (PID: 2812 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" " MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • find.exe (PID: 4592 cmdline: find /i "C:\Users\user\AppData\Local\Temp" MD5: 4B843EB20A160AC7E9217F9CD64DB6BA)
    • reg.exe (PID: 6096 cmdline: reg query HKU\S-1-5-19 MD5: E3DACF0B31841FA02064B4457D44B357)
    • cmd.exe (PID: 976 cmdline: C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • reg.exe (PID: 4780 cmdline: reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop MD5: E3DACF0B31841FA02064B4457D44B357)
    • mode.com (PID: 3896 cmdline: mode 76, 30 MD5: 1A3D2D975EB4A5AF22768F1E23C9A83C)
    • choice.exe (PID: 3496 cmdline: choice /C:12345678 /N MD5: EA29BC6BCB1EFCE9C9946C3602F3E754)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
MAS_AIO.cmdJoeSecurity_PowershellDedcodeAndExecuteYara detected Powershell dedcode and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    dropped/NullJoeSecurity_PowershellDedcodeAndExecuteYara detected Powershell dedcode and executeJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev
      Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/
      Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/office-license-is-not-genuine
      Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/troubleshoot.html
      Source: MAS_AIO.cmd, Null.2.drString found in binary or memory: https://massgrave.dev/unreadable-codes-in-mas-aio.html
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Console" /v ForceV2
      Source: C:\Windows\System32\reg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: classification engineClassification label: mal56.evad.winCMD@30/2@0/0
      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\MAS_AIO.cmd" "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /rxc:".*" "MAS_AIO.cmd"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ver
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Console" /v ForceV2
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "0x0"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "C:\Users\user\AppData\Local\Temp"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query HKU\S-1-5-19
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 76, 30
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C:12345678 /N
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /rxc:".*" "MAS_AIO.cmd"Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c verJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Console" /v ForceV2 Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "0x0" Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmdJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "C:\Users\user\AppData\Local\Temp" Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query HKU\S-1-5-19 Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v DesktopJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 76, 30Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C:12345678 /NJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v DesktopJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5764:120:WilError_01
      Source: Window RecorderWindow detected: More than 3 window changes detected

      Persistence and Installation Behavior

      barindex
      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
      Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Yara matchFile source: MAS_AIO.cmd, type: SAMPLE
      Source: Yara matchFile source: dropped/Null, type: DROPPED
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmdJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /rxc:".*" "MAS_AIO.cmd"Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c verJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Console" /v ForceV2 Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "0x0" Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c echo prompt $E | cmdJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "C:\Users\user\AppData\Local\Temp" Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query HKU\S-1-5-19 Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v DesktopJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 76, 30Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C:12345678 /NJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v DesktopJump to behavior
      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Command and Scripting Interpreter
      Path Interception11
      Process Injection
      1
      Disable or Modify Tools
      OS Credential Dumping11
      System Information Discovery
      Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Modify Registry
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
      Process Injection
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 677007 Sample: MAS_AIO.cmd Startdate: 02/08/2022 Architecture: WINDOWS Score: 56 25 Yara detected Powershell dedcode and execute 2->25 7 cmd.exe 1 2->7         started        process3 signatures4 27 Uses cmd line tools excessively to alter registry or file data 7->27 29 Passes commands via pipe to a shell (likely to bypass AV or HIPS) 7->29 10 cmd.exe 1 7->10         started        13 cmd.exe 1 7->13         started        15 conhost.exe 7->15         started        17 9 other processes 7->17 process5 signatures6 31 Uses cmd line tools excessively to alter registry or file data 10->31 19 reg.exe 1 10->19         started        21 cmd.exe 1 13->21         started        23 cmd.exe 1 13->23         started        process7

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      MAS_AIO.cmd2%VirustotalBrowse
      MAS_AIO.cmd0%MetadefenderBrowse
      MAS_AIO.cmd0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://massgrave.dev0%VirustotalBrowse
      https://massgrave.dev0%Avira URL Cloudsafe
      https://massgrave.dev/office-license-is-not-genuine0%VirustotalBrowse
      https://massgrave.dev/office-license-is-not-genuine0%Avira URL Cloudsafe
      https://massgrave.dev/unreadable-codes-in-mas-aio.html0%Avira URL Cloudsafe
      https://massgrave.dev/0%VirustotalBrowse
      https://massgrave.dev/0%Avira URL Cloudsafe
      https://massgrave.dev/troubleshoot.html0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://massgrave.devMAS_AIO.cmd, Null.2.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://massgrave.dev/office-license-is-not-genuineMAS_AIO.cmd, Null.2.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://massgrave.dev/unreadable-codes-in-mas-aio.htmlMAS_AIO.cmd, Null.2.drfalse
      • Avira URL Cloud: safe
      unknown
      https://massgrave.dev/MAS_AIO.cmd, Null.2.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://massgrave.dev/troubleshoot.htmlMAS_AIO.cmd, Null.2.drfalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox Version:35.0.0 Citrine
      Analysis ID:677007
      Start date and time: 02/08/202200:26:342022-08-02 00:26:34 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 17s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:MAS_AIO.cmd
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:41
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal56.evad.winCMD@30/2@0/0
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .cmd
      • Adjust boot time
      • Enable AMSI
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\System32\reg.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):281
      Entropy (8bit):4.699912536640889
      Encrypted:false
      SSDEEP:3:+v8bH5IU6UcqWuRBkH5IU6UcJE5H5IU6UctS1op8bH5IU6Ucnde+vkH5IU6UcZfl:rbtWUkWe+SiSbsdFc+pk5RUpkI9+6
      MD5:3561DC0B7AD3265A3AAD06F44FE9F3C8
      SHA1:003022B9F13F4E9CF54DC6105C170086AA970A01
      SHA-256:598E92B6694442828776DD0562DCE7121413A19F1647904CA1EA72D5F85D4C9F
      SHA-512:67CCCB782706DBCB78F25957882792EB5ECF78E0BE834F719772A7F5625FC75335745A5171D4641B99A4C99427A04862D9AF6EBB16944673016CF41FA26AB804
      Malicious:false
      Preview:..HKEY_USERS\S-1-5-19\AppEvents..HKEY_USERS\S-1-5-19\Console..HKEY_USERS\S-1-5-19\Control Panel..HKEY_USERS\S-1-5-19\Environment..HKEY_USERS\S-1-5-19\EUDC..HKEY_USERS\S-1-5-19\Keyboard Layout..HKEY_USERS\S-1-5-19\Printers..HKEY_USERS\S-1-5-19\Software..HKEY_USERS\S-1-5-19\System..
      File type:ASCII text, with very long lines, with CRLF line terminators
      Entropy (8bit):6.218800697441973
      TrID:
      • BibTeX references (5501/1) 100.00%
      File name:MAS_AIO.cmd
      File size:582147
      MD5:1a3c418a19dec8b84aaf0201e0eaeaca
      SHA1:05073108beec6f35374cbdde14dba327011889b6
      SHA256:8e94eefe902028aabf791aeacd0f021c08b8298f1fc845fbbebe460f66a8d4cb
      SHA512:6fafa36c2092ed11a65cb38ab64e6c6aa6c3cd9e91b3685cd666a77b301f088ba1fabe1e7e8501d8033e173786d471913fff2a6abee905cb154a5aa1dd3f0047
      SSDEEP:6144:qd94QImQ+5/T5ntq3kX1vT6lDrGtSNFX/QG+D93KW/bgu1p+fzGnFSQiQBriM4c:qT4y5TDq4sDqKXl+Z7/bnpPiquM4c
      TLSH:89C47C42720260A601F33376D623914FBB1EC393C325E6ACB57EC1D47B9A78766F5688
      File Content Preview:@setlocal DisableDelayedExpansion..@echo off........::============================================================================..::..:: This script is a part of 'Microsoft Activation Scripts' (MAS) project...::..:: Homepage: massgrave.dev..::
      Icon Hash:988686829e9ae600
      No network behavior found
      Target ID:0
      Start time:00:27:34
      Start date:02/08/2022
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\MAS_AIO.cmd" "
      Imagebase:0x7ff6fa130000
      File size:273920 bytes
      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:1
      Start time:00:27:34
      Start date:02/08/2022
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7c9170000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:2
      Start time:00:27:35
      Start date:02/08/2022
      Path:C:\Windows\System32\findstr.exe
      Wow64 process (32bit):false
      Commandline:findstr /rxc:".*" "MAS_AIO.cmd"
      Imagebase:0x7ff66ec70000
      File size:34304 bytes
      MD5 hash:BCC8F29B929DABF5489C9BE6587FF66D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate

      Target ID:3
      Start time:00:27:36
      Start date:02/08/2022
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c ver
      Imagebase:0x7ff6fa130000
      File size:273920 bytes
      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:4
      Start time:00:27:36
      Start date:02/08/2022
      Path:C:\Windows\System32\reg.exe
      Wow64 process (32bit):false
      Commandline:reg query "HKCU\Console" /v ForceV2
      Imagebase:0x7ff68e250000
      File size:72704 bytes
      MD5 hash:E3DACF0B31841FA02064B4457D44B357
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:5
      Start time:00:27:37
      Start date:02/08/2022
      Path:C:\Windows\System32\find.exe
      Wow64 process (32bit):false
      Commandline:find /i "0x0"
      Imagebase:0x7ff653a00000
      File size:17408 bytes
      MD5 hash:4B843EB20A160AC7E9217F9CD64DB6BA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate

      Target ID:6
      Start time:00:27:40
      Start date:02/08/2022
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
      Imagebase:0x7ff6fa130000
      File size:273920 bytes
      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:7
      Start time:00:27:40
      Start date:02/08/2022
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "
      Imagebase:0x7ff6fa130000
      File size:273920 bytes
      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:8
      Start time:00:27:41
      Start date:02/08/2022
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd
      Imagebase:0x7ff6fa130000
      File size:273920 bytes
      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:9
      Start time:00:27:41
      Start date:02/08/2022
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\Desktop\MAS_AIO.cmd" "
      Imagebase:0x7ff6fa130000
      File size:273920 bytes
      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:10
      Start time:00:27:42
      Start date:02/08/2022
      Path:C:\Windows\System32\find.exe
      Wow64 process (32bit):false
      Commandline:find /i "C:\Users\user\AppData\Local\Temp"
      Imagebase:0x7ff653a00000
      File size:17408 bytes
      MD5 hash:4B843EB20A160AC7E9217F9CD64DB6BA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      Target ID:12
      Start time:00:27:42
      Start date:02/08/2022
      Path:C:\Windows\System32\reg.exe
      Wow64 process (32bit):false
      Commandline:reg query HKU\S-1-5-19
      Imagebase:0x7ff68e250000
      File size:72704 bytes
      MD5 hash:E3DACF0B31841FA02064B4457D44B357
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      Target ID:13
      Start time:00:27:43
      Start date:02/08/2022
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop
      Imagebase:0x7ff6fa130000
      File size:273920 bytes
      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      Target ID:14
      Start time:00:27:43
      Start date:02/08/2022
      Path:C:\Windows\System32\reg.exe
      Wow64 process (32bit):false
      Commandline:reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop
      Imagebase:0x7ff68e250000
      File size:72704 bytes
      MD5 hash:E3DACF0B31841FA02064B4457D44B357
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      Target ID:16
      Start time:00:27:44
      Start date:02/08/2022
      Path:C:\Windows\System32\mode.com
      Wow64 process (32bit):false
      Commandline:mode 76, 30
      Imagebase:0x7ff7bb220000
      File size:31232 bytes
      MD5 hash:1A3D2D975EB4A5AF22768F1E23C9A83C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      Target ID:17
      Start time:00:27:48
      Start date:02/08/2022
      Path:C:\Windows\System32\choice.exe
      Wow64 process (32bit):false
      Commandline:choice /C:12345678 /N
      Imagebase:0x7ff704630000
      File size:33280 bytes
      MD5 hash:EA29BC6BCB1EFCE9C9946C3602F3E754
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      No disassembly