analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://github.com/massgravel/Microsoft-Activation-Scripts/tree/master/MAS_1.2/All-In-One-Version

Full analysis: https://app.any.run/tasks/0acbf680-38f1-4f57-a790-e927cab95d21
Verdict: Malicious activity
Analysis date: August 16, 2020, 17:19:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

43BF9C0D24C1EEC765C9A3FE3102C2FF

SHA1:

7C0A5026C5A823152490E3525A5F536D6A9B5DDE

SHA256:

A169F3019A4F56E91871A1F1B20C8FFB5C61DCC9C84B9B77639F020702D336E1

SSDEEP:

3:N8tEd4PKoHXuukGR3RLLLGXUuvI+e0IqLAOAE:2uuPKzukGv/LGXUyI+es0vE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 3884)
      • cmd.exe (PID: 2400)
    • Starts Visual C# compiler

      • powershell.exe (PID: 2224)
      • powershell.exe (PID: 2496)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2476)
      • schtasks.exe (PID: 2480)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2400)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 1668)
      • cscript.exe (PID: 116)
      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 3884)
      • cmd.exe (PID: 2400)
    • Application launched itself

      • cmd.exe (PID: 1668)
      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 3884)
      • cmd.exe (PID: 2400)
    • Uses RUNDLL32.EXE to load library

      • cscript.exe (PID: 116)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 1668)
      • cmd.exe (PID: 3784)
      • cmd.exe (PID: 3884)
      • cmd.exe (PID: 2400)
    • Executes scripts

      • cmd.exe (PID: 1668)
    • Starts CHOICE.EXE (used to create a delay)

      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 2400)
    • Executable content was dropped or overwritten

      • expand.exe (PID: 976)
      • expand.exe (PID: 3020)
      • cmd.exe (PID: 2400)
    • Creates files in the Windows directory

      • powershell.exe (PID: 2224)
      • powershell.exe (PID: 3892)
      • expand.exe (PID: 976)
      • expand.exe (PID: 3020)
      • powershell.exe (PID: 2988)
      • powershell.exe (PID: 2496)
      • powershell.exe (PID: 3616)
      • powershell.exe (PID: 2484)
      • powershell.exe (PID: 2976)
    • Creates files in the user directory

      • powershell.exe (PID: 2224)
      • powershell.exe (PID: 3892)
      • powershell.exe (PID: 4000)
      • powershell.exe (PID: 2436)
      • powershell.exe (PID: 3028)
      • powershell.exe (PID: 3752)
      • powershell.exe (PID: 272)
      • powershell.exe (PID: 2988)
      • powershell.exe (PID: 3616)
      • powershell.exe (PID: 2496)
      • powershell.exe (PID: 4076)
      • powershell.exe (PID: 2976)
      • powershell.exe (PID: 2484)
      • powershell.exe (PID: 3036)
      • powershell.exe (PID: 2448)
      • powershell.exe (PID: 1376)
      • powershell.exe (PID: 4008)
    • Removes files from Windows directory

      • expand.exe (PID: 976)
      • powershell.exe (PID: 2224)
      • cmd.exe (PID: 1820)
      • expand.exe (PID: 3020)
      • powershell.exe (PID: 2496)
      • cmd.exe (PID: 2400)
    • Creates files in the program directory

      • cmd.exe (PID: 2400)
      • powershell.exe (PID: 4076)
      • powershell.exe (PID: 2448)
    • Uses WMIC.EXE to obtain a system information

      • cmd.exe (PID: 3016)
      • cmd.exe (PID: 3400)
      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 3252)
      • cmd.exe (PID: 2360)
  • INFO

    • Reads settings of System Certificates

      • chrome.exe (PID: 2536)
    • Manual execution by user

      • NOTEPAD.EXE (PID: 2340)
      • cmd.exe (PID: 1668)
    • Reads the hosts file

      • chrome.exe (PID: 2536)
      • chrome.exe (PID: 2644)
    • Application launched itself

      • chrome.exe (PID: 2644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
178
Monitored processes
129
Malicious processes
6
Suspicious processes
3

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs notepad.exe no specs chrome.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs cscript.exe no specs rundll32.exe no specs cmd.exe cmd.exe no specs reg.exe no specs mode.com no specs choice.exe no specs cmd.exe no specs powershell.exe no specs mode.com no specs choice.exe no specs cmd.exe no specs powershell.exe no specs mode.com no specs choice.exe no specs mode.com no specs choice.exe no specs powershell.exe no specs powershell.exe no specs csc.exe cvtres.exe no specs expand.exe cmd.exe no specs cmd.exe no specs reg.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs reg.exe no specs powershell.exe no specs powershell.exe no specs timeout.exe no specs mode.com no specs choice.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs csc.exe cvtres.exe no specs expand.exe cmd.exe cmd.exe no specs reg.exe no specs mode.com no specs choice.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs schtasks.exe no specs schtasks.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs powershell.exe no specs mode.com no specs choice.exe no specs reg.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs mode.com no specs choice.exe no specs timeout.exe no specs mode.com no specs choice.exe no specs mode.com no specs choice.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs mode.com no specs choice.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2644"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://github.com/massgravel/Microsoft-Activation-Scripts/tree/master/MAS_1.2/All-In-One-Version"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3804"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6e6da9d0,0x6e6da9e0,0x6e6da9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
944"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2256 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2088"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1004,2193417413824716771,15461240395148867819,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=13709910056861087331 --mojo-platform-channel-handle=996 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2536"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1004,2193417413824716771,15461240395148867819,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=10304702065361769078 --mojo-platform-channel-handle=1612 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3100"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,2193417413824716771,15461240395148867819,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4064648965631956676 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2556"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,2193417413824716771,15461240395148867819,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=661271871506278291 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2256 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2068"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,2193417413824716771,15461240395148867819,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4962275940510202387 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1784 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
1572"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1004,2193417413824716771,15461240395148867819,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=4599398863156408869 --mojo-platform-channel-handle=3468 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3664"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,2193417413824716771,15461240395148867819,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=5651757459749352587 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
5 523
Read events
4 456
Write events
0
Delete events
0

Modification events

No data
Executable files
6
Suspicious files
77
Text files
104
Unknown types
3

Dropped files

PID
Process
Filename
Type
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\129de084-3d41-44ef-839c-6cc92f070f9e.tmp
MD5:
SHA256:
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp
MD5:
SHA256:
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:1B8E44CB8872BF26BC5219E37A700F8A
SHA256:FD3D4BC8A7D28A05D1321F1D175FB59FC2BCC3532B92274A50133C22F0A0480A
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RFdbd26.TMPtext
MD5:D11C35B3D5258F594933332C11C6F0F2
SHA256:DC2EB16E16FA3FB258AC31A481F817208CF0C917AF4224F2832588D3A64ADD05
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:D11C35B3D5258F594933332C11C6F0F2
SHA256:DC2EB16E16FA3FB258AC31A481F817208CF0C917AF4224F2832588D3A64ADD05
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:142AFC7F980CB38310D0680F2E8907CF
SHA256:3D5E5DF95E28CF65C77882748077EC52706AF02F8D869E188B6D16F782F82F44
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:AFDDC99E148FD40EED8086EE532B61C4
SHA256:3F1C412561D08C113C1561C9D273FBA00DAB5481B4AC1428FCC91D9285BA7E1E
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RFdbd07.TMPtext
MD5:1B8E44CB8872BF26BC5219E37A700F8A
SHA256:FD3D4BC8A7D28A05D1321F1D175FB59FC2BCC3532B92274A50133C22F0A0480A
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:988975E56D776333B46F1BCAE6967C0E
SHA256:22186F0422A02BE70860975EF688A895EEA653C3A7259FFBA9114138A544E05A
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RFdbd55.TMPtext
MD5:142AFC7F980CB38310D0680F2E8907CF
SHA256:3D5E5DF95E28CF65C77882748077EC52706AF02F8D869E188B6D16F782F82F44
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
22
DNS requests
22
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2536
chrome.exe
172.217.23.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2536
chrome.exe
140.82.118.5:443
api.github.com
US
suspicious
2536
chrome.exe
216.58.206.10:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2536
chrome.exe
151.101.0.133:443
avatars1.githubusercontent.com
Fastly
US
malicious
2536
chrome.exe
216.58.207.78:443
www.google-analytics.com
Google Inc.
US
whitelisted
2536
chrome.exe
185.199.109.154:443
github.githubassets.com
GitHub, Inc.
NL
suspicious
2536
chrome.exe
140.82.118.3:443
github.com
US
malicious
2536
chrome.exe
172.217.16.164:443
www.google.com
Google Inc.
US
whitelisted
2536
chrome.exe
52.206.227.240:443
collector.githubapp.com
Amazon.com, Inc.
US
unknown
2536
chrome.exe
172.217.16.141:443
accounts.google.com
Google Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
github.com
  • 140.82.118.3
shared
clientservices.googleapis.com
  • 172.217.23.131
whitelisted
accounts.google.com
  • 172.217.16.141
shared
github.githubassets.com
  • 185.199.109.154
  • 185.199.108.154
  • 185.199.110.154
  • 185.199.111.154
whitelisted
safebrowsing.googleapis.com
  • 216.58.206.10
whitelisted
avatars1.githubusercontent.com
  • 151.101.0.133
  • 151.101.64.133
  • 151.101.128.133
  • 151.101.192.133
whitelisted
avatars0.githubusercontent.com
  • 151.101.0.133
  • 151.101.64.133
  • 151.101.128.133
  • 151.101.192.133
whitelisted
avatars2.githubusercontent.com
  • 151.101.0.133
  • 151.101.64.133
  • 151.101.128.133
  • 151.101.192.133
whitelisted
avatars3.githubusercontent.com
  • 151.101.0.133
  • 151.101.64.133
  • 151.101.128.133
  • 151.101.192.133
whitelisted
github-cloud.s3.amazonaws.com
  • 52.217.84.172
shared

Threats

No threats detected
Process
Message
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144