| File name: | file |
| Full analysis: | https://app.any.run/tasks/a08d028a-8210-489c-acc9-076e397d7ae4 |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | August 30, 2024, 19:44:51 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 0A34380175BB4DA2CCE136E0CB3D3E04 |
| SHA1: | AA41F044BF0BA06345CA7E0E1A7CDE36E05B4ACB |
| SHA256: | 1EF7CCB345B2132B8E1A38BDEF87DD47A0A0588603703EE63A201A9A8B5BA51D |
| SSDEEP: | 98304:GG1JH4bkeuH1Rvaq2lz89xsX8dndI/+1MezT6UzgtNMi0HznUYpOjGryyZlXy52I:/w |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:02:24 19:19:43+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 28672 |
| InitializedDataSize: | 4303360 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x3899 |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 320 | choice /d y /t 5 | C:\Windows\SysWOW64\choice.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Offers the user a choice Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 360 | cmd /c copy /b ..\Rt + ..\Core + ..\Created + ..\Reg + ..\Aa + ..\Toe + ..\Interested + ..\Opera + ..\Instant + ..\Findings + ..\Gave + ..\Hk + ..\Pollution m | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 568 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 788 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1076 | findstr /V "ONSSPORTSSOLVEMAYOR" Cycles | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1436 | C:\Users\admin\AppData\Local\Temp\800157\RegAsm.exe | C:\Users\admin\AppData\Local\Temp\800157\RegAsm.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 2008 | cmd /c schtasks.exe /create /tn "Pharmaceutical" /tr "wscript //B 'C:\Users\admin\AppData\Local\LearnTech Vista Co\EduVistaR.js'" /sc minute /mo 5 /F | C:\Windows\SysWOW64\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2868 | cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduVistaR.url" & echo URL="C:\Users\admin\AppData\Local\LearnTech Vista Co\EduVistaR.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduVistaR.url" & exit | C:\Windows\SysWOW64\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3176 | findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3964 | Tapes.pif m | C:\Users\admin\AppData\Local\Temp\800157\Tapes.pif | cmd.exe | ||||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script Version: 3, 3, 14, 3 Modules
| |||||||||||||||
| (PID) Process: | (5700) file.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (5700) file.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (5700) file.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (5700) file.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5700 | file.exe | C:\Users\admin\AppData\Local\Temp\Rt | binary | |
MD5:43C5A88A977A17BD919D6345E12BA92D | SHA256:FDD9FE12A5DE9A2FBB9D65C24B2F34B253FCF661DAE63C37344E19A2552317B4 | |||
| 5700 | file.exe | C:\Users\admin\AppData\Local\Temp\Core | binary | |
MD5:B4D9EA39954B5ED740BAD4A568E3C650 | SHA256:445E147FA99F6007A71D1AAE0ECEA141F9C1C844BF28DEB2B9FFDA970C27EB52 | |||
| 5700 | file.exe | C:\Users\admin\AppData\Local\Temp\Created | binary | |
MD5:8F52EAA8DD40934FDA79ACEDFF59E0AF | SHA256:1979865A06A39B7C36C1B296F29262E00BAFB50112E305B96884E4C1FF93F2E5 | |||
| 5700 | file.exe | C:\Users\admin\AppData\Local\Temp\Gave | binary | |
MD5:02E33BDF405ADD3E37AB7F1079ECCA57 | SHA256:3D1EBC6D27E2015B941F8C34954B1E499BD5353457078203514F44F60CEC19B2 | |||
| 5700 | file.exe | C:\Users\admin\AppData\Local\Temp\Hk | binary | |
MD5:89BF4167ED16FD45E414A93F0C80D594 | SHA256:1F295168F9BE03706338A8061EE44B69CE2A82FED8D88464867A28DFFB815274 | |||
| 5700 | file.exe | C:\Users\admin\AppData\Local\Temp\Pollution | binary | |
MD5:631B5871BE13E53184FFBFC75EB76F67 | SHA256:43FE1305A86F08973D77D0EAF920688DCE55E382BDBE039E84B4C43303E60C27 | |||
| 5700 | file.exe | C:\Users\admin\AppData\Local\Temp\Findings | binary | |
MD5:6A2303F0B3DA4E5D21A0BB699A666A45 | SHA256:4ECCFB4CD5ABCC220FD1072FCB21E3E91D53E1CF7E05DF0F369358A2DE2BCFC4 | |||
| 5700 | file.exe | C:\Users\admin\AppData\Local\Temp\Reg | binary | |
MD5:041553D21034EC63465D343113A87A23 | SHA256:E6BEED61477FC497E6D10BC8E58CE6DAF89C9D8B38B08E19DE4CD8ABC8747DC6 | |||
| 5164 | cmd.exe | C:\Users\admin\AppData\Local\Temp\Tb.bat | text | |
MD5:8ADDEB4703C039D02EC4BE8AEEAE5FE2 | SHA256:3217CA8EEBBB7AA141F62D08B10E50DC757AD1CA569E010C7FF8C6A05654EFD8 | |||
| 5164 | cmd.exe | C:\Users\admin\AppData\Local\Temp\800157\Tapes.pif | executable | |
MD5:FE529D61563C9D47076F0DB47B98E0A1 | SHA256:7282EFA8C0792C4BB0705B25D65231E97247199AC55452A02096B5C11F531DC1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1752 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5852 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5852 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2400 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3260 | svchost.exe | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1752 | svchost.exe | 40.126.31.69:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1752 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
5852 | SIHClient.exe | 13.85.23.86:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5852 | SIHClient.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5852 | SIHClient.exe | 20.242.39.171:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PLXzHMGJljVRMHaMvBgbFslzeJ.PLXzHMGJljVRMHaMvBgbFslzeJ |
| unknown |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1436 | RegAsm.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 5 |
1436 | RegAsm.exe | Domain Observed Used for C2 Detected | ET MALWARE Generic AsyncRAT Style SSL Cert |
1436 | RegAsm.exe | Malware Command and Control Activity Detected | REMOTE [ANY.RUN] AsyncRAT Successful Connection |