| File name: | Payment-proof-270966-867AS.js |
| Full analysis: | https://app.any.run/tasks/f7d38077-fc62-4371-a58d-303a95fb1694 |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | May 21, 2025, 07:56:29 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines (64342), with CRLF line terminators |
| MD5: | 593A0880D28A1EF789797DE643A6D8A1 |
| SHA1: | 032897DCA15C145D7DC7D61B25DCA3B0A4C33080 |
| SHA256: | 4E70248F724F506EAE27284720B02F5DBA15FBBA54074C11AC32790DCC85C2A1 |
| SSDEEP: | 24576:8EL6Cpnun5uawwM3jpgod99DOnsOHxecBI:V6vn5EwK99ShXS |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 672 | "C:\Users\admin\AppData\Roaming\svchost.exe" | C:\Users\admin\AppData\Roaming\svchost.exe | svchost.exe | ||||||||||||
User: admin Company: 博典创新科技 Integrity Level: MEDIUM Description: 亚历山大学者版 Version: 3.5.2240.18 Modules
AsyncRat(PID) Process(672) svchost.exe C2 (1)riches20.kozow.com Ports (2)7016 50161 Version0.5.7B BotnetAPRIL Options AutoRuntrue MutexAsyncMutex_6SI8OkPnk InstallFolder%AppData% BSoDfalse AntiVMfalse Certificates Cert1MIIE8jCCAtqgAwIBAgIQAK1iGMS9gWYqLrMppp102zANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjUwNTAyMDA1NjU1WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOHKtfV4aL31K42CDGFem3U+XxcXVo8nALruNYZt9r8zrzdA6jTOv0m278ynFY0Zam3Y5eeGwcJq... Server_SignatureGnsLa3Q00V8Xn+k2KNkcPGsbYzNV9jpNg+29cLhwnnTsihW4K6F9sunRo/Oc38DYXO881XBHaaRd+PuESPQyxtpX8byynIbm2sfismxFWReE8807cbIE/t2/e8GHrKbXGLtV4mvUU8H0Wgmdc9iEr9wqqLev3vGw4cJJJmSOtxtPm3rjsboPPPq6ZR0dsWv0Ljysy+Nz8DWIkR5u68hRB1Kb47CwYRHzVFANVfZs43NhNzniTIo4mQ2NrByPguROVDz6sIFvhKsIrIXUTs/0L0OmW8pJatgrm5ujaUhWDvDm... Keys AESef401961cfcc8b89b0768d5affdf5c862e9a8c25458283dc2364b368d33cadd5 Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941 | |||||||||||||||
| 1660 | "C:\Users\admin\AppData\Roaming\svchost.exe" | C:\Users\admin\AppData\Roaming\svchost.exe | — | cmd.exe | |||||||||||
User: admin Company: 博典创新科技 Integrity Level: MEDIUM Description: 亚历山大学者版 Exit code: 0 Version: 3.5.2240.18 Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3176 | timeout 3 | C:\Windows\SysWOW64\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5800 | "C:\Users\admin\AppData\Roaming\svchost.exe" | C:\Users\admin\AppData\Roaming\svchost.exe | svchost.exe | ||||||||||||
User: admin Company: 博典创新科技 Integrity Level: MEDIUM Description: 亚历山大学者版 Exit code: 0 Version: 3.5.2240.18 Modules
| |||||||||||||||
| 6272 | "C:\Users\admin\AppData\Roaming\svchost.exe" | C:\Users\admin\AppData\Roaming\svchost.exe | — | explorer.exe | |||||||||||
User: admin Company: 博典创新科技 Integrity Level: MEDIUM Description: 亚历山大学者版 Exit code: 0 Version: 3.5.2240.18 Modules
| |||||||||||||||
| 6944 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7424 | "C:\Windows\System32\WScript.exe" C:\Users\admin\Desktop\Payment-proof-270966-867AS.js | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 7476 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\adobe.js" | C:\Windows\System32\wscript.exe | wscript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 7504 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\svchost.js" | C:\Windows\System32\wscript.exe | wscript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| (PID) Process: | (7424) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.js\OpenWithProgids |
| Operation: | write | Name: | JSFile |
Value: | |||
| (PID) Process: | (7424) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe |
| Operation: | write | Name: | JScriptSetScriptStateStarted |
Value: 90C3100000000000 | |||
| (PID) Process: | (7476) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | adobe |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\adobe.js" | |||
| (PID) Process: | (7592) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | adobe |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\adobe.js" | |||
| (PID) Process: | (7944) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | adobe |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\adobe.js" | |||
| (PID) Process: | (8008) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | adobe |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\adobe.js" | |||
| (PID) Process: | (7872) audiodg.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | svchost |
Value: "C:\Users\admin\AppData\Roaming\svchost.exe" | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7476 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\adobe.js | text | |
MD5:C3903DFF6A72D119EB6C6B9F451625E5 | SHA256:4451E476918C8B6D02F2F4CB00548B55EB184256A3D96A3E243484273FDF65E0 | |||
| 7424 | wscript.exe | C:\Users\admin\AppData\Local\Temp\svchost.js | text | |
MD5:E75942EDB244EF2D3423911739A267E1 | SHA256:A61962F133FB658836523727124031A73A2D11A3ED20E67E39017E208EC04A9D | |||
| 7424 | wscript.exe | C:\Users\admin\AppData\Local\Temp\adobe.js | text | |
MD5:C3903DFF6A72D119EB6C6B9F451625E5 | SHA256:4451E476918C8B6D02F2F4CB00548B55EB184256A3D96A3E243484273FDF65E0 | |||
| 7476 | wscript.exe | C:\Users\admin\AppData\Roaming\adobe.js | text | |
MD5:C3903DFF6A72D119EB6C6B9F451625E5 | SHA256:4451E476918C8B6D02F2F4CB00548B55EB184256A3D96A3E243484273FDF65E0 | |||
| 7504 | wscript.exe | C:\Users\admin\AppData\Local\Temp\audiodg.exe | executable | |
MD5:58CE634EAD9737C3F90990F27D7B46A1 | SHA256:56E94A95C329C4961505F0AD7EA8567502DB6F9611ECD268E33951A2FC56CB81 | |||
| 7872 | audiodg.exe | C:\Users\admin\AppData\Local\Temp\tmp1922.tmp.bat | text | |
MD5:6794EB37FBD715BC9B8EE37A1EC44960 | SHA256:AC8EBE5028E186208EA0E081E30F0D7340CD61E90CF1937AFC08C504D1CC669A | |||
| 7872 | audiodg.exe | C:\Users\admin\AppData\Roaming\svchost.exe | executable | |
MD5:58CE634EAD9737C3F90990F27D7B46A1 | SHA256:56E94A95C329C4961505F0AD7EA8567502DB6F9611ECD268E33951A2FC56CB81 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7592 | wscript.exe | POST | 502 | 172.94.13.184:6144 | http://riches20.freeddns.org:6144/is-ready | unknown | — | — | unknown |
7592 | wscript.exe | POST | 502 | 172.94.13.184:6144 | http://riches20.freeddns.org:6144/is-ready | unknown | — | — | unknown |
7592 | wscript.exe | POST | 502 | 172.94.13.184:6144 | http://riches20.freeddns.org:6144/is-ready | unknown | — | — | unknown |
8008 | wscript.exe | POST | 502 | 172.94.13.184:6144 | http://riches20.freeddns.org:6144/is-ready | unknown | — | — | unknown |
4980 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
4980 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7592 | wscript.exe | POST | 502 | 172.94.13.184:6144 | http://riches20.freeddns.org:6144/is-ready | unknown | — | — | unknown |
4980 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
8008 | wscript.exe | POST | 502 | 172.94.13.184:6144 | http://riches20.freeddns.org:6144/is-ready | unknown | — | — | unknown |
4980 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
7592 | wscript.exe | 172.94.13.184:6144 | riches20.freeddns.org | Voxility LLP | DE | malicious |
8008 | wscript.exe | 172.94.13.184:6144 | riches20.freeddns.org | Voxility LLP | DE | malicious |
4980 | SIHClient.exe | 20.109.210.53:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4980 | SIHClient.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4980 | SIHClient.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4980 | SIHClient.exe | 13.85.23.206:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
riches20.freeddns.org |
| malicious |
slscr.update.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
riches20.kozow.com |
| malicious |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS Query to a *.freeddns .org Domain |
7592 | wscript.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.freeddns .org Domain |
7592 | wscript.exe | Malware Command and Control Activity Detected | ET MALWARE WSHRAT CnC Checkin |
7592 | wscript.exe | Malware Command and Control Activity Detected | ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 |
7592 | wscript.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.freeddns .org Domain |
7592 | wscript.exe | Malware Command and Control Activity Detected | ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 |
7592 | wscript.exe | Malware Command and Control Activity Detected | ET MALWARE WSHRAT CnC Checkin |
7592 | wscript.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.freeddns .org Domain |
7592 | wscript.exe | Malware Command and Control Activity Detected | ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 |
7592 | wscript.exe | Malware Command and Control Activity Detected | ET MALWARE WSHRAT CnC Checkin |