| File name: | 05bc64e823174c1bdf0b80db4ca19037.exe |
| Full analysis: | https://app.any.run/tasks/3cad07c7-0e37-40b5-9a85-c63c97f8c50c |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | December 02, 2023, 16:35:23 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386, for MS Windows |
| MD5: | 05BC64E823174C1BDF0B80DB4CA19037 |
| SHA1: | CC4FD4CE2A491334122E00AE211F4F764CEDF20C |
| SHA256: | 52F039142BB84B5268A2C83138818D3E89C3000F48EFD4405BFB22F1E3F9EA87 |
| SSDEEP: | 49152:ZBgzgT4XnQtJn0v2n5vU/Y4DnB2aWl+G/bsH2jyti3pUMP3zIbdV52gl:we43unpUgyB2/zssytipLzIp2gl |
| .exe | | | Win32 Executable Delphi generic (37.4) |
|---|---|---|
| .scr | | | Windows screen saver (34.5) |
| .exe | | | Win32 Executable (generic) (11.9) |
| .exe | | | Win16/32 Executable Delphi generic (5.4) |
| .exe | | | Generic Win/DOS Executable (5.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2003:02:18 17:19:50+01:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 437248 |
| InitializedDataSize: | 893952 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6c788 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 9.326.9.24565 |
| ProductVersionNumber: | 9.326.9.24565 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| Comments: | Управление ментальным здоровьем и пÑихологичеÑкой Ñилой |
| CompanyName: | MindWave |
| FileDescription: | Управление ментальным здоровьем и пÑихологичеÑкой Ñилой |
| FileVersion: | 9.326.9.90101 |
| InternalName: | MindWave |
| LegalCopyright: | Copyright © MindWave Wellness 2008 |
| ProductName: | MindWave |
| ProductVersion: | 9.326.9.90101 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 776 | ping -n 5 localhost | C:\Windows\SysWOW64\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1104 | 27485\Perceived.pif 27485\q | C:\Users\admin\AppData\Local\Temp\13401\27485\Perceived.pif | — | cmd.exe | |||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script (Beta) Exit code: 0 Version: 3, 3, 15, 4 Modules
| |||||||||||||||
| 1308 | cmd /c copy /b Infected + Tin + Excited + Condo 27485\Perceived.pif | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1408 | cmd /c mkdir 27485 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1760 | cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MindWave.url" & echo URL="C:\Users\admin\AppData\Local\MindWave Wellness\MindWave.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MindWave.url" & exit | C:\Windows\System32\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2092 | schtasks.exe /create /tn "Liquid" /tr "wscript 'C:\Users\admin\AppData\Local\MindWave Wellness\MindWave.js'" /sc minute /mo 3 /F | C:\Windows\System32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2216 | cmd /k cmd < Enjoyed & exit | C:\Windows\SysWOW64\cmd.exe | — | 05bc64e823174c1bdf0b80db4ca19037.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2300 | findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2316 | cmd /c copy /b Orders + Cylinder 27485\q | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2604 | "C:\Users\admin\AppData\Local\Temp\05bc64e823174c1bdf0b80db4ca19037.exe" | C:\Users\admin\AppData\Local\Temp\05bc64e823174c1bdf0b80db4ca19037.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2652) RegAsm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2604 | 05bc64e823174c1bdf0b80db4ca19037.exe | C:\Users\admin\AppData\Local\Temp\13401\Excited | binary | |
MD5:00B06C10CB0E907952EABC40D1066AF7 | SHA256:FFD97D25C9D8E9A8B73C520745362828516689EA21489A60A891330030CF7675 | |||
| 2604 | 05bc64e823174c1bdf0b80db4ca19037.exe | C:\Users\admin\AppData\Local\Temp\13401\Infected | executable | |
MD5:610A3DAD1E9C4E1E7FA902D90A27A626 | SHA256:BAC0673233D6DAF1969CA8E084720B278F2E31F62C0DE1928B82885B8C893C7D | |||
| 1308 | cmd.exe | C:\Users\admin\AppData\Local\Temp\13401\27485\Perceived.pif | executable | |
MD5:BFA84DBDE0DF8F1CAD3E179BD46A6E34 | SHA256:6DE412B8674FFBA5D78FF9D36ABFFBE2CF86FD08B2231592FCA2FCF41F1F2314 | |||
| 2604 | 05bc64e823174c1bdf0b80db4ca19037.exe | C:\Users\admin\AppData\Local\Temp\13401\Cylinder | text | |
MD5:28E2CBC2124D320395A949737C933C46 | SHA256:35FD665E063AECCE54E6448C08B36D2C45749BBB7FE52C796E56E68E8F88558A | |||
| 1104 | Perceived.pif | C:\Users\admin\AppData\Local\MindWave Wellness\v | text | |
MD5:2AEB25B87C0CB6A8F360F66CA69EDD70 | SHA256:614DEC82F15CD338C88A43542B5BAB568A4A0C74FB52C0D8362A7D43E75CF8AF | |||
| 1104 | Perceived.pif | C:\Users\admin\AppData\Local\MindWave Wellness\MindWave.pif | executable | |
MD5:BFA84DBDE0DF8F1CAD3E179BD46A6E34 | SHA256:6DE412B8674FFBA5D78FF9D36ABFFBE2CF86FD08B2231592FCA2FCF41F1F2314 | |||
| 1760 | cmd.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MindWave.url | text | |
MD5:353795816AE5B37D44A9024159D27EA8 | SHA256:C0FC703B325B80CD526B0CF1AAA1A1BFEBBBFCB68A00B2493F690B950722E242 | |||
| 2316 | cmd.exe | C:\Users\admin\AppData\Local\Temp\13401\27485\q | text | |
MD5:2AEB25B87C0CB6A8F360F66CA69EDD70 | SHA256:614DEC82F15CD338C88A43542B5BAB568A4A0C74FB52C0D8362A7D43E75CF8AF | |||
| 1104 | Perceived.pif | C:\Users\admin\AppData\Local\Temp\13401\27485\RegAsm.exe | executable | |
MD5:B19FD9298FF205E8718CDEF5C19DF6FE | SHA256:1E9516DA2DED24D635F5FAB0347D34CEB76E50B2A015EBB1EE3B8EE69DE5FAAE | |||
| 1104 | Perceived.pif | C:\Users\admin\AppData\Local\MindWave Wellness\MindWave.js | text | |
MD5:75EC55C2A09B385C689AC5D02EB765DB | SHA256:BD45C660A53B61FB7B941509462A8031A2172F3E37F5D910DB3A164AD5BB2342 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2652 | RegAsm.exe | 185.196.8.10:4449 | — | — | US | unknown |
Domain | IP | Reputation |
|---|---|---|
JiOWngCJdXjgubID.JiOWngCJdXjgubID |
| unknown |
dns.msftncsi.com |
| shared |