analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

image.exe

Full analysis: https://app.any.run/tasks/78d0d169-7b6a-4775-b037-9b5bd64b87ff
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: May 30, 2020, 17:38:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
asyncrat
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C57CA9CB0FDE71F074A1DA63C327CE3F

SHA1:

E6AF2383E6C375C1ECAF5E412271DFBB0A97B36B

SHA256:

58505CA17B261822BFC5FCF1D73E532917EB7A3EA24917AA64970F76F0B8BE3B

SSDEEP:

3072:NvZxHZ6G3kLu7NQz8jz2D4/m162izYdqynuQ0mrnN5t5Gnrn4XNjh+Pc+Ga++Bnn:Nvx6GwQQz8M42wzYdqynzbGn7UjE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • bb.exe (PID: 2224)
      • ab.exe (PID: 2492)
      • scvhost.exe (PID: 3784)
    • Changes the autorun value in the registry

      • ab.exe (PID: 2492)
    • ASYNCRAT was detected

      • scvhost.exe (PID: 3784)
  • SUSPICIOUS

    • Creates files in the user directory

      • image.exe (PID: 2212)
      • ab.exe (PID: 2492)
    • Starts CMD.EXE for commands execution

      • image.exe (PID: 2212)
      • ab.exe (PID: 2492)
    • Executable content was dropped or overwritten

      • image.exe (PID: 2212)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 1148)
    • Manual execution by user

      • WINWORD.EXE (PID: 1148)
      • taskmgr.exe (PID: 2964)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 1148)
    • Reads settings of System Certificates

      • scvhost.exe (PID: 3784)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:05:20 09:46:10+02:00
PEType: PE32
LinkerVersion: 10
CodeSize: 35328
InitializedDataSize: 138752
UninitializedDataSize: -
EntryPoint: 0x7ee4
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
Comments: -
CompanyName: none[none]
FileDescription: -
FileVersion: 1. 0. 0. 1
LegalCopyright: none[none]
ProductName: -
ProductVersion: 1. 0. 0. 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
11
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start image.exe cmd.exe no specs timeout.exe no specs ab.exe timeout.exe no specs bb.exe winword.exe no specs cmd.exe no specs timeout.exe no specs #ASYNCRAT scvhost.exe taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2212"C:\Users\admin\AppData\Local\Temp\image.exe" C:\Users\admin\AppData\Local\Temp\image.exe
explorer.exe
User:
admin
Company:
none[none]
Integrity Level:
MEDIUM
Exit code:
0
Version:
1. 0. 0. 1
2876cmd /c ""C:\Users\admin\AppData\Roaming\Untitled1.bat" > NUL"C:\Windows\system32\cmd.exeimage.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1744timeout 5 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2492ab.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\Themes\ab.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.3.9600.17415
956timeout 5C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2224bb.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\Themes\bb.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
1148"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\fundscouncil.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2284cmd /c ""C:\Users\admin\AppData\Local\Temp\tmpED71.tmp.bat""C:\Windows\system32\cmd.exeab.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3024timeout 3 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3784"C:\Users\admin\AppData\Roaming\scvhost.exe" C:\Users\admin\AppData\Roaming\scvhost.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.3.9600.17415
Total events
1 494
Read events
761
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
4
Unknown types
4

Dropped files

PID
Process
Filename
Type
1148WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRD083.tmp.cvr
MD5:
SHA256:
2492ab.exeC:\Users\admin\AppData\Roaming\scvhost.exe
MD5:
SHA256:
2492ab.exeC:\Users\admin\AppData\Local\Temp\tmpED71.tmp.battext
MD5:C7F2C2F882D648C36005A2F5E37AE8F2
SHA256:352E0192AADA79A3908AB4366643A618CFE59C6D74ECC4D46D03213FC545AB1B
1148WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:8BC4363A892B7877E2D129230A432F02
SHA256:05B86EA40771CC6CEB781769FE7DCEC69F0FB120E1AB385E7A5D207E723282A6
2212image.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Themes\bb.exeexecutable
MD5:8A1F7CE9D0DB1E40A8A4A3E85C84A6E5
SHA256:729A020ECB67C4CE6537A2DB02C7F9ABCCDD1E403CA74091E6D0ADFCA1BDFE6C
2212image.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Themes\ab.exeexecutable
MD5:E33F69AEDE2D3C53E135EEE25F7A1959
SHA256:490B3F8CD95D01BB22329099DF19743E8DA4C1BBD6602B14011FBFA77C45A86A
1148WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\fundscouncil.rtf.LNKlnk
MD5:BE2CE2E7828008E9C38D54FC8292DE58
SHA256:763D1B41A83FDF7FD9EFFCB45B8F346EE8D2CC22D64ED67A3E86CEDF3D49FF07
2212image.exeC:\Users\admin\AppData\Roaming\Untitled1.battext
MD5:5615C92CAE46452DBF9DB694D5A96CC2
SHA256:A5A6BFA592B70D7A6C647BDD2831523B008A70E566C46FC94808BB98EAC04587
1148WINWORD.EXEC:\Users\admin\Desktop\~$ndscouncil.rtfpgc
MD5:0406B5C9D917948A8871150ACFE5340A
SHA256:1017D7758DF87C1500A629EA6B342A85FA6AD517A8F94012DD3FDFF47C3ECE5D
1148WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:30AAA58B45C3C03F866E1EAB36B22F67
SHA256:8E70645929DD6A26EBB3C205E306143326A18303142E0845CA36AFEF0E8441C8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
4
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3784
scvhost.exe
104.23.99.190:443
pastebin.com
Cloudflare Inc
US
malicious
2224
bb.exe
176.57.68.202:7073
1.ngprince.com
unknown
3784
scvhost.exe
185.206.212.36:7071
LeaseWeb Netherlands B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
1.ngprince.com
  • 176.57.68.202
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
pastebin.com
  • 104.23.99.190
  • 104.23.98.190
shared

Threats

No threats detected
No debug info