File name: | ss.ps1 |
Full analysis: | https://app.any.run/tasks/031d98bb-3696-4369-8202-2130e87f93d3 |
Verdict: | Malicious activity |
Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
Analysis date: | January 17, 2023, 20:16:43 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines, with no line terminators |
MD5: | 970ACA768E68FAA580F758A1A379686B |
SHA1: | 6A93921485CBD83382EB5A47315B1F0A67BCF684 |
SHA256: | 6C1E62385D660CA43E024D461154FBB4805E429CDF7850D19510D7F69533739E |
SSDEEP: | 49152:CY1wOeTfeinwRg0Yd0YtWdR2++BqkPiblNmBZOqsHtL3rdyW6JKHINYMpnkq/3+s:E |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1772 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\AppData\Local\Temp\ss.ps1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
2404 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Version: 4.0.30319.34209 built by: FX452RTMGDR Modules
Quasar(PID) Process(2404) RegAsm.exe Version1.4.0 C2 (2)ghcc.duckdns.org:4782 Sub_DirSubDir Install_NameClient.exe Mutexa9c03eb7-f3c1-4b9e-a4f7-1962d17a793b StartupUpdate TagOffice04 LogDirLogs SignatureBmURqSFZ1h2iQNUFHO7t3JRIXIZcWwELygvZDWIr3vX6NxWQP68g106p2vVr72210wgoaCAv4Ul4E/IjFIlaKGItU1/tiYVTY0YHdPX2xUlyaprjohsVra3+XrW2o/xclc5YfL/zpgRFBuuOLL6+Zx4GS2gummWhFS0XUd/xYkRc3ANvVe9OSBqLjkSnQmWmtOafaUZ4zoLG2hbT/yPBMU/4cR7FGqbTqVo8meFUBN8yDrahXffVXM4eGWmIkpgjv4V9X+T7qJmwZfZcM6MGT7NwjVptw8cWtx28oI6gLT89... CertificateMIIE9DCCAtygAwIBAgIQAP+vzY1ukBhsntvfMpJ2ozANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIzMDExMzIzMTk0MFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvpJmhK1164+lKKlpHbySFZY44CPihUYne/jdh7mfMPfamwm0xw8FEZwqF5xop/GYCCEvzbF6... |
(PID) Process: | (1772) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (1772) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (1772) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (1772) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (1772) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (2404) RegAsm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2404) RegAsm.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Update |
Value: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | |||
(PID) Process: | (2404) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (2404) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (2404) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
2404 | RegAsm.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:A3D4A45CB5FFA679A87D5E15116209F3 | SHA256:D7CD561CB8C2CA3B45D027D63FF80FAF4204CB4715AEDE539A0D517A94F4A3AB | |||
1772 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF106f1e7.TMP | binary | |
MD5:CCFCF369F751CE8DA0370D84E52A7EED | SHA256:53922490C3F5A04667EC3605A01AF2A4F4F265782D1BCA519F63ACAD413F2ED9 | |||
1772 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:B5CB4E8687032935729FAC33E78286B6 | SHA256:A0A8CF517A201DC1524077A9932DF4D2F8123A1E2DFDDBC44BC6B57F72BC9D99 | |||
1772 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CHVVPCWRSSADZFJHXBTJ.temp | binary | |
MD5:B5CB4E8687032935729FAC33E78286B6 | SHA256:A0A8CF517A201DC1524077A9932DF4D2F8123A1E2DFDDBC44BC6B57F72BC9D99 | |||
1772 | powershell.exe | C:\Users\admin\AppData\Local\Temp\2fniez0h.ntx.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B | |||
1772 | powershell.exe | C:\Users\admin\AppData\Local\Temp\03v3dndn.0kj.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B | |||
1772 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | dbf | |
MD5:446DD1CF97EABA21CF14D03AEBC79F27 | SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF | |||
2404 | RegAsm.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:FC4666CBCA561E864E7FDF883A9E6661 | SHA256:10F3DEB6C452D749A7451B5D065F4C0449737E5EE8A44F4D15844B503141E65B |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2404 | RegAsm.exe | GET | 200 | 8.238.32.126:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?db5e4cb627840a14 | US | compressed | 61.4 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2404 | RegAsm.exe | 64.185.227.155:443 | api.ipify.org | WEBNX | US | malicious |
2404 | RegAsm.exe | 185.172.148.96:443 | tools.keycdn.com | proinity GmbH | CH | suspicious |
2404 | RegAsm.exe | 8.238.32.126:80 | ctldl.windowsupdate.com | LEVEL3 | US | suspicious |
2404 | RegAsm.exe | 95.216.102.32:4782 | ghcc.duckdns.org | Hetzner Online GmbH | FI | malicious |
2404 | RegAsm.exe | 8.238.28.126:80 | ctldl.windowsupdate.com | LEVEL3 | US | suspicious |
Domain | IP | Reputation |
---|---|---|
ghcc.duckdns.org |
| malicious |
ctldl.windowsupdate.com |
| whitelisted |
tools.keycdn.com |
| suspicious |
api.ipify.org |
| shared |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
— | — | A Network Trojan was detected | ET TROJAN Observed Malicious SSL Cert (Quasar CnC) |
— | — | A Network Trojan was detected | ET TROJAN Generic AsyncRAT Style SSL Cert |