File name:

MAS 1.4 AIO.exe

Full analysis: https://app.any.run/tasks/bd99a366-2abb-4cc7-8f94-30e5f41d29a8
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: May 16, 2021, 23:49:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
opendir
trojan
rat
asyncrat
redline
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

36E498231CAB6BC349EDE50715E69072

SHA1:

D30F62BB81130C68F6F679191E23E361C32E128A

SHA256:

A7AA1265A8549AC7EF9A5A62AB22874B5288A2A75A068344AE16F7FF2E2D0C80

SSDEEP:

196608:hDjxHkKaiXGxfTCv0ddbazw0ZEegjzyRP7yvNuanigdz2:hl8cGMv4dbow0CeiyZYNuGiA2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • RegAsm.exe (PID: 848)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • MAS 1.4 AIO.exe (PID: 1508)
      • MSI16AE.tmp (PID: 2300)
    • Starts Microsoft Installer

      • MAS 1.4 AIO.exe (PID: 1508)
    • Drops a file that was compiled in debug mode

      • MSI16AE.tmp (PID: 2300)
      • MAS 1.4 AIO.exe (PID: 1508)
    • Starts CMD.EXE for commands execution

      • MSI5F51.tmp (PID: 2908)
  • INFO

    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 1368)
      • MsiExec.exe (PID: 2864)
    • Application was dropped or rewritten from another process

      • MSI16AE.tmp (PID: 2300)
      • MSI5F51.tmp (PID: 2908)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (20.7)
.exe | Win64 Executable (generic) (13.7)
.dll | Win32 Dynamic Link Library (generic) (3.2)
.exe | Win32 Executable (generic) (2.2)

EXIF

EXE

ProductVersion: 1.0.0
ProductName: MAS 1.4 AIO
OriginalFileName: MAS 1.4 AIO.exe
LegalCopyright: Copyright (C) 2021 IGI
InternalName: MAS 1.4 AIO
FileVersion: 1.0.0
FileDescription: MAS 1.4 AIO Installer
CompanyName: IGI
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Dynamic link library
FileOS: Win32
FileFlags: Debug
FileFlagsMask: 0x003f
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 6
ImageVersion: -
OSVersion: 6
EntryPoint: 0x122d48
UninitializedDataSize: -
InitializedDataSize: 770560
CodeSize: 1534976
LinkerVersion: 14.28
PEType: PE32
TimeStamp: 2021:03:23 09:59:59+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 23-Mar-2021 08:59:59
Detected languages:
  • English - United States
Debug artifacts:
  • C:\JobRelease\win\Release\stubs\x86\ExternalUi.pdb
CompanyName: IGI
FileDescription: MAS 1.4 AIO Installer
FileVersion: 1.0.0
InternalName: MAS 1.4 AIO
LegalCopyright: Copyright (C) 2021 IGI
OriginalFileName: MAS 1.4 AIO.exe
ProductName: MAS 1.4 AIO
ProductVersion: 1.0.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 23-Mar-2021 08:59:59
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00176A3F
0x00176C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.44959
.rdata
0x00178000
0x0005DC38
0x0005DE00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.58321
.data
0x001D6000
0x00006E40
0x00005400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
2.06148
.rsrc
0x001DD000
0x0003FAA6
0x0003FC00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.35523
.reloc
0x0021D000
0x00019318
0x00019400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.56754

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.21546
1898
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.16964
67624
UNKNOWN
English - United States
RT_ICON
3
4.52869
38056
UNKNOWN
English - United States
RT_ICON
4
4.5751
21640
UNKNOWN
English - United States
RT_ICON
5
4.53043
16936
UNKNOWN
English - United States
RT_ICON
6
4.84234
9640
UNKNOWN
English - United States
RT_ICON
7
4.96796
4264
UNKNOWN
English - United States
RT_ICON
8
5.26658
2440
UNKNOWN
English - United States
RT_ICON
9
3.37783
1116
Latin 1 / Western European
English - United States
RT_STRING
10
3.34881
836
Latin 1 / Western European
English - United States
RT_STRING

Imports

KERNEL32.dll
msi.dll (delay-loaded)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
75
Monitored processes
8
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start mas 1.4 aio.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs msi16ae.tmp regasm.exe no specs msi5f51.tmp no specs mas 1.4 aio.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
848C:\Users\admin\AppData\Local\Temp\RegAsm.exeC:\Users\admin\AppData\Local\Temp\RegAsm.exeMSI16AE.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.7.3062.0 built by: NET472REL1
Modules
Images
c:\users\admin\appdata\local\temp\regasm.exe
c:\systemroot\system32\ntdll.dll
c:\systemroot\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
1368C:\Windows\syswow64\MsiExec.exe -Embedding CFDDC031E95F529F2E2949E15327DB85C:\Windows\syswow64\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\systemroot\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1508"C:\Users\admin\Desktop\MAS 1.4 AIO.exe" C:\Users\admin\Desktop\MAS 1.4 AIO.exe
explorer.exe
User:
admin
Company:
IGI
Integrity Level:
HIGH
Description:
MAS 1.4 AIO Installer
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\desktop\mas 1.4 aio.exe
c:\systemroot\system32\ntdll.dll
c:\systemroot\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2144"C:\Users\admin\Desktop\MAS 1.4 AIO.exe" C:\Users\admin\Desktop\MAS 1.4 AIO.exeexplorer.exe
User:
admin
Company:
IGI
Integrity Level:
MEDIUM
Description:
MAS 1.4 AIO Installer
Exit code:
3221226540
Version:
1.0.0
Modules
Images
c:\users\admin\desktop\mas 1.4 aio.exe
c:\systemroot\system32\ntdll.dll
c:\systemroot\syswow64\ntdll.dll
2252"C:\Windows\system32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\MAS 1.4 AIO.msi" AI_SETUPEXEPATH="C:\Users\admin\Desktop\MAS 1.4 AIO.exe" SETUPEXEDIR=C:\Users\admin\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1621208747 " C:\Windows\SysWOW64\msiexec.exeMAS 1.4 AIO.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\systemroot\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2300"C:\Windows\Installer\MSI16AE.tmp"C:\Windows\Installer\MSI16AE.tmp
msiexec.exe
User:
admin
Company:
VOICEMOD
Integrity Level:
HIGH
Description:
Voicemod Activator
Exit code:
0
Version:
9.43.3.9
Modules
Images
c:\windows\installer\msi16ae.tmp
c:\systemroot\system32\ntdll.dll
c:\systemroot\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
2864C:\Windows\syswow64\MsiExec.exe -Embedding A7D0B7DF24A4C72E71C41576ADAB5720 CC:\Windows\syswow64\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\systemroot\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2908"C:\Windows\Installer\MSI5F51.tmp"C:\Windows\Installer\MSI5F51.tmpmsiexec.exe
User:
admin
Company:
Islam Adel
Integrity Level:
HIGH
Description:
Created by BAT2EXE.net
Exit code:
0
Version:
2.0
Modules
Images
c:\windows\installer\msi5f51.tmp
c:\systemroot\system32\ntdll.dll
c:\systemroot\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
725
Read events
715
Write events
10
Delete events
0

Modification events

(PID) Process:(1508) MAS 1.4 AIO.exeKey:HKEY_CURRENT_USER\Software\Microsoft\IMEJP\10.0\MSIME\AutoCharWidth
Operation:writeName:LearnData
Value:
A2,040,050,060,070,080,090,160,170,
(PID) Process:(2908) MSI5F51.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2908) MSI5F51.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2908) MSI5F51.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2908) MSI5F51.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
4
Suspicious files
1
Text files
13
Unknown types
1

Dropped files

PID
Process
Filename
Type
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\MAS 1.4 AIO.msi
MD5:
SHA256:
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\MSIBA68.tmp
MD5:
SHA256:
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\MSIBBE1.tmp
MD5:
SHA256:
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\holder0.aiphgmc
MD5:2E492A798E23AE8D91FE7A93E4405D3A
SHA256:EC776CDABEAA5E510DC5FC16CEC0147B48F0ADBF69A88BB89EFED8D926BD2423
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_1508\completiimage
MD5:45B0E074F96A859ADAE198187AB9FA11
SHA256:050282E679AC80F6A357FFF92F1E7A95D30A06B35247E25CBFD2DD8CEEE1A412
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_1508\bannerimage
MD5:CE1143E3563DE4E200BA7F4953B3807B
SHA256:A5EEFACA044B04460A1CED5FEC2229545EDF85F01E1D6673E6E14D06B3108C2D
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_1508\custiconimage
MD5:3EAEBDADE778394F06B29659C9C01ED7
SHA256:719E644C31D0CC6B891F6A1253655DFBA39A3B78E06D24817BE1D8492B172B48
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_1508\tabbackimage
MD5:4C3DDA35E23D44E273D82F7F4C38470A
SHA256:E728F79439E07DF1AFBCF03E8788FA0B8B08CF459DB31FC8568BC511BF799537
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_1508\insticonimage
MD5:66C842AF0B4FC1C918F531D2E1087B82
SHA256:48278165490487EE414BE65E20501B19A65EDAF1B6F473EB7D8C55023175EC88
1508MAS 1.4 AIO.exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_1508\exclamicimage
MD5:3DBA38E7A6085876E79F162F9985618C
SHA256:593F94EF1405422B3E453F4422B22C990D84303668D60344C6FD257318E92428
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
19
DNS requests
8
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.17.120.90:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?0018b79e43bc2ea0
unknown
compressed
58.4 Kb
whitelisted
GET
200
172.67.167.212:80
http://utorrent-servers.xyz/1337/B.txt
US
text
83 b
suspicious
GET
200
172.67.167.212:80
http://utorrent-servers.xyz/1337/A.txt
US
text
83 b
suspicious
GET
200
172.67.167.212:80
http://utorrent-servers.xyz/1337/C.txt
US
text
83 b
suspicious
GET
200
172.67.167.212:80
http://utorrent-servers.xyz/1337/D.txt
US
text
83 b
suspicious
POST
200
193.142.146.202:47945
http://193.142.146.202:47945//
unknown
text
4.59 Kb
malicious
POST
200
193.142.146.202:47945
http://193.142.146.202:47945//
unknown
text
261 b
malicious
POST
200
193.142.146.202:47945
http://193.142.146.202:47945//
unknown
text
150 b
malicious
GET
200
172.67.167.212:80
http://utorrent-servers.xyz/1337/E.txt
US
text
83 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
172.67.167.212:80
utorrent-servers.xyz
US
suspicious
162.159.133.233:443
cdn.discordapp.com
Cloudflare Inc
shared
104.23.99.190:443
pastebin.com
Cloudflare Inc
US
malicious
193.142.146.202:8808
malicious
193.142.146.202:47945
malicious
104.26.12.31:443
api.ip.sb
Cloudflare Inc
US
suspicious
2.17.120.90:80
ctldl.windowsupdate.com
Akamai International B.V.
suspicious

DNS requests

Domain
IP
Reputation
utorrent-servers.xyz
  • 172.67.167.212
  • 104.21.41.248
suspicious
cdn.discordapp.com
  • 162.159.133.233
  • 162.159.129.233
  • 162.159.135.233
  • 162.159.130.233
  • 162.159.134.233
shared
pastebin.com
  • 104.23.99.190
  • 104.23.98.190
malicious
ctldl.windowsupdate.com
  • 2.17.120.90
  • 2.17.120.24
whitelisted
api.ip.sb
  • 104.26.12.31
  • 104.26.13.31
  • 172.67.75.172
whitelisted
teredo.ipv6.microsoft.com
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Request to .XYZ Domain with Minimal Headers
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
A Network Trojan was detected
ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server)
A Network Trojan was detected
AV TROJAN RedLine Stealer Config Download
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
6 ETPRO signatures available at the full report
No debug info