| File name: | Windows Session Manager.exe |
| Full analysis: | https://app.any.run/tasks/cdca0605-21cb-4f33-a1e1-176afc274271 |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | December 14, 2023, 23:21:14 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 346BA1D0419AF2730DE45A7DA7FD7EF0 |
| SHA1: | 2D4C79137A4A14F5B992DD91F053A83CDD382847 |
| SHA256: | CA74ADA70EE8A46E7ED67EE7F5422370B31DD6E43D40970F79128556670E9D2C |
| SSDEEP: | 1536:HdPjDxl5YZIKIOHxwNLanTq5VD1CF6ABFQXjbCJyDLz62yhv1aX9:HdPjDxlmZIJYxyR1C49jbCJyDLz6v969 |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:05:17 15:30:29+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 11 |
| CodeSize: | 86528 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1708e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 111111111111111111111111.exe |
| LegalCopyright: | |
| OriginalFileName: | 111111111111111111111111.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1864 | "C:\Users\admin\AppData\Local\Temp\Windows Session Manager.exe" | C:\Users\admin\AppData\Local\Temp\Windows Session Manager.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 2076 | "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Session Manager';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Session Manager' -Value '"C:\Users\admin\AppData\Roaming\Windows Session Manager\Windows Session Manager.exe"' -PropertyType 'String' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | Windows Session Manager.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2528 | schtasks /create /tn \Windows Session Manager /tr "C:\Users\admin\AppData\Roaming\Windows Session Manager\Windows Session Manager.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /f | C:\Windows\System32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 2147500037 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2632 | "cmd" /C schtasks /create /tn \Windows Session Manager /tr "C:\Users\admin\AppData\Roaming\Windows Session Manager\Windows Session Manager.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /f | C:\Windows\System32\cmd.exe | — | Windows Session Manager.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 2147500037 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2908 | #cmd | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Windows Session Manager.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.8.3761.0 built by: NET48REL1 Modules
AsyncRat(PID) Process(2908) RegAsm.exe C2 (1)217.64.31.3 Ports (2)8808 8437 BotnetWindows Session Manager Version0.5.7B Options AutoRunfalse MutexWindows Session Manager InstallFolder%AppData% BSoDfalse AntiVMfalse Certificates Cert1MIIE4jCCAsqgAwIBAgIQAJmupDKFEn4QYTi6VNAu5zANBgkqhkiG9w0BAQ0FADASMRAwDgYDVQQDDAd3YXJyaW9yMCAXDTIyMDEzMDE3MzkzNFoYDzk5OTkxMjMxMjM1OTU5WjASMRAwDgYDVQQDDAd3YXJyaW9yMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA1p1heFXbFVfmtOd5Qw+jVCq6buTiUXzCHJ9ogNwGpJyyNyN70miKC4VIi30fCZ1IXcc8rAM4ODRzPV6HEPOKw29lKaG6kXtr... Server_SignatureC79KvAXqeWNypPjSnsZWSXqvPH8g8lK8T3NJEMNEtmPa9vyqYMEPuTK4ruE1X78a31N52HJRyci/di8uAIUIzjKA2O+IDXtADiKhcOMQ774osQokab44CwyuP6B9b1dwDPJtqM9QTWZ845u9x8KwIt2lEp/qJivLP62rwCy+Er7Ii9VJyRxynu3T2CO9nBmRpDk1MnOajwGmWuoXOWP6tz21sp1d/RCrAkM9A+iVAnvyS3DrNM6jxvX8GEyi7alq9aMNUajm8VifQL82ZjapIyvETNyHsQHNFGmbksM/eY2W... Keys AES3d743405c5b7f48e626e812c0257eaef5c78eda6d768679cf0126960a60a9032 Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941 | |||||||||||||||
| (PID) Process: | (2076) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2908) RegAsm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2076 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LHSC91K4JXRQQ74AIGUX.temp | binary | |
MD5:16F6D260068B85896C0EBB2E1B2A60D1 | SHA256:6E3B1EF1FB4736A9BF18FADF8E42935CC5053478B6F403A38EFBA8500E819984 | |||
| 2076 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:16F6D260068B85896C0EBB2E1B2A60D1 | SHA256:6E3B1EF1FB4736A9BF18FADF8E42935CC5053478B6F403A38EFBA8500E819984 | |||
| 2076 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF20fe78.TMP | binary | |
MD5:16F6D260068B85896C0EBB2E1B2A60D1 | SHA256:6E3B1EF1FB4736A9BF18FADF8E42935CC5053478B6F403A38EFBA8500E819984 | |||
| 1864 | Windows Session Manager.exe | C:\Users\admin\AppData\Roaming\Windows Session Manager\Windows Session Manager.exe | executable | |
MD5:346BA1D0419AF2730DE45A7DA7FD7EF0 | SHA256:CA74ADA70EE8A46E7ED67EE7F5422370B31DD6E43D40970F79128556670E9D2C | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2908 | RegAsm.exe | 217.64.31.3:8808 | — | Baktelekom | AZ | malicious |
2908 | RegAsm.exe | 217.64.31.3:8437 | — | Baktelekom | AZ | malicious |
Domain | IP | Reputation |
|---|---|---|
dns.msftncsi.com |
| shared |