| File name: | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386 |
| Full analysis: | https://app.any.run/tasks/e8c2b087-b3e1-4afe-902b-873fb40e96c5 |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | October 19, 2024, 21:24:30 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 13D33A7B26B28C2FCD4508B5207DF238 |
| SHA1: | 191D203C8D3BB987E900E48327F7A6C263886835 |
| SHA256: | E407BD010E2E640169A2812066864CD837B10506F01316DC2CADA9BA64D99428 |
| SSDEEP: | 98304:DxEBvwbysyCtlfSoEgDDv3EzeqN6P/BIeSiPrHFdXW/1tz+BWoSNvScqsMe1TuVd:w8auBHpH |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:02:24 19:19:54+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 28160 |
| InitializedDataSize: | 430080 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x3883 |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2464 | choice /d y /t 5 | C:\Windows\SysWOW64\choice.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Offers the user a choice Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3848 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4308 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5512 | findstr /I "wrsa opssvc" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6128 | "C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe" | C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 6132 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6220 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6264 | cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit | C:\Windows\SysWOW64\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6268 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6272 | cmd /c copy /b ..\Te + ..\Parameters + ..\Johns + ..\Confused + ..\Consumers + ..\Cnet + ..\Calls + ..\Alfred + ..\None + ..\Art + ..\Unknown + ..\Nebraska + ..\Involved + ..\Calling + ..\Hollow + ..\Hosted + ..\Dist + ..\Vertical + ..\Correct + ..\Targets + ..\Anaheim + ..\Alternatively + ..\Estate + ..\Japan + ..\Captured + ..\Nuclear + ..\Models + ..\Ot G | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Cnet | binary | |
MD5:68890D51CB0ECE29142A05CB0AB3F4BC | SHA256:6C2F0AFC26C2B6838375AEA37237A8ACD842D72C059CF9A66546A79E8349BBC6 | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Alfred | binary | |
MD5:7B82AAC5BA88396775B8F3173E91403D | SHA256:AB53319AE2295ADBABCF2FA548C35DC7E8642EE62641AA6357E9125EE7338267 | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Te | binary | |
MD5:FE2CA33A4167BEF5F023DDC1A3E5BB6D | SHA256:EEC5DFD66EF58685531D5F55D845169F0C34451AD3BF2DB66A21CB0DAD8206F6 | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Captured | binary | |
MD5:96AF429F794BA78F8BEB826D566018C7 | SHA256:BABDB51712BF6D4BD2A83BD9176F559C99E176F385E539BF02C4188C67E0EFA2 | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Unknown | binary | |
MD5:7AB98FCE4130E3100F18252DB5DDED37 | SHA256:4B8F9EDC67CD96164BAC6B2F1408A9436EEE45B93B2BFBE1DA1278ED1F5ACAD8 | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Japan | binary | |
MD5:ED3A4D96573E7CE28CFD664F7F7989D4 | SHA256:887AC8A2305F52B30AC886381FED01A59422161386D1BC27C264FCA170F3049B | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Anaheim | binary | |
MD5:EC6A0C7B3742AFBB6FE466DBE45FB820 | SHA256:87451F7A997D1F22D5517E7CB3EA77652427172C1AB5A256950DE5B1F05AD748 | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Hosted | binary | |
MD5:DBDCC84DBFB90C8D5C5261844DF7A2BC | SHA256:07A00A266F402AD89E8E4A05BD1434A6FE633DF35CC6CFA9223A09AFC8FE9B01 | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Nuclear | binary | |
MD5:94C0DC843CCBDD75A39430FA463D38FA | SHA256:F683B2A6785C4DC9DBB6863D1181FA4F7BCE625EC5675B00AB231245159397C5 | |||
| 6128 | SecuriteInfo.com.HEUR.Backdoor.Win32.Agent.gen.2809.4386.exe | C:\Users\admin\AppData\Local\Temp\Chinese | text | |
MD5:2E00D0F6AF91688A43507C48293C2A7E | SHA256:6D6D8FC1C6231AACDC53C5157450E198B5DA7DC71C6A1010DF7EDD2A3AC9DCE4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6376 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7088 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
2272 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2272 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4360 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6944 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7044 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5488 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6944 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6944 | svchost.exe | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
6944 | svchost.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4360 | SearchApp.exe | 2.23.209.130:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
4360 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
auDeGomSZWrkabbWPWPAb.auDeGomSZWrkabbWPWPAb |
| unknown |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
th.bing.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6852 | RegAsm.exe | Domain Observed Used for C2 Detected | REMOTE [ANY.RUN] AsyncRAT SSL certificate |
6852 | RegAsm.exe | Malware Command and Control Activity Detected | REMOTE [ANY.RUN] AsyncRAT Successful Connection |