File name: | MpAsDesc2.ps1 |
Full analysis: | https://app.any.run/tasks/230d4ab2-23b4-4c75-b5d0-70e0033c78ff |
Verdict: | Malicious activity |
Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
Analysis date: | December 06, 2022, 04:06:56 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines, with CRLF line terminators |
MD5: | 4647F40203245D8CE89851BA2247F97A |
SHA1: | 96131A44177CC3A5FF232DE00E35E2B27AC6C416 |
SHA256: | EE6B62E13AB77EF3321F522F5A3D9AF3E7E1CFE0599EE041A9FB01A725D0A260 |
SSDEEP: | 1536:tz5LkCs68+OHLBdyb3YE4ZeLXxMxgswiYD:j |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2960 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\Desktop\MpAsDesc2.ps1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
320 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: aspnet_compiler.exe Version: 4.0.30319.34209 built by: FX452RTMGDR Modules
AsyncRat(PID) Process(320) aspnet_compiler.exe Install_Folder%AppData% Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941 Aes_Keyf970f413e7e4298ffc9583602155520569b6434ec87e2e090c0b54fc1bd865b2 BotnetMIDO-WORK bdosfalse PasteBinnull AntiVMfalse Server_SignatureVN2D2Z1oRjWtMuSmQOcJBmBH7zCi61cupUeTfY718l4yXUCLjlmX4+9qazHKc6QETaxgmnDFY9bl52IJZoAuocphfpOahwc7Pghm9aCfxDQ0854+/eG2KybkWLNHkdT9Po177QHo2lPZKtlTQJLTj7ESs1a/DaoQ6R8sVHr1cXlENiHhP63tXI9AdG971BtrlDbhVTkahoK4oLaE/iZbP3ZPs/l03lULyRqNDcKECY6MEM804S/6McOtl8wjwWGesme+1o+N1z40NccBBbm8Mt2ddRxEc0IMRG6dTibdhvPP... CertificateMIIE3DCCAsSgAwIBAgIQAPVpZy0leHCT13LL6pOu9zANBgkqhkiG9w0BAQ0FADAPMQ0wCwYDVQQDDAR3b3JrMCAXDTIxMDkwMTIwMjMyMloYDzk5OTkxMjMxMjM1OTU5WjAPMQ0wCwYDVQQDDAR3b3JrMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAnmbPiCdtIc5t0kDrh3cQE22ayQ+0YbeEBERIu2kr/z1+y1rHlqM260QFxA9n/RaHZtbaBKz6AO/68kvn9ZJ2mBOAesLCnCOY4AEfPSRG... MutexAsyncMutex_6SI8OkPnk Autorunfalse Version0.5.7B Ports (1)6666 C2 (1)2pop.ddns.net |
(PID) Process: | (2960) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2960) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (2960) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (2960) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (2960) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (320) aspnet_compiler.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US |
PID | Process | Filename | Type | |
---|---|---|---|---|
2960 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFd9d1b.TMP | binary | |
MD5:619B4771394AF7474511668357F7991D | SHA256:3891B10E63436A5DB6A28067A45B6E156054F9B54BB3204326B230C944C5BB1F | |||
2960 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YL9TRZ6C4J3G73ZNLP51.temp | binary | |
MD5:20C7A69B557365A48E8001CB99C54B6D | SHA256:D682DFBFD19BC0A95D0FE010B7ECA890A02A87921FB5AF0A416D3BF79C5014CA | |||
2960 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:20C7A69B557365A48E8001CB99C54B6D | SHA256:D682DFBFD19BC0A95D0FE010B7ECA890A02A87921FB5AF0A416D3BF79C5014CA | |||
2960 | powershell.exe | C:\Users\admin\AppData\Local\Temp\g513u1lm.ad0.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B | |||
2960 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | dbf | |
MD5:446DD1CF97EABA21CF14D03AEBC79F27 | SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF | |||
2960 | powershell.exe | C:\Users\admin\AppData\Local\Temp\2dtjhgbn.xnr.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
Domain | IP | Reputation |
---|---|---|
2pop.ddns.net |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |