Malware Analysis Report

2024-08-06 19:31

Sample ID 240519-e2h4qaae22
Target 093bc49ab25cc6a20d95155db80f1fa8.exe
SHA256 0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b
Tags
asyncrat darkcomet 2024+may3333-newcrt persistence rat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b

Threat Level: Known bad

The file 093bc49ab25cc6a20d95155db80f1fa8.exe was found to be: Known bad.

Malicious Activity Summary

asyncrat darkcomet 2024+may3333-newcrt persistence rat trojan upx

Darkcomet

AsyncRat

Modifies WinLogon for persistence

Async RAT payload

Drops file in Drivers directory

Loads dropped DLL

UPX packed file

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Suspicious use of SetWindowsHookEx

Modifies registry class

Creates scheduled task(s)

Delays execution with timeout.exe

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-19 04:26

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-19 04:26

Reported

2024-05-19 04:28

Platform

win7-20240419-en

Max time kernel

148s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe"

Signatures

AsyncRat

rat asyncrat

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\winrar = "C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\winrar = "C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\Documents\rar.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Roaming\audiodrvs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\audiodrvs.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\rar.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2460 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp
PID 2460 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp
PID 2460 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp
PID 2460 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp
PID 2028 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 2028 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 2028 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 2028 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 2028 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2028 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2028 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2028 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2768 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp
PID 2768 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp
PID 2768 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Windows\SysWOW64\notepad.exe
PID 2028 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\Documents\rar.exe
PID 2028 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\Documents\rar.exe
PID 2028 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\Documents\rar.exe
PID 2028 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp C:\Users\Admin\Documents\rar.exe
PID 2608 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 2608 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 2608 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 2608 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 1576 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 1576 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 1576 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 1576 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 2620 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp C:\Windows\System32\schtasks.exe
PID 2620 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp C:\Windows\System32\schtasks.exe
PID 2620 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp C:\Windows\System32\schtasks.exe
PID 2620 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp C:\Windows\system32\cmd.exe
PID 2620 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp C:\Windows\system32\cmd.exe
PID 2620 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 1984 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 2444 wrote to memory of 1984 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 2444 wrote to memory of 1984 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 2444 wrote to memory of 264 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe
PID 2444 wrote to memory of 264 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe
PID 2444 wrote to memory of 264 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe

"C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe"

C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp

"C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp"

C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE

"C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE"

C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE

"C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE"

C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp

"C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Users\Admin\Documents\rar.exe

"C:\Users\Admin\Documents\rar.exe"

C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE

"C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "logons" /XML "C:\Users\Admin\AppData\Local\Temp\tmp341B.tmp" /F

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'audiodrvs"' /tr "'C:\Users\Admin\AppData\Roaming\audiodrvs.exe"'

C:\Windows\system32\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5DF8.tmp.bat""

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\AppData\Roaming\audiodrvs.exe

"C:\Users\Admin\AppData\Roaming\audiodrvs.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 dgorijan20785.hopto.org udp
NL 172.111.216.4:35800 dgorijan20785.hopto.org tcp
US 8.8.8.8:53 dgorijan20785.hopto.org udp
NL 172.111.216.4:4488 dgorijan20785.hopto.org tcp
NL 172.111.216.4:4488 dgorijan20785.hopto.org tcp
NL 172.111.216.4:4488 dgorijan20785.hopto.org tcp
NL 172.111.216.4:8808 dgorijan20785.hopto.org tcp

Files

memory/2460-0-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2460-2-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2460-1-0x00000000006BD000-0x00000000006BE000-memory.dmp

memory/2460-4-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2460-3-0x0000000000400000-0x00000000007956B4-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sms1B8C.tmp

MD5 89feeb6ec82c704b1771bfa2536bd401
SHA1 2ae958b6e74986696e412e313b5f0aee3756ba19
SHA256 9765068707da158f492b48d5628b3b6cc93dc34dd402d57c0b4ced60701e0b9a
SHA512 9ef8c9c1c9795cf4451dd577c2292171c7dccb9aa24447dff72de9e886e604638b32f637ba8e19cfc86c377fed7a97c56336a62f7edd6130d4a8b928f5bf0484

memory/2028-11-0x0000000000400000-0x000000000055B000-memory.dmp

memory/2028-12-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE

MD5 f6062ddb9cc2fad6e403b8b9dbe02df7
SHA1 efebcabb3902cdcc7b789786d96db2a93156b81a
SHA256 61309415bb524bba3d6065cf5df5ce2031ddde239c7f7864d0d2eaf31597a96c
SHA512 3d2473fd09d5d0a4a0f463ed84522165254880a6f94491b5c9a21fbbd39df4579980184fd838f75b3ad6457065c818c536447ae18c97eac29146cd8be5883040

memory/2768-30-0x0000000000400000-0x00000000004E05B0-memory.dmp

memory/2028-29-0x0000000003690000-0x0000000003771000-memory.dmp

memory/2028-28-0x0000000003690000-0x0000000003771000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE

MD5 b8eaef2339ba6bfac3648df30d041a95
SHA1 0833419f0da847383c0031611c69a87baa8f2d6d
SHA256 6ce2b4a0e176126f0899223eace35c31b544e46a2067b0ecf0adf8d06f87309d
SHA512 c265a39039c9dd8237fb10c26066ff7247babc727a556919f7673311dee1d38c3a52a2cf83e54f148401b984495b4e5636b8254388376e96f0a4e9a40cba6613

memory/2768-38-0x0000000000400000-0x00000000004E05B0-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sms1D02.tmp

MD5 194de251c043183099b2d6f7f5d1e09f
SHA1 dc477dfc0e090e8d7bd31fb808f59060dd2cf360
SHA256 12bee16f9692cb9a6d3713543cf998a4f953d0341f4e9c661748faef525d91e6
SHA512 6a1433b9bc070f18f60c3f115a1173e8979d211f6e97daf3fc7fe13f05ab15123874919418fc014fdd8af62c82426cb091b867b36a49fe7fc8fe929709b3a433

memory/2608-42-0x0000000001300000-0x000000000136E000-memory.dmp

memory/2620-43-0x0000000000C50000-0x0000000000C62000-memory.dmp

memory/2608-44-0x0000000000290000-0x0000000000296000-memory.dmp

memory/2676-45-0x00000000000C0000-0x00000000000C1000-memory.dmp

memory/2676-73-0x00000000001D0000-0x00000000001D1000-memory.dmp

memory/2592-93-0x0000000000400000-0x000000000055B000-memory.dmp

memory/2028-92-0x0000000004190000-0x00000000042EB000-memory.dmp

memory/2028-91-0x0000000004190000-0x00000000042EB000-memory.dmp

memory/1576-90-0x00000000009C0000-0x0000000000A2E000-memory.dmp

memory/2028-94-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp341B.tmp

MD5 db5e3f14b64ed69affa1389010cd445e
SHA1 752719617c787dbb741cfd4e8a608dd2f578d4c9
SHA256 eaeea05441cdf6ec90fd034de26b0108920f2d625f308497ebe7c05be8b69cc4
SHA512 8ee07a3e1684fb72852ad954b985db0d5a3931be5037a1fa8cb62677401d52042d80a80f27e1692edfef1d9f15b1d0cb8b8633b0414727cd775b04c4bb5e7fa9

memory/2592-100-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5DF8.tmp.bat

MD5 aa594c88e9638f61f90a2e1280f3fd00
SHA1 ba6d276b6466f4950a7480a913a991325ceed073
SHA256 cc4a7b775ca701a010715253303c8eace823aaa2eaf6b0110d9aa618eaa4ed1e
SHA512 33c1a4a8f59aafe53a64c40635a5ec370785bc9227a7e8d4348739c60d1e5cc8d6f35c124186181fe7ef0ca74a242b4073bc724aea1026c9443ba4f410928b45

memory/264-114-0x0000000000CC0000-0x0000000000CD2000-memory.dmp

C:\Users\Admin\AppData\Roaming\audiodrvs.exe

MD5 e5a06d76074b883dce2905e58d64ff0a
SHA1 1fa4fb3f08d63af84752b308b678be903dbb093c
SHA256 e2905d6d8925f155f2ecf8092c60090c986dee476e1c9d154f1f03aa649d8ea8
SHA512 2e13cc7626e5cac7bcf970389b6d06f3ef521027382e2f5a7dad6b92d2bb7e585435930502c2080760dac8f6be37ebc20115656fc7c8b14d5be106fd1ad4a376

memory/2592-115-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab7EC3.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

memory/2592-132-0x0000000000400000-0x000000000055B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-19 04:26

Reported

2024-05-19 04:28

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe"

Signatures

AsyncRat

rat asyncrat

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE N/A
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winrar = "C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winrar = "C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\Documents\rar.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Roaming\audiodrvs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 36 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\audiodrvs.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\rar.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3708 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp
PID 3708 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp
PID 3708 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp
PID 4328 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 4328 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 4328 wrote to memory of 220 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 4328 wrote to memory of 220 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 4328 wrote to memory of 220 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2928 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp
PID 2928 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 4328 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Windows\SysWOW64\notepad.exe
PID 220 wrote to memory of 4772 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 220 wrote to memory of 4772 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 220 wrote to memory of 4772 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 4328 wrote to memory of 4124 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Users\Admin\Documents\rar.exe
PID 4328 wrote to memory of 4124 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Users\Admin\Documents\rar.exe
PID 4328 wrote to memory of 4124 N/A C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp C:\Users\Admin\Documents\rar.exe
PID 4772 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 4772 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 4772 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 3124 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp C:\Windows\System32\schtasks.exe
PID 3124 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp C:\Windows\System32\schtasks.exe
PID 3124 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp C:\Windows\system32\cmd.exe
PID 3124 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp C:\Windows\system32\cmd.exe
PID 3004 wrote to memory of 984 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 3004 wrote to memory of 984 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 3004 wrote to memory of 4320 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe
PID 3004 wrote to memory of 4320 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe

"C:\Users\Admin\AppData\Local\Temp\093bc49ab25cc6a20d95155db80f1fa8.exe"

C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp

"C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp"

C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE

"C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE"

C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE

"C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE"

C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp

"C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE

"C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE"

C:\Users\Admin\Documents\rar.exe

"C:\Users\Admin\Documents\rar.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "logons" /XML "C:\Users\Admin\AppData\Local\Temp\tmp612B.tmp" /F

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'audiodrvs"' /tr "'C:\Users\Admin\AppData\Roaming\audiodrvs.exe"'

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8B96.tmp.bat""

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\AppData\Roaming\audiodrvs.exe

"C:\Users\Admin\AppData\Roaming\audiodrvs.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 dgorijan20785.hopto.org udp
NL 172.111.216.4:35800 dgorijan20785.hopto.org tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 4.216.111.172.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 dgorijan20785.hopto.org udp
NL 172.111.216.4:4488 dgorijan20785.hopto.org tcp
NL 172.111.216.4:4488 dgorijan20785.hopto.org tcp
NL 172.111.216.4:4488 dgorijan20785.hopto.org tcp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
NL 172.111.216.4:6606 dgorijan20785.hopto.org tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp

Files

memory/3708-0-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3708-2-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3708-1-0x00000000006BB000-0x00000000006BC000-memory.dmp

memory/3708-3-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3708-4-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3708-6-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3708-5-0x0000000000400000-0x00000000007956B4-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sms48FF.tmp

MD5 89feeb6ec82c704b1771bfa2536bd401
SHA1 2ae958b6e74986696e412e313b5f0aee3756ba19
SHA256 9765068707da158f492b48d5628b3b6cc93dc34dd402d57c0b4ced60701e0b9a
SHA512 9ef8c9c1c9795cf4451dd577c2292171c7dccb9aa24447dff72de9e886e604638b32f637ba8e19cfc86c377fed7a97c56336a62f7edd6130d4a8b928f5bf0484

memory/4328-11-0x0000000000400000-0x000000000055B000-memory.dmp

memory/4328-12-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE

MD5 f6062ddb9cc2fad6e403b8b9dbe02df7
SHA1 efebcabb3902cdcc7b789786d96db2a93156b81a
SHA256 61309415bb524bba3d6065cf5df5ce2031ddde239c7f7864d0d2eaf31597a96c
SHA512 3d2473fd09d5d0a4a0f463ed84522165254880a6f94491b5c9a21fbbd39df4579980184fd838f75b3ad6457065c818c536447ae18c97eac29146cd8be5883040

C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE

MD5 b8eaef2339ba6bfac3648df30d041a95
SHA1 0833419f0da847383c0031611c69a87baa8f2d6d
SHA256 6ce2b4a0e176126f0899223eace35c31b544e46a2067b0ecf0adf8d06f87309d
SHA512 c265a39039c9dd8237fb10c26066ff7247babc727a556919f7673311dee1d38c3a52a2cf83e54f148401b984495b4e5636b8254388376e96f0a4e9a40cba6613

memory/2928-32-0x0000000000400000-0x00000000004E05B0-memory.dmp

memory/220-36-0x0000000072EEE000-0x0000000072EEF000-memory.dmp

memory/220-38-0x00000000002B0000-0x000000000031E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sms4B70.tmp

MD5 194de251c043183099b2d6f7f5d1e09f
SHA1 dc477dfc0e090e8d7bd31fb808f59060dd2cf360
SHA256 12bee16f9692cb9a6d3713543cf998a4f953d0341f4e9c661748faef525d91e6
SHA512 6a1433b9bc070f18f60c3f115a1173e8979d211f6e97daf3fc7fe13f05ab15123874919418fc014fdd8af62c82426cb091b867b36a49fe7fc8fe929709b3a433

memory/3124-43-0x00000000004E0000-0x00000000004F2000-memory.dmp

memory/220-44-0x0000000002610000-0x0000000002616000-memory.dmp

memory/2636-45-0x0000000000FC0000-0x0000000000FC1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PRINTSERV.EXE.log

MD5 916851e072fbabc4796d8916c5131092
SHA1 d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA256 7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA512 07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

memory/4328-118-0x0000000000400000-0x000000000055B000-memory.dmp

memory/3708-120-0x0000000000400000-0x00000000007956B4-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp612B.tmp

MD5 db5e3f14b64ed69affa1389010cd445e
SHA1 752719617c787dbb741cfd4e8a608dd2f578d4c9
SHA256 eaeea05441cdf6ec90fd034de26b0108920f2d625f308497ebe7c05be8b69cc4
SHA512 8ee07a3e1684fb72852ad954b985db0d5a3931be5037a1fa8cb62677401d52042d80a80f27e1692edfef1d9f15b1d0cb8b8633b0414727cd775b04c4bb5e7fa9

memory/4772-124-0x0000000005AB0000-0x0000000005B16000-memory.dmp

memory/2928-125-0x0000000000400000-0x00000000004E05B0-memory.dmp

memory/4124-126-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp8B96.tmp.bat

MD5 270cd75762c89e7a1e797bb00077b2fb
SHA1 f938ba5aada410d5e8d4ef5c2d59728867ec4e51
SHA256 b81b2380a0ab0a42ebf97f3abc764dd3e9a61af0525375f80243fe7876c03659
SHA512 8ce446636643964317059c47f5236b23392ceca724401c5d053e80fc697d0b36a2edd4fdd2ce035e707c4e1450ef6a7ed795722a21179a4b4d35dfa115862054

C:\Users\Admin\AppData\Roaming\audiodrvs.exe

MD5 1162e38b0df9acf1cada113dc587f2de
SHA1 e32b7bdcb177468fe492f34673b0b9e6e6df5ebc
SHA256 c2fe20d38baf0ceda154bba444aefecfa436b16162195d0aa68a67df89456f7b
SHA512 c496ecd07e5369bc9f041174f6dad099d650a1a14d70f506e6ab00c11e8fc04b18c330d737ef86b00172392fe7701babb967ee54f63066e0b01418436139df98

memory/4124-136-0x0000000000400000-0x000000000055B000-memory.dmp

memory/4124-139-0x0000000000400000-0x000000000055B000-memory.dmp