Malware Analysis Report

2024-08-06 19:32

Sample ID 240520-bdd83scc22
Target 0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe
SHA256 0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b
Tags
asyncrat darkcomet 2024+may3333-newcrt persistence rat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b

Threat Level: Known bad

The file 0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe was found to be: Known bad.

Malicious Activity Summary

asyncrat darkcomet 2024+may3333-newcrt persistence rat trojan upx

AsyncRat

Modifies WinLogon for persistence

Darkcomet

Detects executables packed with eXPressor

Detects file containing reversed ASEP Autorun registry keys

Async RAT payload

Detects executables packed with eXPressor

UPX dump on OEP (original entry point)

Drops file in Drivers directory

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

UPX packed file

Adds Run key to start application

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Delays execution with timeout.exe

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-20 01:01

Signatures

Detects executables packed with eXPressor

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-20 01:01

Reported

2024-05-20 01:03

Platform

win7-20240221-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe"

Signatures

AsyncRat

rat asyncrat

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Detects executables packed with eXPressor

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects file containing reversed ASEP Autorun registry keys

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\winrar = "C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\winrar = "C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\Documents\rar.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Roaming\audiodrvs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\audiodrvs.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\rar.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2696 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp
PID 2696 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp
PID 2696 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp
PID 2696 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp
PID 2228 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 2228 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 2228 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 2228 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 2228 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2228 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2228 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2228 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 2628 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp
PID 2628 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp
PID 2628 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp
PID 2544 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 2544 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 2544 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 2544 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\Documents\rar.exe
PID 2228 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\Documents\rar.exe
PID 2228 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\Documents\rar.exe
PID 2228 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp C:\Users\Admin\Documents\rar.exe
PID 2584 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 2668 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp C:\Windows\System32\schtasks.exe
PID 2668 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp C:\Windows\System32\schtasks.exe
PID 2668 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp C:\Windows\System32\schtasks.exe
PID 2668 wrote to memory of 540 N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp C:\Windows\system32\cmd.exe
PID 2668 wrote to memory of 540 N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp C:\Windows\system32\cmd.exe
PID 2668 wrote to memory of 540 N/A C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp C:\Windows\system32\cmd.exe
PID 540 wrote to memory of 560 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 540 wrote to memory of 560 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 540 wrote to memory of 560 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 540 wrote to memory of 884 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe
PID 540 wrote to memory of 884 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe
PID 540 wrote to memory of 884 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe

"C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe"

C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp

"C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp"

C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE

"C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE"

C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE

"C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE"

C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp

"C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp"

C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE

"C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Users\Admin\Documents\rar.exe

"C:\Users\Admin\Documents\rar.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "logons" /XML "C:\Users\Admin\AppData\Local\Temp\tmp312E.tmp" /F

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'audiodrvs"' /tr "'C:\Users\Admin\AppData\Roaming\audiodrvs.exe"'

C:\Windows\system32\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5CA1.tmp.bat""

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\AppData\Roaming\audiodrvs.exe

"C:\Users\Admin\AppData\Roaming\audiodrvs.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 dgorijan20785.hopto.org udp
BE 172.111.233.238:35800 dgorijan20785.hopto.org tcp
US 8.8.8.8:53 dgorijan20785.hopto.org udp
BE 172.111.233.238:4488 dgorijan20785.hopto.org tcp
BE 172.111.233.238:4488 dgorijan20785.hopto.org tcp
BE 172.111.233.238:4488 dgorijan20785.hopto.org tcp
BE 172.111.233.238:6606 dgorijan20785.hopto.org tcp

Files

memory/2696-2-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2696-1-0x00000000006BB000-0x00000000006BC000-memory.dmp

memory/2696-0-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2696-6-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2696-5-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2696-4-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2696-3-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/2228-13-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sms1AD1.tmp

MD5 89feeb6ec82c704b1771bfa2536bd401
SHA1 2ae958b6e74986696e412e313b5f0aee3756ba19
SHA256 9765068707da158f492b48d5628b3b6cc93dc34dd402d57c0b4ced60701e0b9a
SHA512 9ef8c9c1c9795cf4451dd577c2292171c7dccb9aa24447dff72de9e886e604638b32f637ba8e19cfc86c377fed7a97c56336a62f7edd6130d4a8b928f5bf0484

memory/2228-14-0x0000000000400000-0x000000000055B000-memory.dmp

memory/2628-37-0x0000000000400000-0x00000000004E05B0-memory.dmp

memory/2228-36-0x0000000003740000-0x0000000003821000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE

MD5 b8eaef2339ba6bfac3648df30d041a95
SHA1 0833419f0da847383c0031611c69a87baa8f2d6d
SHA256 6ce2b4a0e176126f0899223eace35c31b544e46a2067b0ecf0adf8d06f87309d
SHA512 c265a39039c9dd8237fb10c26066ff7247babc727a556919f7673311dee1d38c3a52a2cf83e54f148401b984495b4e5636b8254388376e96f0a4e9a40cba6613

C:\Users\Admin\AppData\Local\Temp\sms1BF9.tmp

MD5 194de251c043183099b2d6f7f5d1e09f
SHA1 dc477dfc0e090e8d7bd31fb808f59060dd2cf360
SHA256 12bee16f9692cb9a6d3713543cf998a4f953d0341f4e9c661748faef525d91e6
SHA512 6a1433b9bc070f18f60c3f115a1173e8979d211f6e97daf3fc7fe13f05ab15123874919418fc014fdd8af62c82426cb091b867b36a49fe7fc8fe929709b3a433

memory/2544-43-0x0000000000B90000-0x0000000000BFE000-memory.dmp

memory/2668-44-0x0000000000950000-0x0000000000962000-memory.dmp

memory/2228-35-0x0000000003740000-0x0000000003821000-memory.dmp

memory/2544-45-0x0000000000300000-0x0000000000306000-memory.dmp

\Users\Admin\AppData\Local\Temp\CHROMEL.EXE

MD5 f6062ddb9cc2fad6e403b8b9dbe02df7
SHA1 efebcabb3902cdcc7b789786d96db2a93156b81a
SHA256 61309415bb524bba3d6065cf5df5ce2031ddde239c7f7864d0d2eaf31597a96c
SHA512 3d2473fd09d5d0a4a0f463ed84522165254880a6f94491b5c9a21fbbd39df4579980184fd838f75b3ad6457065c818c536447ae18c97eac29146cd8be5883040

memory/2584-53-0x0000000000950000-0x00000000009BE000-memory.dmp

memory/2864-82-0x0000000000150000-0x0000000000151000-memory.dmp

memory/2864-54-0x0000000000080000-0x0000000000081000-memory.dmp

memory/2228-91-0x00000000056F0000-0x000000000584B000-memory.dmp

memory/2176-93-0x0000000000400000-0x000000000055B000-memory.dmp

memory/2228-92-0x00000000056F0000-0x000000000584B000-memory.dmp

memory/2228-95-0x0000000000400000-0x000000000055B000-memory.dmp

memory/2696-96-0x0000000000400000-0x00000000007956B4-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp312E.tmp

MD5 db5e3f14b64ed69affa1389010cd445e
SHA1 752719617c787dbb741cfd4e8a608dd2f578d4c9
SHA256 eaeea05441cdf6ec90fd034de26b0108920f2d625f308497ebe7c05be8b69cc4
SHA512 8ee07a3e1684fb72852ad954b985db0d5a3931be5037a1fa8cb62677401d52042d80a80f27e1692edfef1d9f15b1d0cb8b8633b0414727cd775b04c4bb5e7fa9

memory/2628-100-0x0000000000400000-0x00000000004E05B0-memory.dmp

memory/2176-101-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5CA1.tmp.bat

MD5 5ba34cc16ec7ba2dc6c9fafd228f9112
SHA1 bf2408a5a0561e7be4d7d286cd7b342020801fd7
SHA256 131af2c2c0bfac45f91ebaee9ff97baf3a235fa39e42ae3e71516ee90a47f391
SHA512 06628a19047ab24fe32036a8dff56b1d07fa5187117666dc6529298dbda7e1713378516fe4154044092adcc4e43f29ba25247fc9c8eb589ec38b9f41b850d493

C:\Users\Admin\AppData\Roaming\audiodrvs.exe

MD5 d62fcf7353112022be6bca68007fb31e
SHA1 7459cd5edac78c462d81a91638619d5df0635503
SHA256 88e11a1c8d28107821460898d641b0c298f0adec1020532503bc9dbeeb3d9ef2
SHA512 b82817adb572fe35e76ac4216dc4b6773c5de808b50da71bd1e755f64d35e7decc2d94e55d3f36db3f681243fe82b5b0327e74acf1841bed61892ef27812f9b9

memory/884-115-0x00000000009D0000-0x00000000009E2000-memory.dmp

memory/2176-134-0x0000000000400000-0x000000000055B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-20 01:01

Reported

2024-05-20 01:04

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe"

Signatures

AsyncRat

rat asyncrat

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Detects executables packed with eXPressor

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects file containing reversed ASEP Autorun registry keys

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE N/A
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winrar = "C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winrar = "C:\\Users\\Admin\\Documents\\rar.exe" C:\Users\Admin\Documents\rar.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Roaming\audiodrvs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: 36 N/A C:\Users\Admin\Documents\rar.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\audiodrvs.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\rar.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3144 wrote to memory of 1700 N/A C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp
PID 3144 wrote to memory of 1700 N/A C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp
PID 3144 wrote to memory of 1700 N/A C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp
PID 1700 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 1700 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE
PID 1700 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 1700 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 1700 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE
PID 1376 wrote to memory of 1888 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp
PID 1376 wrote to memory of 1888 N/A C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1700 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Windows\SysWOW64\notepad.exe
PID 1008 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 1008 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 1008 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE
PID 1700 wrote to memory of 1764 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Users\Admin\Documents\rar.exe
PID 1700 wrote to memory of 1764 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Users\Admin\Documents\rar.exe
PID 1700 wrote to memory of 1764 N/A C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp C:\Users\Admin\Documents\rar.exe
PID 2860 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 2860 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 2860 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE C:\Windows\SysWOW64\schtasks.exe
PID 1888 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp C:\Windows\System32\schtasks.exe
PID 1888 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp C:\Windows\System32\schtasks.exe
PID 1888 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp C:\Windows\system32\cmd.exe
PID 1888 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp C:\Windows\system32\cmd.exe
PID 1856 wrote to memory of 2688 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1856 wrote to memory of 2688 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1856 wrote to memory of 4288 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe
PID 1856 wrote to memory of 4288 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\audiodrvs.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe

"C:\Users\Admin\AppData\Local\Temp\0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe"

C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp

"C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp"

C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE

"C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE"

C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE

"C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE"

C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp

"C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE

"C:\Users\Admin\AppData\Local\Temp\XenoManager\PRINTSERV.EXE"

C:\Users\Admin\Documents\rar.exe

"C:\Users\Admin\Documents\rar.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "logons" /XML "C:\Users\Admin\AppData\Local\Temp\tmp638C.tmp" /F

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'audiodrvs"' /tr "'C:\Users\Admin\AppData\Roaming\audiodrvs.exe"'

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8E36.tmp.bat""

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\AppData\Roaming\audiodrvs.exe

"C:\Users\Admin\AppData\Roaming\audiodrvs.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 45.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 dgorijan20785.hopto.org udp
BE 172.111.233.238:35800 dgorijan20785.hopto.org tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 238.233.111.172.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 dgorijan20785.hopto.org udp
BE 172.111.233.238:4488 dgorijan20785.hopto.org tcp
BE 172.111.233.238:4488 dgorijan20785.hopto.org tcp
BE 172.111.233.238:4488 dgorijan20785.hopto.org tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
BE 172.111.233.238:8808 dgorijan20785.hopto.org tcp
US 8.8.8.8:53 99.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/3144-0-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3144-2-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3144-1-0x00000000006BB000-0x00000000006BC000-memory.dmp

memory/3144-4-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3144-3-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3144-5-0x0000000000400000-0x00000000007956B4-memory.dmp

memory/3144-6-0x0000000000400000-0x00000000007956B4-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sms4B80.tmp

MD5 89feeb6ec82c704b1771bfa2536bd401
SHA1 2ae958b6e74986696e412e313b5f0aee3756ba19
SHA256 9765068707da158f492b48d5628b3b6cc93dc34dd402d57c0b4ced60701e0b9a
SHA512 9ef8c9c1c9795cf4451dd577c2292171c7dccb9aa24447dff72de9e886e604638b32f637ba8e19cfc86c377fed7a97c56336a62f7edd6130d4a8b928f5bf0484

memory/1700-11-0x0000000000400000-0x000000000055B000-memory.dmp

memory/1700-12-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CHROMEL.EXE

MD5 f6062ddb9cc2fad6e403b8b9dbe02df7
SHA1 efebcabb3902cdcc7b789786d96db2a93156b81a
SHA256 61309415bb524bba3d6065cf5df5ce2031ddde239c7f7864d0d2eaf31597a96c
SHA512 3d2473fd09d5d0a4a0f463ed84522165254880a6f94491b5c9a21fbbd39df4579980184fd838f75b3ad6457065c818c536447ae18c97eac29146cd8be5883040

memory/1376-32-0x0000000000400000-0x00000000004E05B0-memory.dmp

C:\Users\Admin\AppData\Local\Temp\PRINTSERV.EXE

MD5 b8eaef2339ba6bfac3648df30d041a95
SHA1 0833419f0da847383c0031611c69a87baa8f2d6d
SHA256 6ce2b4a0e176126f0899223eace35c31b544e46a2067b0ecf0adf8d06f87309d
SHA512 c265a39039c9dd8237fb10c26066ff7247babc727a556919f7673311dee1d38c3a52a2cf83e54f148401b984495b4e5636b8254388376e96f0a4e9a40cba6613

memory/1008-37-0x0000000072B4E000-0x0000000072B4F000-memory.dmp

memory/1008-38-0x00000000005F0000-0x000000000065E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sms4DF1.tmp

MD5 194de251c043183099b2d6f7f5d1e09f
SHA1 dc477dfc0e090e8d7bd31fb808f59060dd2cf360
SHA256 12bee16f9692cb9a6d3713543cf998a4f953d0341f4e9c661748faef525d91e6
SHA512 6a1433b9bc070f18f60c3f115a1173e8979d211f6e97daf3fc7fe13f05ab15123874919418fc014fdd8af62c82426cb091b867b36a49fe7fc8fe929709b3a433

memory/1888-43-0x0000000000A30000-0x0000000000A42000-memory.dmp

memory/1008-44-0x0000000002A60000-0x0000000002A66000-memory.dmp

memory/4424-48-0x0000000000970000-0x0000000000971000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PRINTSERV.EXE.log

MD5 916851e072fbabc4796d8916c5131092
SHA1 d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA256 7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA512 07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

memory/1700-117-0x0000000000400000-0x000000000055B000-memory.dmp

memory/3144-119-0x0000000000400000-0x00000000007956B4-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp638C.tmp

MD5 db5e3f14b64ed69affa1389010cd445e
SHA1 752719617c787dbb741cfd4e8a608dd2f578d4c9
SHA256 eaeea05441cdf6ec90fd034de26b0108920f2d625f308497ebe7c05be8b69cc4
SHA512 8ee07a3e1684fb72852ad954b985db0d5a3931be5037a1fa8cb62677401d52042d80a80f27e1692edfef1d9f15b1d0cb8b8633b0414727cd775b04c4bb5e7fa9

memory/2860-123-0x00000000058F0000-0x0000000005956000-memory.dmp

memory/1376-124-0x0000000000400000-0x00000000004E05B0-memory.dmp

memory/1764-125-0x0000000000400000-0x000000000055B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp8E36.tmp.bat

MD5 d761a77ca0d4b7901be954c38c9ffdc5
SHA1 4103bc4cdea1c985e432c5afbddf140277530b37
SHA256 f4a22e6bccb1b4d54675f02f18124faa0542217d14bdd244b084fdd35aea8d1d
SHA512 522b31e8e2c08976f8d1d61beed300a478bfc3e7de4f7e3d08d7ccca3c699d8128f5a8dffd687cdd704968e2cfe53d59c4c4c8ed4f424e0e503e90d4fe6632d4

C:\Users\Admin\AppData\Roaming\audiodrvs.exe

MD5 676bcf47a18318bbfd1ff20aaa69ca9e
SHA1 4508a3b28b87380c8d6f9645469ad8f78863db18
SHA256 ab5a77fa09a36d9b62391f75bb1d56b0bb58d434705b549d15956da94ce12b4d
SHA512 9715a7ed7d8668cf188870da36f313154918f1e268ac14b83bc48fea2bf857655773b8f6a48f8166de0c26a377bb8958b579bbc10a59fc7c42fc5220b99e3769

memory/1764-135-0x0000000000400000-0x000000000055B000-memory.dmp