Threat name:
AsyncRAT Orcus Xmrig
Alert
Classification:
troj.spyw.evad.mine
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Connects to a pastebin service (likely for C&C)
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Protects its processes via BreakOnTermination flag
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sigma detected: Capture Wi-Fi password
Sigma detected: Koadic Execution
Sigma detected: Powershell Defender Exclusion
Sigma detected: Regsvr32 Anomaly
Sigma detected: Suspicious Csc.exe Source File Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Mail credentials (via file access)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
450201
Sample:
TIJYYlYJpv.exe
Startdate:
17/07/2021
Architecture:
WINDOWS
Score:
100
106
67.242.2.35, 10134, 3333, 49745
TWC-11351-NORTHEASTUS
United States
2->106
108
127.0.0.1
unknown
unknown
2->108
110
pastebin.com
2->110
154
Found malware configuration
2->154
156
Malicious sample detected
(through community Yara
rule)
2->156
158
Antivirus / Scanner
detection for submitted
sample
2->158
162
17 other signatures
2->162
10
TIJYYlYJpv.exe
18
2->10
started
13
trayfontdefender.exe
2->13
started
16
svchost.exe
1
2->16
started
18
3 other processes
2->18
signatures3
160
Detected Stratum mining
protocol
106->160
process4
file5
98
C:\Users\user\AppData\Local\...\python.exe, PE32+
10->98
dropped
100
C:\Users\user\AppData\Local\Temp\...\ec.exe, PE32+
10->100
dropped
102
C:\Users\user\AppData\Local\Temp\...\Vu.exe, PE32
10->102
dropped
104
5 other malicious files
10->104
dropped
20
ex.exe
5
10->20
started
24
Vu.exe
10->24
started
27
ec.exe
5
10->27
started
29
4 other processes
10->29
194
Detected unpacking (changes
PE section rights)
13->194
signatures6
process7
dnsIp8
86
C:\Windows\System32\defendernottray.exe, PE32+
20->86
dropped
166
Multi AV Scanner detection
for dropped file
20->166
168
Detected unpacking (changes
PE section rights)
20->168
170
Machine Learning detection
for dropped file
20->170
31
defendernottray.exe
20->31
started
36
cmd.exe
20->36
started
38
cmd.exe
20->38
started
112
218.147.1.0.in-addr.arpa
24->112
114
23.163.0.123, 49717, 49736, 5050
ASN-QUADRANET-GLOBALUS
United States
24->114
172
Detected unpacking (overwrites
its own PE header)
24->172
174
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
24->174
176
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
24->176
188
5 other signatures
24->188
40
cmd.exe
24->40
started
42
cmd.exe
24->42
started
88
C:\Windows\System32\trayfontdefender.exe, PE32+
27->88
dropped
178
Drops executables to
the windows directory
(C:\Windows) and
starts them
27->178
180
Adds a directory exclusion
to Windows Defender
27->180
44
trayfontdefender.exe
27->44
started
48
2 other processes
27->48
116
ip-api.com
208.95.112.1, 49721, 80
TUT-ASUS
United States
29->116
118
ip4.seeip.org
23.128.64.141, 443, 49720
JOESDATACENTERUS
United States
29->118
120
2 other IPs or domains
29->120
90
C:\Windows\lsddsds\lsdds.exe, PE32
29->90
dropped
92
C:\Users\user\AppData\...\VCRUNTIME140.dll, PE32+
29->92
dropped
94
C:\Users\user\AppData\...\kksm6cdk.cmdline, UTF-8
29->94
dropped
96
20 other files (none is malicious)
29->96
dropped
182
Antivirus detection
for dropped file
29->182
184
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
29->184
186
Protects its processes
via BreakOnTermination
flag
29->186
190
2 other signatures
29->190
46
python.exe
29->46
started
50
5 other processes
29->50
file9
signatures10
process11
dnsIp12
122
github.com
140.82.121.4, 443, 49738
GITHUBUS
United States
31->122
124
raw.githubusercontent.com
185.199.109.133, 443, 49739
FASTLYUS
Netherlands
31->124
126
sanctam.net
185.65.135.248, 49737, 49740, 58899
ESAB-ASSE
Sweden
31->126
78
C:\Windows\System32\...\sihost64.exe, PE32+
31->78
dropped
80
C:\Windows\System32\Microsoft\libs\WR64.sys, PE32+
31->80
dropped
136
Detected unpacking (changes
PE section rights)
31->136
138
Drops executables to
the windows directory
(C:\Windows) and
starts them
31->138
140
Modifies the context
of a thread in another
process (thread injection)
31->140
152
2 other signatures
31->152
52
cmd.exe
31->52
started
142
Uses schtasks.exe or
at.exe to add and modify
task schedules
36->142
144
Uses netsh to modify
the Windows network
and firewall settings
36->144
146
Adds a directory exclusion
to Windows Defender
36->146
55
conhost.exe
36->55
started
57
powershell.exe
36->57
started
61
2 other processes
38->61
148
Tries to harvest and
steal WLAN passwords
40->148
63
4 other processes
40->63
65
3 other processes
42->65
128
140.82.121.3, 443, 49741
GITHUBUS
United States
44->128
130
185.199.108.133, 443, 49742
FASTLYUS
Netherlands
44->130
82
C:\Windows\System32\...\sihost32.exe, PE32+
44->82
dropped
132
ifconfig.me
34.117.59.81, 443, 49723
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
46->132
134
canary.discord.com
46->134
150
Tries to harvest and
steal browser information
(history, passwords,
etc)
46->150
59
cmd.exe
46->59
started
67
4 other processes
48->67
84
C:\Users\user\AppData\Local\...\kksm6cdk.dll, PE32
50->84
dropped
69
5 other processes
50->69
file13
signatures14
process15
signatures16
164
Adds a directory exclusion
to Windows Defender
52->164
71
conhost.exe
52->71
started
73
powershell.exe
52->73
started
75
WMIC.exe
59->75
started
process17
signatures18
192
DLL side loading technique
detected
75->192
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.