{"id":26391,"date":"2024-09-20T12:35:07","date_gmt":"2024-09-20T12:35:07","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=26391"},"modified":"2024-09-20T20:08:35","modified_gmt":"2024-09-20T20:08:35","slug":"altisik-service-virus","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/altisik-service-virus\/","title":{"rendered":"Altisik Service Virus Analysis &#038; Removal"},"content":{"rendered":"<p><strong>Altisik Service<\/strong> is a malicious coin miner that usually installs and runs on the target system without the explicit consent of the PC owner. It disguises itself as a Windows service, which makes it difficult to stop or remove. Let\u2019s have a closer look at how this malware operates and how to delete it from the system.<\/p>\n<h2>Altisik Service Overview<\/h2>\n<p>Altisik Service is a malicious <a href=\"https:\/\/gridinsoft.com\/blogs\/hellminer-exe-malware-analysis\/\">coin miner<\/a> masquerading as a legitimate Windows process. It is used for hidden illegal cryptocurrency mining, thereby creating a significant load on the processor (up to 80% or 100%). However, this miner differs in one key aspect &#8211; it registers itself in the system <strong>as a service<\/strong>. As a result, hackers ensure their malware&#8217;s increased sustainability. Attempts to manually stop or delete the service can lead to critical system failures, potentially causing a \u201cblue screen of death\u201d.<\/p>\n<figure id=\"attachment_26405\" aria-describedby=\"caption-attachment-26405\" style=\"width: 1208px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/08\/Altisik-Service-in-the-Task-Manager.webp\" alt=\"Altisik Service in the Task Manager screenshot\" width=\"1208\" height=\"671\" class=\"size-full wp-image-26405\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/08\/Altisik-Service-in-the-Task-Manager.webp 1208w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/08\/Altisik-Service-in-the-Task-Manager-300x167.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/08\/Altisik-Service-in-the-Task-Manager-1024x569.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/08\/Altisik-Service-in-the-Task-Manager-768x427.webp 768w\" sizes=\"auto, (max-width: 1208px) 100vw, 1208px\" \/><figcaption id=\"caption-attachment-26405\" class=\"wp-caption-text\">Altisik Service in the Task Manager<\/figcaption><\/figure>\n<p>Attackers choose the form of a service for their malware not only for the sake of sustainability. Unlike executable files, services are suspected of malicious activity much less often, simply because users trust them more. Also, Windows services can <strong>get higher privileges much more easily<\/strong>, and with less suspicion from security software.<\/p>\n<p>As for the distribution method, <a href=\"https:\/\/www.reddit.com\/r\/computerviruses\/comments\/1ewbd4q\/comment\/lj1szhu\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">users on Reddit report<\/a> receiving Altisik as an unwanted &#8220;bonus&#8221; with other software. Miners generally enter systems disguised as bundled software within installers <a href=\"https:\/\/gridinsoft.com\/blogs\/5-dangers-cracked-games\/\">of cracked programs<\/a>. Another method is through additional malware already present on the computer: <strong>vast loader malware botnets<\/strong> can offer huge gains for the operators of malicious coin miners.<\/p>\n<h2>Altisik Analysis<\/h2>\n<p>Upon execution, Altisik checks for virtual environments and security mechanisms by accessing specific system files and registry keys related to .NET configurations and GPU settings. It pays special attention to Windows Defender settings, especially those concerning real-time protection, by examining related directories and registry entries to potentially disable or bypass these security features. To evade detection, the malware employs stalling tactics with long periods of inactivity, aiming to hinder dynamic analysis and circumvent antivirus sandboxes that might report the file as safe due to lack of immediate activity. These strategies enable Altisik to stealthily operate on infected systems, mining cryptocurrency without user awareness.<\/p>\n<p>Let\u2019s have a closer look at the behavior of the Altisik miner. At the beginning, it is rather typical for a coin miner: upon launching itself, Altisik initially checks for a virtual environment and security mechanisms. Specifically, it checks the following locations:<\/p>\n<p><code style=\"font-size: 14px\">C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Config\\machine.config<br \/>\nHKEY_CURRENT_USER\\Software\\Microsoft\\Direct3D\\Drivers<br \/>\nHKEY_CURRENT_USER\\Software\\Microsoft\\DirectX\\UserGpuPreferences<\/code><\/p>\n<p>Further, it pays special attention to <strong>Windows Defender settings<\/strong>, specifically ones that touch real-time protection. The malware checks the following system sections.<\/p>\n<p><code style=\"font-size: 14px\">C:\\Program Files\\Windows Defender<br \/>\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows Defender\\PassiveMode<br \/>\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows Defender\\Real-Time Protection<br \/>\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows Defender\\Real-Time Protection\\DisableRealtimeMonitoring<br \/>\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection<\/code><\/p>\n<p>The sample employs stalling tactics, including long periods of inactivity, to hinder dynamic analysis. This also helps with circumventing some of the antivirus sandboxes: seeing no activity, one will report that the file is safe.<\/p>\n<h3>Persistence and Privilege Escalation<\/h3>\n<p>Altisik miner achieves persistence and elevates its privileges by installing itself as a system service. It executes specific shell commands to run helper processes like <strong>AltisikHelper.exe<\/strong> and <strong>AltisikHelper.dll<\/strong>, which are designed to prevent users from manually terminating the mining activity. Furthermore, the Altisik creates a <strong>DirectInput object<\/strong> to read keystrokes, indicating it captures user input. While it is unlikely that Altisik functions as a keylogger, this input capturing could be used for other purposes, such as monitoring user activity to avoid detection or interference.<\/p>\n<p>Let&#8217;s look closer: The miner maintains persistence in the system as a service, which grants it elevated privileges. It executes the following shell commands:<\/p>\n<p><code style=\"font-size: 14px\">\"C:\\Windows\\system32\\rundll32.exe\" \"C:\\Users\\<USER>\\AppData\\Local\\Temp\\AltisikDevPL\/AltisikHelper.dll\",#1<br \/>\nC:\\Windows\\system32\\SecurityHealthService.exe<br \/>\nC:\\Windows\\system32\\WerFault.exe -u -p 4328 -s 548<br \/>\nC:\\Windows\\system32\\wbem\\wmiprvse.exe -secured -Embedding<\/code><\/p>\n<p>The AltisikHelper.exe and AltisikHelper.dll processes needed to prevent the user from manually stopping the mining process. Further analysis revealed that the miner creates a DirectInput object, which allows it to read keystrokes. It is unlikely that the Altisik miner can act as a keylogger, but there are quite a few other applications for input capturing.<\/p>\n<h3>Network Communication <\/h3>\n<p>Altisik uses network communication to send and receive data necessary for its mining operations. The miner communicates with the <strong>api.altruistics.org<\/strong> server, likely used for monitoring, control, or data transmission. This may include the miner&#8217;s status, statistics, or other mining-related parameters. The response is in text\/html format, indicating that the server is returning a web page or text-based data. It also uses Cloudflare DNS <strong>104.18.7.80<\/strong> and <strong>104.18.6.80<\/strong>, potentially complicating traffic analysis.<\/p>\n<h2>How To Remove Altisik?<\/h2>\n<p>To get rid of Altisik service, I recommend using <strong>GridinSoft Anti-Malware<\/strong> \u2013 an effective and easy-to-use antivirus, that will quickly repel any threats present in the system. Though first, I would recommend entering Safe Mode with Networking: go to the <strong>Start<\/strong> menu \u2192 click Reboot while <strong>holding down the Shift button<\/strong> on the keyboard.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/shiftrestart.webp\" alt=\"Press Shift + restart to open Windows Recovery menu\" width=\"1186\" height=\"758\" class=\"aligncenter size-full wp-image-25724\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/shiftrestart.webp 1186w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/shiftrestart-300x192.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/shiftrestart-1024x654.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/shiftrestart-768x491.webp 768w\" sizes=\"auto, (max-width: 1186px) 100vw, 1186px\" \/><\/p>\n<p>When your PC reboots, in the menu that appears after restarting, select \u201cTroubleshoot\u201d \u2192 \u201cAdvanced options\u201d \u2192 \u201cStartup Settings\u201d \u2192 \u201cRestart\u201d.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-options.webp\" alt=\"Advanced options on the recovery menu\" width=\"1287\" height=\"956\" class=\"aligncenter size-full wp-image-25726\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-options.webp 1287w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-options-300x223.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-options-1024x761.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-options-768x570.webp 768w\" sizes=\"auto, (max-width: 1287px) 100vw, 1287px\" \/><\/p>\n<p>Next, select the Safe Mode with Networking and press the corresponding key (usually F5, though it may vary depending on your Windows version).<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-settings.webp\" alt=\"Startup settings screenshot\" width=\"1287\" height=\"958\" class=\"aligncenter size-full wp-image-25727\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-settings.webp 1287w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-settings-300x223.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-settings-1024x762.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/07\/startup-settings-768x572.webp 768w\" sizes=\"auto, (max-width: 1287px) 100vw, 1287px\" \/><\/p>\n<p>Hint: If you have any problems with switching to Safe Mode, please read our guide: <a href=\"https:\/\/gridinsoft.com\/blogs\/remove-viruses-safe-mode\/\">How to Remove a Virus From a Computer in Safe Mode<\/a>.<\/p>\n<p>After switching to the Safe Mode with Networking, follow the steps below:<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp\" alt=\"GridinSoft Anti-Malware main screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22665\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.<\/p>\n<div style=\"text-align:center\"><a href=\"\/download\/antimalware\" class=\"btn border-black\" rel=\"nofollow\">Download Anti-Malware<\/a><\/div>\n<p>After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click \"Advanced mode\" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp\" alt=\"Scan results screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22666\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Click \"Clean Now\" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp\" alt=\"Removal finished\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22667\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Altisik Service is a malicious coin miner that usually installs and runs on the target system without the explicit consent of the PC owner. It disguises itself as a Windows service, which makes it difficult to stop or remove. Let\u2019s have a closer look at how this malware operates and how to delete it from [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":26407,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17],"tags":[23,28],"class_list":{"0":"post-26391","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"tag-coin-miner","9":"tag-malware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/08\/What-is-Altisik-Service.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/26391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=26391"}],"version-history":[{"count":23,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/26391\/revisions"}],"predecessor-version":[{"id":27160,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/26391\/revisions\/27160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/26407"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=26391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=26391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=26391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}