Analysis

  • max time kernel
    118s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    29-06-2021 02:23

General

  • Target

    idu9A98.exe

  • Size

    2.0MB

  • MD5

    16493223940cd99199a672e44dec05d6

  • SHA1

    ffcde3a96670552d239d547b4c3f44aa77c0fdb7

  • SHA256

    7b844cc75f594f536f486b137817a497407b689725ab45c7904444e82374d4ac

  • SHA512

    5363e507a8d1456dc11747f86cf66113cd85da2d2bd00524b15df24fdeac9f8f1f756c790bcaf9f901c644e4083607185a303c505040115cf0d2b196d6aa4707

Score
10/10

Malware Config

Signatures

  • DarkVNC

    DarkVNC is a malicious version of the famous VNC software.

  • DarkVNC Payload 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\idu9A98.exe
    "C:\Users\Admin\AppData\Local\Temp\idu9A98.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\idu9A98.exe
      "C:\Users\Admin\AppData\Local\Temp\idu9A98.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Local\Temp\idu9A98.exe
        "C:\Users\Admin\AppData\Local\Temp\idu9A98.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        PID:1796
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe
          4⤵
            PID:1296

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1296-62-0x0000000000000000-mapping.dmp

    • memory/1296-63-0x000007FEFBE41000-0x000007FEFBE43000-memory.dmp

      Filesize

      8KB

    • memory/1296-65-0x00000000000F0000-0x00000000000F1000-memory.dmp

      Filesize

      4KB

    • memory/1296-66-0x0000000001B90000-0x0000000001C5A000-memory.dmp

      Filesize

      808KB

    • memory/1728-59-0x0000000000000000-mapping.dmp

    • memory/1796-60-0x0000000000CC0000-0x0000000000D4A000-memory.dmp

      Filesize

      552KB

    • memory/1796-61-0x0000000000CC17D0-mapping.dmp

    • memory/1796-64-0x0000000000CC0000-0x0000000000D4A000-memory.dmp

      Filesize

      552KB