Analysis

  • max time kernel
    118s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    09/08/2021, 08:52

General

  • Target

    no_startup_upd_2021-08-09_05-28.exe

  • Size

    448KB

  • MD5

    2d0b8663c370b76694a77d6ce5f3897c

  • SHA1

    f803c6a204231bf80b8ee47912c43d597dbfda8f

  • SHA256

    bfec5909532fa13fa9e1a2ef05a6d053c44a6aae7f75715bd6f8b0c6264e7330

  • SHA512

    837d15e30285cdc0b8935bb1f72d06e2c9cd96423dffd81586ed692d27a432496c9da8413c8f356a9be02cb53f9fddd967f724f17799169baf0465ddce49388d

Score
10/10

Malware Config

Signatures

  • DarkVNC

    DarkVNC is a malicious version of the famous VNC software.

  • DarkVNC Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\no_startup_upd_2021-08-09_05-28.exe
    "C:\Users\Admin\AppData\Local\Temp\no_startup_upd_2021-08-09_05-28.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe
      2⤵
        PID:1984

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1732-60-0x0000000075971000-0x0000000075973000-memory.dmp

            Filesize

            8KB

          • memory/1732-64-0x0000000000400000-0x0000000002CA6000-memory.dmp

            Filesize

            40.6MB

          • memory/1732-63-0x0000000004450000-0x00000000044D8000-memory.dmp

            Filesize

            544KB

          • memory/1984-62-0x000007FEFBE41000-0x000007FEFBE43000-memory.dmp

            Filesize

            8KB

          • memory/1984-65-0x0000000000170000-0x0000000000171000-memory.dmp

            Filesize

            4KB

          • memory/1984-66-0x0000000001B70000-0x0000000001C3A000-memory.dmp

            Filesize

            808KB