Analysis

  • max time kernel
    135s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    20-03-2022 02:10

General

  • Target

    cf04fc9db51e68544ae38d93ef517e8fff5c8a4e14d0c1628e7b9bcbf8286e88.exe

  • Size

    9.5MB

  • MD5

    dcb0e76902f912328a7613df7221cfae

  • SHA1

    1814a081ed127351f1cb6ad40e9003ab168508c4

  • SHA256

    cf04fc9db51e68544ae38d93ef517e8fff5c8a4e14d0c1628e7b9bcbf8286e88

  • SHA512

    6367e5546d90ea39432f1a1d1a321206b4b5be31d79ca82f3deea95a94edd25f606e9cc878e5e9dc372efd0338c3f9f071bf5a0268dea667122688263dcf8fda

Score
10/10

Malware Config

Signatures

  • DarkVNC

    DarkVNC is a malicious version of the famous VNC software.

  • DarkVNC Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf04fc9db51e68544ae38d93ef517e8fff5c8a4e14d0c1628e7b9bcbf8286e88.exe
    "C:\Users\Admin\AppData\Local\Temp\cf04fc9db51e68544ae38d93ef517e8fff5c8a4e14d0c1628e7b9bcbf8286e88.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe
      2⤵
        PID:5088

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2644-130-0x00000000025D0000-0x0000000002659000-memory.dmp

      Filesize

      548KB

    • memory/2644-134-0x0000000000A50000-0x0000000000A51000-memory.dmp

      Filesize

      4KB

    • memory/2644-133-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/2644-135-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/2644-136-0x0000000002A00000-0x0000000002B40000-memory.dmp

      Filesize

      1.2MB

    • memory/5088-137-0x000001ACFD470000-0x000001ACFD471000-memory.dmp

      Filesize

      4KB

    • memory/5088-138-0x000001ACFD390000-0x000001ACFD459000-memory.dmp

      Filesize

      804KB