Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 20:14
Behavioral task
behavioral1
Sample
fortnite.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fortnite.exe
Resource
win10v2004-20241007-en
General
-
Target
fortnite.exe
-
Size
1.4MB
-
MD5
5999098b0f0e4e25e826092a7f1e7598
-
SHA1
76f8454429e4a59e4b7361415a6d62e08207577e
-
SHA256
74e66581cda6b55f9dbfcfe260faec1dad8a38d9fa0c5c2f45e64d16e6a11d4e
-
SHA512
7d43edd26d68f5f51478a6e8f75652bf15a9704c89f4d70c6115c51989c9e60a726124c4ddabd5a95917a537b066a0d6ecef3b737492706e82e5493a63ce36c1
-
SSDEEP
24576:PW0EbEOAkR+9yJgoHqWnKwVIL4I9fGzPvW4C30Wemex2ze+9S:PW0kTdnn9RP
Malware Config
Extracted
darkvision
154.216.17.115
https://rentry.co/razorrat/rawYDHXBF8ZTF
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2820 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1328 OperationEnigma4.exe -
Loads dropped DLL 1 IoCs
pid Process 2264 fortnite.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2760 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2820 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2744 2264 fortnite.exe 31 PID 2264 wrote to memory of 2744 2264 fortnite.exe 31 PID 2264 wrote to memory of 2744 2264 fortnite.exe 31 PID 2264 wrote to memory of 2760 2264 fortnite.exe 32 PID 2264 wrote to memory of 2760 2264 fortnite.exe 32 PID 2264 wrote to memory of 2760 2264 fortnite.exe 32 PID 2760 wrote to memory of 2764 2760 cmd.exe 33 PID 2760 wrote to memory of 2764 2760 cmd.exe 33 PID 2760 wrote to memory of 2764 2760 cmd.exe 33 PID 2264 wrote to memory of 2772 2264 fortnite.exe 34 PID 2264 wrote to memory of 2772 2264 fortnite.exe 34 PID 2264 wrote to memory of 2772 2264 fortnite.exe 34 PID 2772 wrote to memory of 2820 2772 cmd.exe 35 PID 2772 wrote to memory of 2820 2772 cmd.exe 35 PID 2772 wrote to memory of 2820 2772 cmd.exe 35 PID 2264 wrote to memory of 2868 2264 fortnite.exe 36 PID 2264 wrote to memory of 2868 2264 fortnite.exe 36 PID 2264 wrote to memory of 2868 2264 fortnite.exe 36 PID 2868 wrote to memory of 2580 2868 cmd.exe 37 PID 2868 wrote to memory of 2580 2868 cmd.exe 37 PID 2868 wrote to memory of 2580 2868 cmd.exe 37 PID 2264 wrote to memory of 1328 2264 fortnite.exe 38 PID 2264 wrote to memory of 1328 2264 fortnite.exe 38 PID 2264 wrote to memory of 1328 2264 fortnite.exe 38 PID 2264 wrote to memory of 1932 2264 fortnite.exe 39 PID 2264 wrote to memory of 1932 2264 fortnite.exe 39 PID 2264 wrote to memory of 1932 2264 fortnite.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2764 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fortnite.exe"C:\Users\Admin\AppData\Local\Temp\fortnite.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mkdir "C:\ProgramData\Microsoft\WindowsApps" >nul 2>&12⤵PID:2744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "C:\ProgramData\Microsoft\WindowsApps" >nul 2>&12⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\ProgramData\Microsoft\WindowsApps"3⤵
- Views/modifies file attributes
PID:2764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionExtension 'exe'" >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension 'exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn "OperationEnigma" /tr "C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe" /sc onlogon /rl highest /f >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "OperationEnigma" /tr "C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe" /sc onlogon /rl highest /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2580
-
-
-
C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe"C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe"2⤵
- Executes dropped EXE
PID:1328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 32⤵PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD56edcc30095aaa8bad21c5e0a1a92aa9c
SHA1ac4dc007d65625f55579b16893a0b490e5c6f48a
SHA256ba3cc8d5120e54c6c8dd15143cddf6b2040e83704caad04373b05ea5fa9a9179
SHA51206ec237b2ad8002740f104c04213c03c101cc8a4587527135bdb87ca488fac542250209af96cc348d2196a7b3fabe51a035e52c9401000f486e6a6a9c07c46bd