Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2024 20:10

General

  • Target

    fortnite.exe

  • Size

    1.4MB

  • MD5

    5999098b0f0e4e25e826092a7f1e7598

  • SHA1

    76f8454429e4a59e4b7361415a6d62e08207577e

  • SHA256

    74e66581cda6b55f9dbfcfe260faec1dad8a38d9fa0c5c2f45e64d16e6a11d4e

  • SHA512

    7d43edd26d68f5f51478a6e8f75652bf15a9704c89f4d70c6115c51989c9e60a726124c4ddabd5a95917a537b066a0d6ecef3b737492706e82e5493a63ce36c1

  • SSDEEP

    24576:PW0EbEOAkR+9yJgoHqWnKwVIL4I9fGzPvW4C30Wemex2ze+9S:PW0kTdnn9RP

Malware Config

Extracted

Family

darkvision

C2

154.216.17.115

https://rentry.co/razorrat/rawYDHXBF8ZTF

Signatures

  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fortnite.exe
    "C:\Users\Admin\AppData\Local\Temp\fortnite.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c mkdir "C:\ProgramData\Microsoft\WindowsApps" >nul 2>&1
      2⤵
        PID:2056
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c attrib +h +s "C:\ProgramData\Microsoft\WindowsApps" >nul 2>&1
        2⤵
        • Hide Artifacts: Hidden Files and Directories
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\system32\attrib.exe
          attrib +h +s "C:\ProgramData\Microsoft\WindowsApps"
          3⤵
          • Views/modifies file attributes
          PID:1956
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionExtension 'exe'" >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Add-MpPreference -ExclusionExtension 'exe'"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2328
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn "OperationEnigma" /tr "C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe" /sc onlogon /rl highest /f >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "OperationEnigma" /tr "C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe" /sc onlogon /rl highest /f
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3052
      • C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe
        "C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe"
        2⤵
        • Executes dropped EXE
        PID:1056
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c color 3
        2⤵
          PID:2704

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe

        Filesize

        443KB

        MD5

        6edcc30095aaa8bad21c5e0a1a92aa9c

        SHA1

        ac4dc007d65625f55579b16893a0b490e5c6f48a

        SHA256

        ba3cc8d5120e54c6c8dd15143cddf6b2040e83704caad04373b05ea5fa9a9179

        SHA512

        06ec237b2ad8002740f104c04213c03c101cc8a4587527135bdb87ca488fac542250209af96cc348d2196a7b3fabe51a035e52c9401000f486e6a6a9c07c46bd

      • memory/2328-5-0x000007FEF585E000-0x000007FEF585F000-memory.dmp

        Filesize

        4KB

      • memory/2328-7-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

        Filesize

        9.6MB

      • memory/2328-6-0x000000001B690000-0x000000001B972000-memory.dmp

        Filesize

        2.9MB

      • memory/2328-9-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

        Filesize

        9.6MB

      • memory/2328-10-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

        Filesize

        9.6MB

      • memory/2328-8-0x0000000002960000-0x0000000002968000-memory.dmp

        Filesize

        32KB

      • memory/2328-11-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

        Filesize

        9.6MB

      • memory/2328-12-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

        Filesize

        9.6MB

      • memory/2328-13-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

        Filesize

        9.6MB

      • memory/2344-0-0x0000000001B30000-0x0000000001BAB000-memory.dmp

        Filesize

        492KB

      • memory/2344-19-0x0000000001B30000-0x0000000001BAB000-memory.dmp

        Filesize

        492KB