Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 20:10
Behavioral task
behavioral1
Sample
fortnite.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fortnite.exe
Resource
win10v2004-20241007-en
General
-
Target
fortnite.exe
-
Size
1.4MB
-
MD5
5999098b0f0e4e25e826092a7f1e7598
-
SHA1
76f8454429e4a59e4b7361415a6d62e08207577e
-
SHA256
74e66581cda6b55f9dbfcfe260faec1dad8a38d9fa0c5c2f45e64d16e6a11d4e
-
SHA512
7d43edd26d68f5f51478a6e8f75652bf15a9704c89f4d70c6115c51989c9e60a726124c4ddabd5a95917a537b066a0d6ecef3b737492706e82e5493a63ce36c1
-
SSDEEP
24576:PW0EbEOAkR+9yJgoHqWnKwVIL4I9fGzPvW4C30Wemex2ze+9S:PW0kTdnn9RP
Malware Config
Extracted
darkvision
154.216.17.115
https://rentry.co/razorrat/rawYDHXBF8ZTF
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2328 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1056 OperationEnigma4.exe -
Loads dropped DLL 1 IoCs
pid Process 2344 fortnite.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2164 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2328 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2056 2344 fortnite.exe 31 PID 2344 wrote to memory of 2056 2344 fortnite.exe 31 PID 2344 wrote to memory of 2056 2344 fortnite.exe 31 PID 2344 wrote to memory of 2164 2344 fortnite.exe 32 PID 2344 wrote to memory of 2164 2344 fortnite.exe 32 PID 2344 wrote to memory of 2164 2344 fortnite.exe 32 PID 2164 wrote to memory of 1956 2164 cmd.exe 33 PID 2164 wrote to memory of 1956 2164 cmd.exe 33 PID 2164 wrote to memory of 1956 2164 cmd.exe 33 PID 2344 wrote to memory of 2156 2344 fortnite.exe 34 PID 2344 wrote to memory of 2156 2344 fortnite.exe 34 PID 2344 wrote to memory of 2156 2344 fortnite.exe 34 PID 2156 wrote to memory of 2328 2156 cmd.exe 35 PID 2156 wrote to memory of 2328 2156 cmd.exe 35 PID 2156 wrote to memory of 2328 2156 cmd.exe 35 PID 2344 wrote to memory of 2760 2344 fortnite.exe 36 PID 2344 wrote to memory of 2760 2344 fortnite.exe 36 PID 2344 wrote to memory of 2760 2344 fortnite.exe 36 PID 2760 wrote to memory of 3052 2760 cmd.exe 37 PID 2760 wrote to memory of 3052 2760 cmd.exe 37 PID 2760 wrote to memory of 3052 2760 cmd.exe 37 PID 2344 wrote to memory of 1056 2344 fortnite.exe 38 PID 2344 wrote to memory of 1056 2344 fortnite.exe 38 PID 2344 wrote to memory of 1056 2344 fortnite.exe 38 PID 2344 wrote to memory of 2704 2344 fortnite.exe 40 PID 2344 wrote to memory of 2704 2344 fortnite.exe 40 PID 2344 wrote to memory of 2704 2344 fortnite.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1956 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fortnite.exe"C:\Users\Admin\AppData\Local\Temp\fortnite.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mkdir "C:\ProgramData\Microsoft\WindowsApps" >nul 2>&12⤵PID:2056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "C:\ProgramData\Microsoft\WindowsApps" >nul 2>&12⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\ProgramData\Microsoft\WindowsApps"3⤵
- Views/modifies file attributes
PID:1956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionExtension 'exe'" >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension 'exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn "OperationEnigma" /tr "C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe" /sc onlogon /rl highest /f >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "OperationEnigma" /tr "C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe" /sc onlogon /rl highest /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3052
-
-
-
C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe"C:\ProgramData\Microsoft\WindowsApps\OperationEnigma4.exe"2⤵
- Executes dropped EXE
PID:1056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 32⤵PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD56edcc30095aaa8bad21c5e0a1a92aa9c
SHA1ac4dc007d65625f55579b16893a0b490e5c6f48a
SHA256ba3cc8d5120e54c6c8dd15143cddf6b2040e83704caad04373b05ea5fa9a9179
SHA51206ec237b2ad8002740f104c04213c03c101cc8a4587527135bdb87ca488fac542250209af96cc348d2196a7b3fabe51a035e52c9401000f486e6a6a9c07c46bd