Overview
overview
10Static
static
3DarkAio v1...le.dll
windows7-x64
1DarkAio v1...le.dll
windows10-2004-x64
1DarkAio v1...v1.exe
windows7-x64
10DarkAio v1...v1.exe
windows10-2004-x64
10DarkAio v1...io.exe
windows7-x64
3DarkAio v1...io.exe
windows10-2004-x64
3DarkAio v1...et.dll
windows7-x64
1DarkAio v1...et.dll
windows10-2004-x64
1DarkAio v1...on.dll
windows7-x64
1DarkAio v1...on.dll
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
DarkAio v1/Colorful.Console.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DarkAio v1/Colorful.Console.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DarkAio v1/DarkAio v1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DarkAio v1/DarkAio v1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
DarkAio v1/DarkAio.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
DarkAio v1/DarkAio.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DarkAio v1/Leaf.xNet.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
DarkAio v1/Leaf.xNet.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
DarkAio v1/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DarkAio v1/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
General
-
Target
DarkAio v1/DarkAio v1.exe
-
Size
2.0MB
-
MD5
0d9c552b2c8836cb71857faf06c0a539
-
SHA1
4289e2f119a995725be6e1721ebc456a9d00bde8
-
SHA256
20137d947f979827c4b073dfa8c339d4decf42ca838f4e21204a363bff2337b6
-
SHA512
2f96567c3890407d86ea657865269bd8d97e3db29f22b57484cef5c28c03f36683ada2624a5b1f287cbd604bf9bd04390fb276b84d879fadc6142966b1a9d79e
-
SSDEEP
49152:lmPH/GDTgt/axtPhJZdBUd61shsTGfxl0ML:QPH4TYybZnQ5lf
Malware Config
Extracted
quasar
2.7.0.0
Venom Client
40.71.25.32:4782
JlYM51eW4iZoFyLa2X
-
encryption_key
P9MDWURJLkPDORtyF7Jj
-
install_name
Payload.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Extracted
redline
AIO
40.71.25.32:1337
Signatures
-
Quasar family
-
Quasar payload 4 IoCs
Processes:
resource yara_rule behavioral3/files/0x0005000000010300-5.dat family_quasar behavioral3/memory/2808-23-0x0000000000120000-0x0000000000230000-memory.dmp family_quasar behavioral3/memory/1824-35-0x00000000002B0000-0x00000000003C0000-memory.dmp family_quasar behavioral3/memory/2196-62-0x0000000000200000-0x0000000000310000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral3/files/0x0005000000018696-16.dat family_redline behavioral3/memory/2688-26-0x0000000001260000-0x000000000127E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral3/files/0x0005000000018696-16.dat family_sectoprat behavioral3/memory/2688-26-0x0000000001260000-0x000000000127E000-memory.dmp family_sectoprat -
Sectoprat family
-
Executes dropped EXE 6 IoCs
Processes:
Venom.exebuild.exeDarkAio v1.exePayload.exeDarkAio.exeVenom.exepid Process 2808 Venom.exe 2688 build.exe 2872 DarkAio v1.exe 1824 Payload.exe 2912 DarkAio.exe 2196 Venom.exe -
Loads dropped DLL 10 IoCs
Processes:
DarkAio v1.exeVenom.exeDarkAio v1.exeWerFault.exepid Process 1448 DarkAio v1.exe 1448 DarkAio v1.exe 1448 DarkAio v1.exe 2808 Venom.exe 2872 DarkAio v1.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2756 2912 WerFault.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
PING.EXEVenom.exeDarkAio v1.exePayload.exebuild.exeDarkAio.execmd.exechcp.comVenom.exeDarkAio v1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Venom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkAio v1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkAio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Venom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkAio v1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
DarkAio v1.exepid Process 2872 DarkAio v1.exe 2872 DarkAio v1.exe 2872 DarkAio v1.exe 2872 DarkAio v1.exe 2872 DarkAio v1.exe 2872 DarkAio v1.exe 2872 DarkAio v1.exe 2872 DarkAio v1.exe 2872 DarkAio v1.exe 2872 DarkAio v1.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
build.exeVenom.exePayload.exeDarkAio v1.exedescription pid Process Token: SeDebugPrivilege 2688 build.exe Token: SeDebugPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeDebugPrivilege 1824 Payload.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeSecurityPrivilege 2808 Venom.exe Token: SeBackupPrivilege 2808 Venom.exe Token: SeDebugPrivilege 2872 DarkAio v1.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
DarkAio v1.exeVenom.exeDarkAio v1.exeDarkAio.execmd.exedescription pid Process procid_target PID 1448 wrote to memory of 2808 1448 DarkAio v1.exe 30 PID 1448 wrote to memory of 2808 1448 DarkAio v1.exe 30 PID 1448 wrote to memory of 2808 1448 DarkAio v1.exe 30 PID 1448 wrote to memory of 2808 1448 DarkAio v1.exe 30 PID 1448 wrote to memory of 2688 1448 DarkAio v1.exe 31 PID 1448 wrote to memory of 2688 1448 DarkAio v1.exe 31 PID 1448 wrote to memory of 2688 1448 DarkAio v1.exe 31 PID 1448 wrote to memory of 2688 1448 DarkAio v1.exe 31 PID 1448 wrote to memory of 2872 1448 DarkAio v1.exe 33 PID 1448 wrote to memory of 2872 1448 DarkAio v1.exe 33 PID 1448 wrote to memory of 2872 1448 DarkAio v1.exe 33 PID 1448 wrote to memory of 2872 1448 DarkAio v1.exe 33 PID 2808 wrote to memory of 1824 2808 Venom.exe 35 PID 2808 wrote to memory of 1824 2808 Venom.exe 35 PID 2808 wrote to memory of 1824 2808 Venom.exe 35 PID 2808 wrote to memory of 1824 2808 Venom.exe 35 PID 2872 wrote to memory of 2912 2872 DarkAio v1.exe 36 PID 2872 wrote to memory of 2912 2872 DarkAio v1.exe 36 PID 2872 wrote to memory of 2912 2872 DarkAio v1.exe 36 PID 2872 wrote to memory of 2912 2872 DarkAio v1.exe 36 PID 2912 wrote to memory of 2756 2912 DarkAio.exe 38 PID 2912 wrote to memory of 2756 2912 DarkAio.exe 38 PID 2912 wrote to memory of 2756 2912 DarkAio.exe 38 PID 2912 wrote to memory of 2756 2912 DarkAio.exe 38 PID 2808 wrote to memory of 536 2808 Venom.exe 39 PID 2808 wrote to memory of 536 2808 Venom.exe 39 PID 2808 wrote to memory of 536 2808 Venom.exe 39 PID 2808 wrote to memory of 536 2808 Venom.exe 39 PID 536 wrote to memory of 2028 536 cmd.exe 41 PID 536 wrote to memory of 2028 536 cmd.exe 41 PID 536 wrote to memory of 2028 536 cmd.exe 41 PID 536 wrote to memory of 2028 536 cmd.exe 41 PID 536 wrote to memory of 2052 536 cmd.exe 42 PID 536 wrote to memory of 2052 536 cmd.exe 42 PID 536 wrote to memory of 2052 536 cmd.exe 42 PID 536 wrote to memory of 2052 536 cmd.exe 42 PID 536 wrote to memory of 2196 536 cmd.exe 43 PID 536 wrote to memory of 2196 536 cmd.exe 43 PID 536 wrote to memory of 2196 536 cmd.exe 43 PID 536 wrote to memory of 2196 536 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\DarkAio v1\DarkAio v1.exe"C:\Users\Admin\AppData\Local\Temp\DarkAio v1\DarkAio v1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\Venom.exe"C:\Users\Admin\AppData\Roaming\Venom.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\Payload.exe"C:\Users\Admin\AppData\Roaming\Payload.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\xaUgz2lU79uw.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2052
-
-
C:\Users\Admin\AppData\Roaming\Venom.exe"C:\Users\Admin\AppData\Roaming\Venom.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
-
C:\Users\Admin\AppData\Roaming\build.exe"C:\Users\Admin\AppData\Roaming\build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Users\Admin\AppData\Roaming\DarkAio v1.exe"C:\Users\Admin\AppData\Roaming\DarkAio v1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\DarkAio.exe"C:\Users\Admin\AppData\Roaming\DarkAio.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 5484⤵
- Loads dropped DLL
- Program crash
PID:2756
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD5a1d2420e31fda2ad0a1575e383808ff4
SHA1eb3efc2df20447c12c8e10e279987b1532acedb7
SHA2569b6d2cf50c435289572a25b556ddf703d6a7ecc3155714317c855e481baa4b82
SHA51299a0257b8da00bfcf911a13001563db5ba9752b00b1ea7be52a234fd38d21e835522b392080c16b4a5c889ede9368c04b05c11c107daf62f37568c388f1e097e
-
Filesize
95KB
MD54d46c4c206d1bf83b2cb8d6ff308bc2b
SHA180edeb15499f072c8538acbbae5d62ff3a6cc0c0
SHA2560bf9f0c46953c27761484e8bd991b7f7f21728aa4e45703f0d44e2f68eb85a5a
SHA512a59aa698246383e6091ef41e27c36ea2cd1f2d2264ddccd85f537bbf8207106d2d3475615a48fd5b76ca416cc8f862a49c40ffc702b60849e28c7be7cefaa859
-
Filesize
718KB
MD5ab69f830a864aa0b2a5efa7b92d87b11
SHA146fc9419089e06b82d47e1afebb264b4e8d776a1
SHA25682339ab250c45199b5e5050a3179c91a44c8369d8739b92e5c498047c81631c8
SHA512d994fe2f8ad4999652bcfce7d694c43c1f55bb96baac8fc7ffdcac8f2bf2d75e5a2e23f4b3281de82ee634268f4e98f9347ad49b2725ef154e2b483c2fa0abb3
-
Filesize
1003KB
MD50e6ee37222bfc0a6ec9f5b4ec4c7c053
SHA16fed8b55ec8c1daca94141fbc3591f6728fe9530
SHA25624cc63d8b135457ec2b51dc7103c938887ce4dae6faddd344ffb7477ed6ad672
SHA5127fc0cfd1baaefd9aa4f288c745709f314dfb0dc39f06bc4bfcbc18b2d593b5893e93da30bb19a273fb5a838821f5429332392bd19431ea0a57f0f94320529f04
-
Filesize
1.0MB
MD5860a7a517356a57d979ceac2a6d732f0
SHA1e6559ce68a1faa19a5a74d3c496b245700ef2077
SHA256cf6771d32409e4ad380ee084ece68be09a648ea20642489473593674fafc3249
SHA5128b7bc3eed22fc36279d36c6cae708aadd30a090614f311fc3ed2c47db5e3671eb1a8ca343e32ed8025f900477f2a6334f8c52639d36b07fcdcbcadc69a95a08c