Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe
Resource
win10v2004-20241007-en
General
-
Target
d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe
-
Size
1.1MB
-
MD5
4c99b8a6627bee05a1de8d9061631551
-
SHA1
4cb8a13eb146431ee6d45d4b8daab7088e9ae5c2
-
SHA256
d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6
-
SHA512
a17a604f3eda7d04dff453ebe3548b25e43c1fe9f0cd9702a75c20cd87ad16adafb1d3edae8f8c886a1b81173a4fbbdec7d5fd009feb3869701e9cb170756b42
-
SSDEEP
24576:BftC16YGW3ad7jWpZAgcteeJp5uXirVpVwL03E+g1RRN9wVQ:BfYhwd7jkAgc1BrVrPEtRd
Malware Config
Extracted
darkvision
http://fiestagrandefm.com/ss/upload.php
85.209.133.9
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Downloads MZ/PE file
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2744 vbc.exe 2744 vbc.exe 2744 vbc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2916 wrote to memory of 2744 2916 d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe 31 PID 2744 wrote to memory of 2704 2744 vbc.exe 32 PID 2744 wrote to memory of 2704 2744 vbc.exe 32 PID 2744 wrote to memory of 2704 2744 vbc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe"C:\Users\Admin\AppData\Local\Temp\d5001f35264c4470284bfad49145318d9c68700fe34b7bad8fbdc391500b3eb6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {F34EC6D1-895B-4806-959C-01B8FEAFF719}3⤵PID:2704
-
-