Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 16:18
Behavioral task
behavioral1
Sample
STUB.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
STUB.exe
Resource
win10v2004-20241007-en
General
-
Target
STUB.exe
-
Size
276KB
-
MD5
d2f788785c16e3b73c1a3d9c0a5f7d11
-
SHA1
783165011e702e3882add5ae9932eee13c0fe4b2
-
SHA256
29e74d6e8389a64215bce21ea71c8d33f9303628c9b4a5b1420b6b05b9d0483e
-
SHA512
bd274bc3578efc4477e9914fb5678077959d62ba77bcc297dba7532725c561b66fff7ae71e6a1a57d7783c12dc9d47d66130559cd62c98f8c73cf5de6b03d975
-
SSDEEP
3072:rrDyh1bdjkWxF/1PVg88WRhgEr1yNhT2xE/3MW7o4+W95nBN3nF5Epr1R:uhhJDFgX3Er8PTAE/3JR5TnFa
Malware Config
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Executes dropped EXE 1 IoCs
pid Process 2536 Z -
Loads dropped DLL 1 IoCs
pid Process 2132 STUB.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2132 STUB.exe 2132 STUB.exe 2536 Z 2536 Z -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2132 STUB.exe Token: SeDebugPrivilege 2536 Z -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2536 2132 STUB.exe 31 PID 2132 wrote to memory of 2536 2132 STUB.exe 31 PID 2132 wrote to memory of 2536 2132 STUB.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\STUB.exe"C:\Users\Admin\AppData\Local\Temp\STUB.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\ProgramData\Z\Z"C:\ProgramData\Z\Z" {E42BED59-BB92-47DA-ACFB-F46E12F84DC5}2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5d2f788785c16e3b73c1a3d9c0a5f7d11
SHA1783165011e702e3882add5ae9932eee13c0fe4b2
SHA25629e74d6e8389a64215bce21ea71c8d33f9303628c9b4a5b1420b6b05b9d0483e
SHA512bd274bc3578efc4477e9914fb5678077959d62ba77bcc297dba7532725c561b66fff7ae71e6a1a57d7783c12dc9d47d66130559cd62c98f8c73cf5de6b03d975