Analysis
-
max time kernel
95s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 00:45
Static task
static1
Behavioral task
behavioral1
Sample
PO690654W226614626001MLCWHKGH10051950.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO690654W226614626001MLCWHKGH10051950.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
PO690654W226614626001MLCWHKGH10051950.pdf.exe
-
Size
407KB
-
MD5
11707e7d4128ffd80fedf1b8e1ced024
-
SHA1
b012614b4a5ca83156dda6b06951654650d99738
-
SHA256
cbeab2846912cb969bf80b60693090f0ce20b288f138e70c3d5f7fc1f981b107
-
SHA512
0c2e7bd02a7ccf53dcfed6067be2a810a239812b0c91cbca2da8d9d33898122c18e8e48e3fe23e007ca394ee2f158c2e68d9c234201c92b97977c2574e68b8e6
-
SSDEEP
6144:tkQa+PH+Tp7WmgLhjIpPMrfkZTEOIMqbUn9k1ASrznh8bvBO:tLa+eWYkfkZgOIMcU9k1ASr9U0
Malware Config
Extracted
darkvision
http://servservserv.freewebhostmost.com/upload.php
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5072 created 3456 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 56 -
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsMailNewsSave.vbs PO690654W226614626001MLCWHKGH10051950.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5072 set thread context of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4424 InstallUtil.exe 4424 InstallUtil.exe 4424 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe Token: SeDebugPrivilege 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 5072 wrote to memory of 4424 5072 PO690654W226614626001MLCWHKGH10051950.pdf.exe 99 PID 4424 wrote to memory of 3448 4424 InstallUtil.exe 101 PID 4424 wrote to memory of 3448 4424 InstallUtil.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\PO690654W226614626001MLCWHKGH10051950.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO690654W226614626001MLCWHKGH10051950.pdf.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {37FF5ADC-CFF9-4414-AF00-FCD9639E57BE}3⤵PID:3448
-
-