Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2025, 04:11

General

  • Target

    1e89a629915d0b45d00b5628cfe0b5bca2de6904bea55663fd438248ef90d670.exe

  • Size

    914KB

  • MD5

    79b3cf22206c170f154cbf0cd426cc1d

  • SHA1

    e6713d0bdc8cdd3c150762d62aea06b700556c81

  • SHA256

    1e89a629915d0b45d00b5628cfe0b5bca2de6904bea55663fd438248ef90d670

  • SHA512

    39336a173682521f96ea905c16fb32141898587e97240b648a967c88715c65210675fdb01e6e6ba77baac92933687e4e998c55c044ba9240eff023c1b7db331d

  • SSDEEP

    12288:Sd05O1ec3wSodJFmoVFl748RNtFogOuQ0mE8VCAkxh4hS4f/+0T8JnZHL:S6ueMwvR9dofuQ0mE8VCtZHL

Malware Config

Extracted

Family

darkvision

C2

acuweld.ddns.net

Signatures

  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\1e89a629915d0b45d00b5628cfe0b5bca2de6904bea55663fd438248ef90d670.exe
        "C:\Users\Admin\AppData\Local\Temp\1e89a629915d0b45d00b5628cfe0b5bca2de6904bea55663fd438248ef90d670.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1532
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\explorers'
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3704
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\explorers'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yy51r44x.pr0.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1532-0-0x00007FFB76543000-0x00007FFB76545000-memory.dmp

      Filesize

      8KB

    • memory/1532-1-0x0000022C2E5B0000-0x0000022C2E698000-memory.dmp

      Filesize

      928KB

    • memory/1532-2-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-3-0x0000022C48EE0000-0x0000022C49004000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-4-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-27-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-25-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-67-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-65-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-63-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-61-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-59-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-57-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-55-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-51-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-49-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-47-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-45-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-43-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-35-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-33-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-31-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-23-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-21-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-19-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-17-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-15-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-13-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-11-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-9-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-53-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-7-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-42-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-39-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-37-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-5-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-29-0x0000022C48EE0000-0x0000022C48FFD000-memory.dmp

      Filesize

      1.1MB

    • memory/1532-1326-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-1327-0x0000022C302B0000-0x0000022C3032E000-memory.dmp

      Filesize

      504KB

    • memory/1532-1329-0x00007FFB76543000-0x00007FFB76545000-memory.dmp

      Filesize

      8KB

    • memory/1532-1330-0x0000022C49000000-0x0000022C4904C000-memory.dmp

      Filesize

      304KB

    • memory/1532-1331-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-1332-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-1333-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-1328-0x0000022C30460000-0x0000022C304DA000-memory.dmp

      Filesize

      488KB

    • memory/1532-1334-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-1335-0x0000022C49050000-0x0000022C490A4000-memory.dmp

      Filesize

      336KB

    • memory/1532-1338-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-1342-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-1351-0x0000022C30812000-0x0000022C30813000-memory.dmp

      Filesize

      4KB

    • memory/1532-1350-0x0000022C307B4000-0x0000022C307B5000-memory.dmp

      Filesize

      4KB

    • memory/1532-1348-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-1352-0x00007FFB76540000-0x00007FFB77001000-memory.dmp

      Filesize

      10.8MB

    • memory/2664-1362-0x000002D5A2880000-0x000002D5A28A2000-memory.dmp

      Filesize

      136KB

    • memory/3016-1349-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/3016-1366-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB