Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 11:28
Behavioral task
behavioral1
Sample
846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe
Resource
win10v2004-20250211-en
General
-
Target
846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe
-
Size
701KB
-
MD5
fcb30c64222ed295aef78c3e002b9298
-
SHA1
353f6bd0715779a2e5e89f472c831d2db0918af8
-
SHA256
846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152
-
SHA512
aae308b1517e05c2f3d68973be987cf91e3f16c4a549fc3fb67e3f13cef6576f0fbb5b293b23e2703eb421e2366494bd054772383c386c75653a37c9a2242075
-
SSDEEP
6144:KIfoEwPDpwFNDSoNEiC6kMYlOIa6VkctankhTl2DGl8HdZRw9wMUCHvkU0qDJ4gI:KIfbwPDpwTkiC2X8anaAZqVJ
Malware Config
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Blocklisted process makes network request 17 IoCs
flow pid Process 17 2416 cmd.exe 18 2416 cmd.exe 19 2416 cmd.exe 25 2416 cmd.exe 34 2416 cmd.exe 43 2416 cmd.exe 50 2416 cmd.exe 54 2416 cmd.exe 57 2416 cmd.exe 59 2416 cmd.exe 61 2416 cmd.exe 62 2416 cmd.exe 63 2416 cmd.exe 65 2416 cmd.exe 66 2416 cmd.exe 73 2416 cmd.exe 74 2416 cmd.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 45 436 Process not Found 68 3976 Process not Found -
Deletes itself 1 IoCs
pid Process 2416 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{AB1F3E47-AEF1-400E-A108-233A046C3A34} = "C:\\ProgramData\\popi\\popi.exe {8B968540-222E-4DC3-94D3-2DB22B55DD58}" cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2332 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe 2416 cmd.exe 2416 cmd.exe 2416 cmd.exe 2416 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe Token: SeDebugPrivilege 2416 cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2416 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe 89 PID 2656 wrote to memory of 2416 2656 846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe"C:\Users\Admin\AppData\Local\Temp\846f502e17611e6624ac1eeaa1b4a4124fdaf912543073020eb6345520f4d152.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Blocklisted process makes network request
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDk3OTM2MDQxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2332