Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 11:28
Behavioral task
behavioral1
Sample
a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe
Resource
win10v2004-20250207-en
General
-
Target
a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe
-
Size
1.0MB
-
MD5
8bda1233f570302fead172d105df211c
-
SHA1
50aad6a4bcede38d5b81c1597f4bbd65573ca468
-
SHA256
a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577
-
SHA512
a5f268e8e3358de09d78fb43c7102ccdcd6b5fe4518f22c9ff03a95b9bdb8ba4a0941c8c5f49b3e6218cb2963005c34ba4d55c88d376496c11bede2f42f8969c
-
SSDEEP
12288:KIfbwPDpwTkiC2X8anaAZqVJCj6D2fJZSj+2O+AJzRhM:KIfbbbXnbZSK2O+AJzRhM
Malware Config
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Blocklisted process makes network request 17 IoCs
flow pid Process 22 3980 cmd.exe 23 3980 cmd.exe 26 3980 cmd.exe 29 3980 cmd.exe 43 3980 cmd.exe 52 3980 cmd.exe 56 3980 cmd.exe 62 3980 cmd.exe 63 3980 cmd.exe 64 3980 cmd.exe 69 3980 cmd.exe 70 3980 cmd.exe 71 3980 cmd.exe 72 3980 cmd.exe 74 3980 cmd.exe 75 3980 cmd.exe 76 3980 cmd.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 54 4016 Process not Found -
Deletes itself 1 IoCs
pid Process 3980 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{AB1F3E47-AEF1-400E-A108-233A046C3A34} = "C:\\ProgramData\\popi\\popi.exe {8B968540-222E-4DC3-94D3-2DB22B55DD58}" cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4552 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 3980 cmd.exe 3980 cmd.exe 3980 cmd.exe 3980 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe Token: SeDebugPrivilege 3980 cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1736 wrote to memory of 3980 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 87 PID 1736 wrote to memory of 3980 1736 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe"C:\Users\Admin\AppData\Local\Temp\a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Blocklisted process makes network request
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzY4NjEwMjQxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4552