Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 11:32
Behavioral task
behavioral1
Sample
a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe
Resource
win10v2004-20250207-en
General
-
Target
a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe
-
Size
1.0MB
-
MD5
8bda1233f570302fead172d105df211c
-
SHA1
50aad6a4bcede38d5b81c1597f4bbd65573ca468
-
SHA256
a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577
-
SHA512
a5f268e8e3358de09d78fb43c7102ccdcd6b5fe4518f22c9ff03a95b9bdb8ba4a0941c8c5f49b3e6218cb2963005c34ba4d55c88d376496c11bede2f42f8969c
-
SSDEEP
12288:KIfbwPDpwTkiC2X8anaAZqVJCj6D2fJZSj+2O+AJzRhM:KIfbbbXnbZSK2O+AJzRhM
Malware Config
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Blocklisted process makes network request 17 IoCs
flow pid Process 12 4536 cmd.exe 20 4536 cmd.exe 33 4536 cmd.exe 43 4536 cmd.exe 44 4536 cmd.exe 45 4536 cmd.exe 47 4536 cmd.exe 54 4536 cmd.exe 61 4536 cmd.exe 62 4536 cmd.exe 65 4536 cmd.exe 66 4536 cmd.exe 68 4536 cmd.exe 69 4536 cmd.exe 71 4536 cmd.exe 74 4536 cmd.exe 75 4536 cmd.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 36 2000 Process not Found -
Deletes itself 1 IoCs
pid Process 4536 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{AB1F3E47-AEF1-400E-A108-233A046C3A34} = "C:\\ProgramData\\popi\\popi.exe {8B968540-222E-4DC3-94D3-2DB22B55DD58}" cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2752 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 4536 cmd.exe 4536 cmd.exe 4536 cmd.exe 4536 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe Token: SeDebugPrivilege 4536 cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 808 wrote to memory of 4536 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 88 PID 808 wrote to memory of 4536 808 a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe"C:\Users\Admin\AppData\Local\Temp\a0b6d6d2e94272dbcc21981b3da5b3f42f55a3b227d96edc99b60a41f19a5577.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Blocklisted process makes network request
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDEyMjk2NzUzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2752