Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 11:33
Behavioral task
behavioral1
Sample
d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe
Resource
win10v2004-20250211-en
General
-
Target
d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe
-
Size
1.0MB
-
MD5
dcbd58469705034a8761a154e77747ec
-
SHA1
dcd998a30e00b0857bce8cdc63dab73afe3c9e5a
-
SHA256
d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff
-
SHA512
320f3a80ecc286d79c980a253c16e42e6dc937b029d3647d7cdf5f154703e18f7be92dd19de32d9721e09ce08c9b67d0c1b06dabdf9a1a81a287334250766b31
-
SSDEEP
12288:ewkfaUsPEHDM/2X8anaAZqS7sbOb6D2fJZSj+2O+AJzRhM:5kffDXnbZp2Oj2O+AJzRhM
Malware Config
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Blocklisted process makes network request 16 IoCs
flow pid Process 17 1368 cmd.exe 23 1368 cmd.exe 31 1368 cmd.exe 35 1368 cmd.exe 36 1368 cmd.exe 41 1368 cmd.exe 47 1368 cmd.exe 54 1368 cmd.exe 55 1368 cmd.exe 56 1368 cmd.exe 59 1368 cmd.exe 60 1368 cmd.exe 61 1368 cmd.exe 63 1368 cmd.exe 64 1368 cmd.exe 65 1368 cmd.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 48 700 Process not Found -
Deletes itself 1 IoCs
pid Process 1368 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{AB1F3E47-AEF1-400E-A108-233A046C3A34} = "C:\\ProgramData\\popi\\popi.exe {8B968540-222E-4DC3-94D3-2DB22B55DD58}" cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4300 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe 1368 cmd.exe 1368 cmd.exe 1368 cmd.exe 1368 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe Token: SeDebugPrivilege 1368 cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4880 wrote to memory of 1368 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe 89 PID 4880 wrote to memory of 1368 4880 d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe"C:\Users\Admin\AppData\Local\Temp\d6b2aa01cb142e59d0a6f0fec72958c7e63b2ae474b99ec965167d7e56462fff.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Blocklisted process makes network request
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDU0NTc4ODg4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4300