Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2025, 11:45

General

  • Target

    InquiryDocument.exe

  • Size

    1.6MB

  • MD5

    259bb04751cadc3d34e272a9ca526703

  • SHA1

    b95e94b9aa33de3ef616a15f3bdb85df57aeba9d

  • SHA256

    57de9cffa15a62f5ed864bb9969eb6fc1e534ac6fe00cfb32e33bf6d7f6d9457

  • SHA512

    cee486ae6ad3a28d5f96f40eeb9bb063a71f60d9cf171b2c08001c404d7984e1152b4f8377019ea80cb5c4acbdb34aa1f9242436a07d11647ec88aaf262e168d

  • SSDEEP

    49152:BaescpQuDPi0f0gOqgWs1SmC6uqlxlb1y:BaS0g9qI9Tqrlb1

Malware Config

Extracted

Family

darkvision

C2

acuweld.ddns.net

Signatures

  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3396
      • C:\Users\Admin\AppData\Local\Temp\InquiryDocument.exe
        "C:\Users\Admin\AppData\Local\Temp\InquiryDocument.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:464
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\explorers'
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3324
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\explorers'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hpuoezs4.iwt.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/464-0-0x00007FFF2A7C3000-0x00007FFF2A7C5000-memory.dmp

      Filesize

      8KB

    • memory/464-1-0x000001B4CD970000-0x000001B4CDB14000-memory.dmp

      Filesize

      1.6MB

    • memory/464-2-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/464-3-0x000001B4E8030000-0x000001B4E8154000-memory.dmp

      Filesize

      1.1MB

    • memory/464-21-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-25-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-67-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-65-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-63-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-61-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-57-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-53-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-51-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-49-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-45-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-43-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-41-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-39-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-37-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-35-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-33-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-31-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-29-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-27-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-23-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-19-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-17-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-15-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-13-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-5-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-59-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-55-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-47-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-11-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-10-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-7-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-4-0x000001B4E8030000-0x000001B4E814E000-memory.dmp

      Filesize

      1.1MB

    • memory/464-1326-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/464-1327-0x000001B4CF7D0000-0x000001B4CF84E000-memory.dmp

      Filesize

      504KB

    • memory/464-1328-0x000001B4E8150000-0x000001B4E81CA000-memory.dmp

      Filesize

      488KB

    • memory/464-1329-0x000001B4E81D0000-0x000001B4E821C000-memory.dmp

      Filesize

      304KB

    • memory/464-1330-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/464-1331-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/464-1332-0x000001B4E8220000-0x000001B4E8274000-memory.dmp

      Filesize

      336KB

    • memory/464-1336-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/464-1343-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/464-1346-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/464-1345-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/2272-1347-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/2272-1365-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/4064-1348-0x00007FFF2A7C3000-0x00007FFF2A7C5000-memory.dmp

      Filesize

      8KB

    • memory/4064-1349-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/4064-1350-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB

    • memory/4064-1351-0x0000017711980000-0x00000177119A2000-memory.dmp

      Filesize

      136KB

    • memory/4064-1363-0x00007FFF2A7C0000-0x00007FFF2B281000-memory.dmp

      Filesize

      10.8MB