Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 11:25

General

  • Target

    libcares-2.dll

  • Size

    1.9MB

  • MD5

    49abecb8967a527f3f8b5493f0f82820

  • SHA1

    31b535360199e41ae87111b36f9ef97977b3d9c6

  • SHA256

    17f1ca60b529a4617fdd64bdf686b78f704abbe6d19b69c109bffd352ac9503c

  • SHA512

    614593697a2acd897331595cc56164601528c03be6966aa599e2f541276ea71fdcc547195534119904da921b5fa9f8c5e14777c126aa6827be57b2b406d19be4

  • SSDEEP

    49152:A7rb1O0bSOWgRKuMCnuuUr11O75hIE1q9n/Xl:dN1

Malware Config

Extracted

Family

darkvision

C2

myasyncrat.ddns.net

Signatures

  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\libcares-2.dll,#1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\SystemRootDoc' -Force"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
      2⤵
        PID:4908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_htm0zwhd.kj0.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2720-40-0x00007FF8D8243000-0x00007FF8D8245000-memory.dmp

      Filesize

      8KB

    • memory/2720-75-0x00000201231B0000-0x00000201231D2000-memory.dmp

      Filesize

      136KB

    • memory/2720-94-0x00007FF8D8240000-0x00007FF8D8D01000-memory.dmp

      Filesize

      10.8MB

    • memory/2720-132-0x00007FF8D8240000-0x00007FF8D8D01000-memory.dmp

      Filesize

      10.8MB

    • memory/2720-224-0x00007FF8D8240000-0x00007FF8D8D01000-memory.dmp

      Filesize

      10.8MB

    • memory/4908-909-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/4908-911-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/4908-912-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/4908-913-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/4908-914-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB