Edit tour
Windows
Analysis Report
uncrypted.exe
Overview
General Information
Detection
DarkVision Rat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected DarkVision Rat
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal saved passwords of Firefox
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Searches for specific processes (likely to inject)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Extensive use of GetProcAddress (often used to hide API calls)
Found decision node followed by non-executed suspicious APIs
Found evaded block containing many API calls
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Remote Thread Creation By Uncommon Source Image
Stores large binary data to the registry
Terminates after testing mutex exists (may check infected machine status)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- uncrypted.exe (PID: 3856 cmdline:
"C:\Users\ user\Deskt op\uncrypt ed.exe" MD5: 84E8A17E39EF16DCE73DA924CED012D5) - uncrypted.exe (PID: 2892 cmdline:
"C:\Users\ user\Deskt op\uncrypt ed.exe" MD5: 84E8A17E39EF16DCE73DA924CED012D5) - explorer.exe (PID: 5060 cmdline:
"C:\Window s\explorer .exe" MD5: 662F4F92FDE3557E86D110526BB578D5) - explorer.exe (PID: 5032 cmdline:
C:\Windows \EXPLORER. EXE {2046C 745-B848-4 7EE-8068-B 039EAC15A1 C} MD5: 662F4F92FDE3557E86D110526BB578D5)
- cleanup
{"C2": "jholo.duckdns.org", "Port": 8900}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
Click to see the 16 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM | Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) | ditekSHen |
| |
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 20 entries |
System Summary |
---|
Source: | Author: Perez Diego (@darkquassar), oscd.community: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T07:33:04.802221+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49706 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:33:13.838339+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49707 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:33:22.853752+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49720 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:33:31.892912+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49781 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:33:40.927898+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49837 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:33:49.983774+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49898 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:33:58.994424+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49960 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:34:08.143325+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49985 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:34:17.166204+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49986 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:34:26.197336+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49987 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:34:35.228839+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49988 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:34:44.244638+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49989 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:34:53.025515+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49990 | 5.89.185.156 | 8900 | TCP |
2024-12-31T07:35:01.478246+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.5 | 49991 | 5.89.185.156 | 8900 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 3_2_011953B0 | |
Source: | Code function: | 3_2_011ADC00 | |
Source: | Code function: | 3_2_011ADD1E | |
Source: | Code function: | 3_2_011ADD5A | |
Source: | Code function: | 3_2_011ADD8F | |
Source: | Code function: | 3_2_011ADCF7 | |
Source: | Code function: | 4_2_00E751C0 | |
Source: | Code function: | 4_2_00E7A390 | |
Source: | Code function: | 4_2_00E754C0 | |
Source: | Code function: | 4_2_00E748C0 | |
Source: | Code function: | 4_2_00E799B0 | |
Source: | Code function: | 4_2_00E79AE0 | |
Source: | Code function: | 4_2_00E74BC0 | |
Source: | Code function: | 4_2_00E79C20 | |
Source: | Code function: | 4_2_00E76D60 | |
Source: | Code function: | 4_2_00E74EC0 | |
Source: | Code function: | 4_2_00E76530 | |
Source: | Code function: | 4_2_00E7A690 | |
Source: | Code function: | 4_2_00E79DAF | |
Source: | Code function: | 4_2_00E73D60 | |
Source: | Code function: | 4_2_00E79D7A | |
Source: | Code function: | 4_2_00E79D3E | |
Source: | Code function: | 4_2_00E75D00 | |
Source: | Code function: | 4_2_00E79D17 |
Exploits |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 2_2_0041DB70 | |
Source: | Code function: | 3_2_011997F0 | |
Source: | Code function: | 4_2_00E77EA0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: | Jump to behavior |
Source: | URLs: |
Source: | DNS query: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |