| File name: | abd0d993-7009-a327-bd85-64fe78e6209c.eml |
| Full analysis: | https://app.any.run/tasks/d41b891e-2582-4ecb-86f8-8d0d68a4c437 |
| Verdict: | Malicious activity |
| Threats: | DarkVision RAT is a low-cost, modular Remote Access Trojan that gives attackers remote control of infected Windows hosts. Initially observed around 2020 and sold in underground marketplaces, DarkVision has become notable for its full feature set (keylogging, screen capture, file theft, remote command execution and plugin support) and for being distributed via multi-stage loaders in recent campaigns. |
| Analysis date: | April 08, 2025, 19:50:13 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | MIME entity, ASCII text, with CRLF line terminators |
| MD5: | F570E5B4A28210F74D79A0C94A2A71EC |
| SHA1: | BC6EEAA41CBCBEE7D7F505DD8E33682E74F11449 |
| SHA256: | EDA1129072C0F7E46916D486AAB07B41A79C6407B759E01D3D16D561864FD93C |
| SSDEEP: | 1536:Yx/8u1tyS2Y2txS24fqhWwacAE09Z47vM9Pmfxbs6XRZF3Y2hk:XS2hS2Owa79e70G1F3Y2hk |
| .eml | | | E-Mail message (Var. 12) (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1532 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5116 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5548 | "C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "052DF3E2-8C85-41CD-9E8C-168F24C041D3" "A3ACBE12-C193-4DFC-A816-3C70FAD10019" "6656" | C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe | — | OUTLOOK.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64. Version: 0.12.2.0 Modules
| |||||||||||||||
| 6656 | "C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml C:\Users\admin\AppData\Local\Temp\abd0d993-7009-a327-bd85-64fe78e6209c.eml | C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Version: 16.0.16026.20146 Modules
| |||||||||||||||
| 7596 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WYGWYI80\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.lz" | C:\Program Files\WinRAR\WinRAR.exe | OUTLOOK.EXE | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 7660 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa7596.15181\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa7596.15181\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe | WinRAR.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: new Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
| 7920 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa7596.16452\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa7596.16452\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe | WinRAR.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: new Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
| 8004 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Framework installation utility Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 8052 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Framework installation utility Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling |
| Operation: | write | Name: | 6 |
Value: 01941A000000001000B24E9A3E06000000000000000600000000000000 | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\OUTLOOK\6656 |
| Operation: | write | Name: | 0 |
Value: 0B0E10DF5ECA6C84EB5A4EAE425D90401CD7E9230046C4E5B3B5F797EAED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C5118034D2120B6F00750074006C006F006F006B002E00650078006500C51620C517808004C91808323231322D44656300 | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics |
| Operation: | delete value | Name: | BootCommand |
Value: | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics |
| Operation: | delete value | Name: | BootFailureCount |
Value: | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | write | Name: | CantBootResolution |
Value: BootSuccess | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | write | Name: | ProfileBeingOpened |
Value: Outlook | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | write | Name: | SessionId |
Value: C3D8E96E-C1AF-4750-8D52-F4E28119C131 | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | write | Name: | BootDiagnosticsLogFile |
Value: C:\Users\admin\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16026_20146-20240718T1116060318-1644.etl | |||
| (PID) Process: | (6656) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics |
| Operation: | delete value | Name: | ProfileBeingOpened |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6656 | OUTLOOK.EXE | C:\Users\admin\Documents\Outlook Files\Outlook1.pst | — | |
MD5:— | SHA256:— | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbres | binary | |
MD5:32E1AE569781E9A768F92A24FD1F51C1 | SHA256:349C70DEF4878537BBA8F168DD1CC0A5F3CB76263BE241F0F536F4335A064D85 | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 | binary | |
MD5:F25DCDC613A8E29D6F29372622AC2CED | SHA256:F0A1FF2488B1B4FFBB7AA9FD0108763A6F535D6E485C0C3FCEAE202B63079D20 | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres | binary | |
MD5:932E9D6A8A162AC9DCB8BDD5E75CD59F | SHA256:C1E1D7483B27FF160C27947EC948C016D2578BA0F486E3CBACB257B160BC091A | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | binary | |
MD5:BBAF2994C52EE067C179B99DEDB30475 | SHA256:5CECB09C0ECF68783BD15C9D866E231C5A73DFDF760DFD61D8548DFF63C0682A | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WYGWYI80\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.lz:Zone.Identifier | text | |
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B | SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913 | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WYGWYI80\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.lz | compressed | |
MD5:2ADBDF2BAB97615B910CFCE4E2383213 | SHA256:E780AC01618ABB2CD9E83CF24F85716134BB733C4DF2596FF68EE4F946BF9332 | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin | text | |
MD5:C512EA6FCB834CA5FCC1CECC4279C814 | SHA256:A491A40323ED674F8F1DF818D2EAF1B5105F3BD37BB2623E14579A84CE7A5F8F | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WYGWYI80\payment receitp (42.1 KB).msg:Zone.Identifier | text | |
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B | SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913 | |||
| 6656 | OUTLOOK.EXE | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 | binary | |
MD5:0DCB49080024224774776684A3340B20 | SHA256:CE2B4A7F74F06DCE79217AF4917AE88D1FEFCB715322C3A59DE23B4EE0FB97E7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 193.108.153.150:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 193.108.153.150:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6656 | OUTLOOK.EXE | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D | unknown | — | — | whitelisted |
6656 | OUTLOOK.EXE | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
7660 | PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe | GET | 200 | 196.251.70.88:80 | http://196.251.70.88/Ihhsp.mp3 | unknown | — | — | unknown |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7820 | SIHClient.exe | GET | 200 | 184.30.25.170:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7820 | SIHClient.exe | GET | 200 | 184.30.25.170:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7920 | PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe | GET | 200 | 196.251.70.88:80 | http://196.251.70.88/Ihhsp.mp3 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 193.108.153.150:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 193.108.153.150:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6656 | OUTLOOK.EXE | 52.123.128.14:443 | ecs.office.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6656 | OUTLOOK.EXE | 52.109.28.47:443 | roaming.officeapps.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | GB | whitelisted |
6656 | OUTLOOK.EXE | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
6656 | OUTLOOK.EXE | 2.18.121.4:443 | omex.cdn.office.net | AKAMAI-AS | FR | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
ecs.office.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
roaming.officeapps.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
omex.cdn.office.net |
| whitelisted |
login.live.com |
| whitelisted |
messaging.lifecycle.office.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 38 |
2196 | svchost.exe | Potentially Bad Traffic | ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net |
8004 | InstallUtil.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkVision Check-in |
8004 | InstallUtil.exe | A Network Trojan was detected | ET MALWARE Win32/DarkVision RAT CnC Checkin M1 |
8004 | InstallUtil.exe | A Network Trojan was detected | ET MALWARE Win32/DarkVision RAT CnC Checkin M1 |
8004 | InstallUtil.exe | A Network Trojan was detected | ET MALWARE Win32/DarkVision RAT CnC Checkin M1 |
8004 | InstallUtil.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkVision Check-in |
8004 | InstallUtil.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkVision Check-in |
8004 | InstallUtil.exe | A Network Trojan was detected | ET MALWARE Win32/DarkVision RAT CnC Checkin M1 |
8004 | InstallUtil.exe | A Network Trojan was detected | ET MALWARE Win32/DarkVision RAT CnC Checkin M3 |