File name:

abd0d993-7009-a327-bd85-64fe78e6209c.eml

Full analysis: https://app.any.run/tasks/d41b891e-2582-4ecb-86f8-8d0d68a4c437
Verdict: Malicious activity
Threats:

DarkVision RAT is a low-cost, modular Remote Access Trojan that gives attackers remote control of infected Windows hosts. Initially observed around 2020 and sold in underground marketplaces, DarkVision has become notable for its full feature set (keylogging, screen capture, file theft, remote command execution and plugin support) and for being distributed via multi-stage loaders in recent campaigns.

Analysis date: April 08, 2025, 19:50:13
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
attachments
attc-eml
susp-attachments
arch-exec
darkvision
remote
Indicators:
MIME: text/plain
File info: MIME entity, ASCII text, with CRLF line terminators
MD5:

F570E5B4A28210F74D79A0C94A2A71EC

SHA1:

BC6EEAA41CBCBEE7D7F505DD8E33682E74F11449

SHA256:

EDA1129072C0F7E46916D486AAB07B41A79C6407B759E01D3D16D561864FD93C

SSDEEP:

1536:Yx/8u1tyS2Y2txS24fqhWwacAE09Z47vM9Pmfxbs6XRZF3Y2hk:XS2hS2Owa79e70G1F3Y2hk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
    • Connects to the CnC server

      • InstallUtil.exe (PID: 8004)
    • DARKVISION has been detected (SURICATA)

      • InstallUtil.exe (PID: 8004)
  • SUSPICIOUS

    • Email with suspicious attachment

      • OUTLOOK.EXE (PID: 6656)
    • Connects to the server without a host name

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7920)
    • Executable content was dropped or overwritten

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
    • Connects to unusual port

      • InstallUtil.exe (PID: 8004)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7596)
  • INFO

    • Reads the computer name

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7920)
      • InstallUtil.exe (PID: 8004)
    • Email with attachments

      • OUTLOOK.EXE (PID: 6656)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7596)
    • Reads the machine GUID from the registry

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7920)
    • Disables trace logs

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7920)
    • Checks supported languages

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7920)
      • InstallUtil.exe (PID: 8004)
      • InstallUtil.exe (PID: 8052)
    • Reads Environment values

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7920)
    • Checks proxy server information

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7920)
    • Manual execution by a user

      • InstallUtil.exe (PID: 8004)
      • InstallUtil.exe (PID: 8052)
    • Creates files in the program directory

      • InstallUtil.exe (PID: 8004)
    • Process checks computer location settings

      • InstallUtil.exe (PID: 8004)
    • Creates files or folders in the user directory

      • PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe (PID: 7660)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 12) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
10
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start outlook.exe sppextcomobj.exe no specs slui.exe no specs ai.exe no specs winrar.exe payment receipt for confirmation of order.exe payment receipt for confirmation of order.exe #DARKVISION installutil.exe svchost.exe installutil.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1532C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5116"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5548"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "052DF3E2-8C85-41CD-9E8C-168F24C041D3" "A3ACBE12-C193-4DFC-A816-3C70FAD10019" "6656"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
6656"C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml C:\Users\admin\AppData\Local\Temp\abd0d993-7009-a327-bd85-64fe78e6209c.emlC:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\outlook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\program files\microsoft office\root\office16\vcruntime140_1.dll
7596"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WYGWYI80\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.lz"C:\Program Files\WinRAR\WinRAR.exe
OUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7660"C:\Users\admin\AppData\Local\Temp\Rar$EXa7596.15181\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa7596.15181\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
new
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa7596.15181\payment receipt for confirmation of order.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7920"C:\Users\admin\AppData\Local\Temp\Rar$EXa7596.16452\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa7596.16452\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
new
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa7596.16452\payment receipt for confirmation of order.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
8004"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
8052"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
15 711
Read events
14 536
Write events
1 036
Delete events
139

Modification events

(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:6
Value:
01941A000000001000B24E9A3E06000000000000000600000000000000
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\OUTLOOK\6656
Operation:writeName:0
Value:
0B0E10DF5ECA6C84EB5A4EAE425D90401CD7E9230046C4E5B3B5F797EAED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C5118034D2120B6F00750074006C006F006F006B002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:BootCommand
Value:
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:BootFailureCount
Value:
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:delete keyName:(default)
Value:
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:CantBootResolution
Value:
BootSuccess
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:ProfileBeingOpened
Value:
Outlook
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:SessionId
Value:
C3D8E96E-C1AF-4750-8D52-F4E28119C131
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:BootDiagnosticsLogFile
Value:
C:\Users\admin\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16026_20146-20240718T1116060318-1644.etl
(PID) Process:(6656) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:ProfileBeingOpened
Value:
Executable files
4
Suspicious files
13
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
6656OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook1.pst
MD5:
SHA256:
6656OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:32E1AE569781E9A768F92A24FD1F51C1
SHA256:349C70DEF4878537BBA8F168DD1CC0A5F3CB76263BE241F0F536F4335A064D85
6656OUTLOOK.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04binary
MD5:F25DCDC613A8E29D6F29372622AC2CED
SHA256:F0A1FF2488B1B4FFBB7AA9FD0108763A6F535D6E485C0C3FCEAE202B63079D20
6656OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:932E9D6A8A162AC9DCB8BDD5E75CD59F
SHA256:C1E1D7483B27FF160C27947EC948C016D2578BA0F486E3CBACB257B160BC091A
6656OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmbinary
MD5:BBAF2994C52EE067C179B99DEDB30475
SHA256:5CECB09C0ECF68783BD15C9D866E231C5A73DFDF760DFD61D8548DFF63C0682A
6656OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WYGWYI80\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.lz:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
6656OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WYGWYI80\PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.lzcompressed
MD5:2ADBDF2BAB97615B910CFCE4E2383213
SHA256:E780AC01618ABB2CD9E83CF24F85716134BB733C4DF2596FF68EE4F946BF9332
6656OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:C512EA6FCB834CA5FCC1CECC4279C814
SHA256:A491A40323ED674F8F1DF818D2EAF1B5105F3BD37BB2623E14579A84CE7A5F8F
6656OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WYGWYI80\payment receitp (42.1 KB).msg:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
6656OUTLOOK.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04binary
MD5:0DCB49080024224774776684A3340B20
SHA256:CE2B4A7F74F06DCE79217AF4917AE88D1FEFCB715322C3A59DE23B4EE0FB97E7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
37
DNS requests
22
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
193.108.153.150:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
193.108.153.150:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6656
OUTLOOK.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
6656
OUTLOOK.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7660
PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe
GET
200
196.251.70.88:80
http://196.251.70.88/Ihhsp.mp3
unknown
unknown
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7820
SIHClient.exe
GET
200
184.30.25.170:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7820
SIHClient.exe
GET
200
184.30.25.170:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7920
PAYMENT RECEIPT FOR CONFIRMATION OF ORDER.exe
GET
200
196.251.70.88:80
http://196.251.70.88/Ihhsp.mp3
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
193.108.153.150:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
193.108.153.150:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6656
OUTLOOK.EXE
52.123.128.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6656
OUTLOOK.EXE
52.109.28.47:443
roaming.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
6656
OUTLOOK.EXE
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6656
OUTLOOK.EXE
2.18.121.4:443
omex.cdn.office.net
AKAMAI-AS
FR
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 193.108.153.150
  • 193.108.153.171
whitelisted
ecs.office.com
  • 52.123.128.14
  • 52.123.129.14
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
roaming.officeapps.live.com
  • 52.109.28.47
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
omex.cdn.office.net
  • 2.18.121.4
  • 2.18.121.30
whitelisted
login.live.com
  • 40.126.31.3
  • 20.190.159.68
  • 20.190.159.75
  • 40.126.31.128
  • 20.190.159.2
  • 20.190.159.71
  • 40.126.31.130
  • 20.190.159.4
  • 40.126.31.69
  • 20.190.159.64
  • 20.190.159.128
  • 40.126.31.1
  • 20.190.159.73
whitelisted
messaging.lifecycle.office.com
  • 52.111.231.8
whitelisted

Threats

PID
Process
Class
Message
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 38
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
8004
InstallUtil.exe
A Network Trojan was detected
REMOTE [ANY.RUN] DarkVision Check-in
8004
InstallUtil.exe
A Network Trojan was detected
ET MALWARE Win32/DarkVision RAT CnC Checkin M1
8004
InstallUtil.exe
A Network Trojan was detected
ET MALWARE Win32/DarkVision RAT CnC Checkin M1
8004
InstallUtil.exe
A Network Trojan was detected
ET MALWARE Win32/DarkVision RAT CnC Checkin M1
8004
InstallUtil.exe
A Network Trojan was detected
REMOTE [ANY.RUN] DarkVision Check-in
8004
InstallUtil.exe
A Network Trojan was detected
REMOTE [ANY.RUN] DarkVision Check-in
8004
InstallUtil.exe
A Network Trojan was detected
ET MALWARE Win32/DarkVision RAT CnC Checkin M1
8004
InstallUtil.exe
A Network Trojan was detected
ET MALWARE Win32/DarkVision RAT CnC Checkin M3
No debug info