Threat name:
ScreenConnect Tool, Amadey, DarkVision R
Alert
Classification:
rans.phis.troj.spyw.expl.evad
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to hide user accounts
Contains functionality to start a terminal service
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Enables network access during safeboot for specific services
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies security policies related information
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Possible COM Object hijacking
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Windows Binaries Write Suspicious Extensions
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade analysis by execution special instruction (VM detection)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes many files with high entropy
Yara detected Amadeys Clipper DLL
Yara detected DarkVision Rat
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1649264
Sample:
ATitERlY7I.exe
Startdate:
26/03/2025
Architecture:
WINDOWS
Score:
100
198
Found malware configuration
2->198
200
Malicious sample detected
(through community Yara
rule)
2->200
202
Antivirus detection
for URL or domain
2->202
204
30 other signatures
2->204
10
rapes.exe
1
39
2->10
started
15
ATitERlY7I.exe
1
2->15
started
17
msiexec.exe
2->17
started
19
5 other processes
2->19
process3
dnsIp4
164
176.113.115.6
SELECTELRU
Russian Federation
10->164
166
140.82.113.4
GITHUBUS
United States
10->166
172
2 other IPs or domains
10->172
134
C:\Users\user\AppData\Local\...\WLbfHbp.exe, PE32
10->134
dropped
136
C:\Users\user\AppData\Local\...\f73ae_003.exe, PE32
10->136
dropped
138
C:\Users\user\AppData\Local\...\TbV75ZR.exe, PE32
10->138
dropped
148
18 other malicious files
10->148
dropped
258
Contains functionality
to start a terminal
service
10->258
260
Creates multiple autostart
registry keys
10->260
262
Hides threads from debuggers
10->262
280
2 other signatures
10->280
21
f73ae_003.exe
3
1
10->21
started
24
TbV75ZR.exe
10->24
started
27
7IIl2eE.exe
10->27
started
39
5 other processes
10->39
168
176.113.115.7
SELECTELRU
Russian Federation
15->168
170
172.64.80.1
CLOUDFLARENETUS
United States
15->170
140
C:\Users\...\Y51F5R8RTSY3X5EIVUZFK6OH6ZM.exe, PE32
15->140
dropped
264
Detected unpacking (changes
PE section rights)
15->264
266
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->266
268
Query firmware table
information (likely
to detect VMs)
15->268
282
3 other signatures
15->282
29
Y51F5R8RTSY3X5EIVUZFK6OH6ZM.exe
4
15->29
started
142
C:\Windows\Installer\MSI913A.tmp, PE32
17->142
dropped
144
C:\Windows\Installer\MSI8189.tmp, PE32
17->144
dropped
146
C:\...\ScreenConnect.WindowsFileManager.exe, PE32
17->146
dropped
150
9 other malicious files
17->150
dropped
270
Enables network access
during safeboot for
specific services
17->270
272
Modifies security policies
related information
17->272
31
msiexec.exe
17->31
started
33
msiexec.exe
17->33
started
35
msiexec.exe
17->35
started
274
Benign windows process
drops PE files
19->274
276
Changes security center
settings (notifications,
updates, antivirus,
firewall)
19->276
278
Writes many files with
high entropy
19->278
37
MpCmdRun.exe
2
19->37
started
file5
signatures6
process7
file8
208
Antivirus detection
for dropped file
21->208
210
Multi AV Scanner detection
for dropped file
21->210
212
Query firmware table
information (likely
to detect VMs)
21->212
228
5 other signatures
21->228
41
svchost.exe
3
7
21->41
started
46
cmd.exe
1
21->46
started
98
C:\Users\user\AppData\Local\...\Weekends.vss, data
24->98
dropped
100
C:\Users\user\AppData\...\Strengthening.vss, data
24->100
dropped
112
11 other malicious files
24->112
dropped
214
Writes many files with
high entropy
24->214
48
cmd.exe
24->48
started
102
C:\Users\user\AppData\Local\...\Visitor.cab, data
27->102
dropped
104
C:\Users\user\AppData\Local\Temp\Tigers.cab, data
27->104
dropped
106
C:\Users\user\AppData\Local\...\Theology.cab, data
27->106
dropped
114
6 other malicious files
27->114
dropped
50
cmd.exe
27->50
started
108
C:\Users\user\AppData\Local\...\rapes.exe, PE32
29->108
dropped
216
Detected unpacking (changes
PE section rights)
29->216
218
Contains functionality
to start a terminal
service
29->218
220
Tries to evade debugger
and weak emulator (self
modifying code)
29->220
230
4 other signatures
29->230
52
rapes.exe
29->52
started
54
rundll32.exe
31->54
started
56
conhost.exe
37->56
started
110
C:\Users\user\AppData\Local\...\R1qcWNAGC.hta, HTML
39->110
dropped
222
Contains functionality
to hide user accounts
39->222
224
Binary is likely a compiled
AutoIt script file
39->224
226
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
39->226
232
3 other signatures
39->232
58
mshta.exe
39->58
started
60
3 other processes
39->60
signatures9
process10
dnsIp11
160
82.29.67.160
NTLGB
United Kingdom
41->160
162
104.26.8.202
CLOUDFLARENETUS
United States
41->162
116
C:\Users\user\AppData\Local\...\w32tm.exe, PE32+
41->116
dropped
118
C:\ProgramData\...\tzutil.exe, PE32+
41->118
dropped
120
C:\Users\user\AppData\Local\Temp\...\set.bat, PNG
41->120
dropped
234
Creates autostart registry
keys with suspicious
names
41->234
236
Creates multiple autostart
registry keys
41->236
62
tzutil.exe
41->62
started
67
w32tm.exe
41->67
started
69
cmd.exe
41->69
started
238
Adds a directory exclusion
to Windows Defender
46->238
71
powershell.exe
46->71
started
73
conhost.exe
46->73
started
122
C:\Users\user\AppData\Local\Temp\...xam.com, PE32
48->122
dropped
79
12 other processes
48->79
240
Drops PE files with
a suspicious file extension
50->240
242
Writes many files with
high entropy
50->242
75
conhost.exe
50->75
started
244
Detected unpacking (changes
PE section rights)
52->244
246
Contains functionality
to start a terminal
service
52->246
248
Tries to evade debugger
and weak emulator (self
modifying code)
52->248
256
3 other signatures
52->256
124
C:\Users\user\...\ScreenConnect.Windows.dll, PE32
54->124
dropped
126
C:\...\ScreenConnect.InstallerActions.dll, PE32
54->126
dropped
128
C:\Users\user\...\ScreenConnect.Core.dll, PE32
54->128
dropped
132
4 other malicious files
54->132
dropped
250
Contains functionality
to hide user accounts
54->250
252
Suspicious powershell
command line found
58->252
254
Tries to download and
execute files (via powershell)
58->254
77
powershell.exe
58->77
started
130
C:\Users\user\AppData\Local\...\MSI5AA7.tmp, PE32
60->130
dropped
81
2 other processes
60->81
file12
signatures13
process14
dnsIp15
174
104.168.28.10
AS-COLOCROSSINGUS
United States
62->174
176
127.0.0.1
unknown
unknown
62->176
152
C:\Windows\Temp\KM5s9h_8128.sys, PE32+
62->152
dropped
180
Antivirus detection
for dropped file
62->180
182
Multi AV Scanner detection
for dropped file
62->182
184
Query firmware table
information (likely
to detect VMs)
62->184
196
2 other signatures
62->196
83
powershell.exe
62->83
started
86
powershell.exe
62->86
started
178
4.28.136.57
LEVEL3US
United States
67->178
154
C:\Users\user\AppData\Local\...\4ef72a73.exe, PE32
67->154
dropped
186
Tries to evade analysis
by execution special
instruction (VM detection)
67->186
188
Writes many files with
high entropy
67->188
190
Found direct / indirect
Syscall (likely to bypass
EDR)
67->190
88
conhost.exe
69->88
started
192
Loading BitLocker PowerShell
Module
71->192
156
TempTPHYRBLB1O9CZBK8A5DEKA0OBZRCZLUJ.EXE, PE32
77->156
dropped
194
Powershell drops PE
file
77->194
90
conhost.exe
77->90
started
158
C:\Users\user\AppData\Local\Temp\267978\j, data
79->158
dropped
file16
signatures17
process18
signatures19
206
Loading BitLocker PowerShell
Module
83->206
92
conhost.exe
83->92
started
94
WmiPrvSE.exe
83->94
started
96
conhost.exe
86->96
started
process20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.