• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security Latest Cybersecurity News Windows security

DarkWatchman malware is sneaky and hides in the Windows Registry

John Greenwood Posted On December 20, 2021
0



DarkWatchman Malware

Technical Researchers from Prevailion have discovered a new malware called ‘DarkWatchman’ that is highly-capable of JavaScript RAT along with a C# keylogger. This new malware is used by Russian actors targeting Russian entities. This malware was first discovered in November and was distributed using phishing campaigns.

The Modus Operandi of DarkWarchman malware

The phishing emails contained a ZIP document which had an EXE file but impersonated as a text document. This EXE file can auto-install itself and deploy the RAT and Keylogger. Once the victim opens the ZIP document, a popup message will be shown, displaying ‘Unknown Format’, while the malware is silently installed in the background.

The JavaScript RAT file is only 32 kb in size and thus a very light weight malware. The DarkWatchman malware uses the binaries and scripts to execute the stealthy mode data transfer between its modules. The malware also uses the Windows Registry fileless storage mechanism for the keylogger. There will be a scheduled task created to initiate the RAT every time without storing the keylogger in the desk.  

DarkWatchmen malware executes a PowerShell Script which will execute the .NET CSC.exe command and deploys it into the memory.

The Prevailion researchers said the following regarding they Keylogger and RAT combo,

“The keylogger is distributed as obfuscated C# source code that is processed and stored in the registry as a Base64-encoded PowerShell command. When the RAT is launched, it executes this PowerShell script which, in turn, compiles the keylogger (using CSC) and executes it. The keylogger itself does not communicate with the C2 or write to disk. Instead, it writes its keylog to a registry key that it uses as a buffer. During its operation, the RAT scrapes and clears this buffer before transmitting the logged keystrokes to the C2 server.”

DarkWatchman malware

Also the registry is used more than just hiding the exe file by acting as a temporary location by holding the stolen information until its been exported to the C2. The DarkWatchman malware uses domain generation algorithms (DGA) to generate 500 domains everyday.

DarkWatchman malware

DarkWatchman malware comes with several threats,

  • Capable of loading DLL files
  • Execute commands
  • Execute EXE files
  • Execute WSH commands
  • Export files to C2 server
  • Remote control and update over RAT and Keylogger
  • DGA for C2 resilience
  • Overrides admin permissions by deleting shadow copies using vssadmin.exe

DarkWatchman Malware and the ransomware suspicion

Prevailion mentions that DarkWatchman malware could be orchestrated by ransomware operators as they may need a sneaky assistance for their bigger missions. Since DarkWatchman can load more payloads and be used for ransomware deployments as well. With DarkWatchman malware ransomware attacks could become more sophisticated and it will be challenging to narrow down the suspects unless they make the claim themselves.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends


DarkWatchmanDarkWatchman malware


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search