Analysis

  • max time kernel
    19s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    27-11-2020 11:07

General

  • Target

    83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce.exe

  • Size

    618KB

  • MD5

    fd271d9e9226304745461177b444fdbc

  • SHA1

    b86892f176e96f68346578cd48ba284881a76471

  • SHA256

    83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce

  • SHA512

    f8224d2b54daff4b93e91256430bfc3356c8e7a76c918a953f6332125d0c84d85612991110a067bd373f1856dc8e10a30ab0ff3283c59951ecf16e00ddd09895

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 1 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Blacklisted process makes network request 1 IoCs
  • Drops startup file 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce.exe
    "C:\Users\Admin\AppData\Local\Temp\83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Users\Admin\AppData\Local\Temp\83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce.exe"
      2⤵
      • Blacklisted process makes network request
      PID:2504
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
    1⤵
    • Drops startup file
    PID:2288

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2504-3-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB