Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-12-2020 03:31

General

  • Target

    sample.exe

  • Size

    1.2MB

  • MD5

    33002b60b9e6fd6307e2eeaf2bcf78b6

  • SHA1

    1e641d295cbe6c6d27f03eda190e1470a83e5d98

  • SHA256

    829fce14ac8b9ad293076c16a1750502c6b303123c9bd0fb17c1772330577d65

  • SHA512

    00090799c2317aec2f16553a49ca1dcc8add6bc550f0fc4a05826aa32366b845655ed9294cbbf3dd2b0e83c6fef9bcd25e90662de36e11218fb711fe9e203c80

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 1 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Blocklisted process makes network request 76 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 163 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\system32\mstsc.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3912
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        PID:1512
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
    1⤵
      PID:3260
      • C:\Windows\System32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "powershell.exe -command "Set-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-1985363256-3005190890-1182679451-1000\"""
        2⤵
          PID:200
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-1985363256-3005190890-1182679451-1000\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3148

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3148-9-0x00007FFD88300000-0x00007FFD88CEC000-memory.dmp

        Filesize

        9.9MB

      • memory/3148-10-0x000001E4B8580000-0x000001E4B8581000-memory.dmp

        Filesize

        4KB

      • memory/3148-11-0x000001E4B8730000-0x000001E4B8731000-memory.dmp

        Filesize

        4KB

      • memory/3912-3-0x000000000CF00000-0x000000000CF36000-memory.dmp

        Filesize

        216KB

      • memory/3912-4-0x000000000D410000-0x000000000D43B000-memory.dmp

        Filesize

        172KB