Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    07-12-2020 18:43

General

  • Target

    https://drive.google.com/file/d/1RISyfN378Q5jlMUtytkiWnh_QKe_xdYB/view?usp=drive_web

  • Sample

    201207-5b1fe1qvb2

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 1 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Drops startup file 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/file/d/1RISyfN378Q5jlMUtytkiWnh_QKe_xdYB/view?usp=drive_web
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4092
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S7PGJ114\Flight Details.pdf.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" [System.Threading.Thread]::GetDomain().Load((ItemProperty HKCU:\/\/\/Software\/\/\/EOsGPFJ).xofORXWG);[PHoQo]::ngwnnupfOozH('C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S7PGJ114\Flight Details.pdf.vbs', 'lMbPwuG', 'Flight Details.pdf.vbs')
        3⤵
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\SysWOW64\svchost.exe"
          4⤵
            PID:1592
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\C75WK71L\Flight Details.pdf.vbs"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2244
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" [System.Threading.Thread]::GetDomain().Load((ItemProperty HKCU:\/\/\/Software\/\/\/EOsGPFJ).xofORXWG);[PHoQo]::ngwnnupfOozH('C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\C75WK71L\Flight Details.pdf.vbs', 'lMbPwuG', 'Flight Details.pdf.vbs')
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2620
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\SysWOW64\svchost.exe"
            4⤵
              PID:2112
            • C:\Windows\SysWOW64\svchost.exe
              "C:\Windows\SysWOW64\svchost.exe"
              4⤵
                PID:3944

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1028-23-0x0000013646780000-0x0000013646784000-memory.dmp

          Filesize

          16KB

        • memory/1592-32-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2304-31-0x0000000008F20000-0x0000000008F40000-memory.dmp

          Filesize

          128KB

        • memory/2304-21-0x00000000080B0000-0x00000000080B1000-memory.dmp

          Filesize

          4KB

        • memory/2304-22-0x0000000007E90000-0x0000000007E91000-memory.dmp

          Filesize

          4KB

        • memory/2304-19-0x00000000077A0000-0x00000000077A1000-memory.dmp

          Filesize

          4KB

        • memory/2304-27-0x0000000008E60000-0x0000000008E61000-memory.dmp

          Filesize

          4KB

        • memory/2304-28-0x0000000008BC0000-0x0000000008BC1000-memory.dmp

          Filesize

          4KB

        • memory/2304-29-0x0000000008BE0000-0x0000000008BE1000-memory.dmp

          Filesize

          4KB

        • memory/2304-30-0x0000000009490000-0x0000000009491000-memory.dmp

          Filesize

          4KB

        • memory/2304-20-0x0000000007BB0000-0x0000000007BB1000-memory.dmp

          Filesize

          4KB

        • memory/2304-18-0x0000000007710000-0x0000000007711000-memory.dmp

          Filesize

          4KB

        • memory/2304-17-0x00000000075A0000-0x00000000075A1000-memory.dmp

          Filesize

          4KB

        • memory/2304-16-0x0000000007420000-0x0000000007421000-memory.dmp

          Filesize

          4KB

        • memory/2304-15-0x0000000006DC0000-0x0000000006DC1000-memory.dmp

          Filesize

          4KB

        • memory/2304-14-0x0000000006750000-0x0000000006751000-memory.dmp

          Filesize

          4KB

        • memory/2304-13-0x000000006DD30000-0x000000006E41E000-memory.dmp

          Filesize

          6.9MB

        • memory/2620-39-0x000000006DD30000-0x000000006E41E000-memory.dmp

          Filesize

          6.9MB