Analysis
-
max time kernel
18s -
max time network
80s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
07-12-2020 17:58
Static task
static1
Behavioral task
behavioral1
Sample
Flight Details.pdf.vbs
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
Flight Details.pdf.vbs
-
Size
384KB
-
MD5
d3315b0da7cd3e27ce7244317b98b76d
-
SHA1
c9d7c99326c9a999c65595101525eeefb6f765df
-
SHA256
efc19d1c7657d51ceacf7a531929fb128c19fc9d1e77dce596a19b37a18b1048
-
SHA512
10b895d0d087558cdd33142d7ec21f35e2b21910b981f5ca5587d60c4f5881546a043e98435c1a5fa793b1c8dbe2a19651ab25b85ed79e7aafb947e28e597fbb
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1188-26-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Flig.url powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 324 set thread context of 1188 324 powershell.exe 32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 324 powershell.exe 324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 324 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1668 wrote to memory of 324 1668 WScript.exe 30 PID 1668 wrote to memory of 324 1668 WScript.exe 30 PID 1668 wrote to memory of 324 1668 WScript.exe 30 PID 1668 wrote to memory of 324 1668 WScript.exe 30 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32 PID 324 wrote to memory of 1188 324 powershell.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Flight Details.pdf.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" [System.Threading.Thread]::GetDomain().Load((ItemProperty HKCU:\/\/\/Software\/\/\/EOsGPFJ).xofORXWG);[PHoQo]::ngwnnupfOozH('C:\Users\Admin\AppData\Local\Temp\Flight Details.pdf.vbs', 'lMbPwuG', 'Flight Details.pdf.vbs')2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵PID:1188
-
-