Analysis
-
max time kernel
62s -
max time network
105s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
07-12-2020 17:58
Static task
static1
Behavioral task
behavioral1
Sample
Flight Details.pdf.vbs
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
Flight Details.pdf.vbs
-
Size
384KB
-
MD5
d3315b0da7cd3e27ce7244317b98b76d
-
SHA1
c9d7c99326c9a999c65595101525eeefb6f765df
-
SHA256
efc19d1c7657d51ceacf7a531929fb128c19fc9d1e77dce596a19b37a18b1048
-
SHA512
10b895d0d087558cdd33142d7ec21f35e2b21910b981f5ca5587d60c4f5881546a043e98435c1a5fa793b1c8dbe2a19651ab25b85ed79e7aafb947e28e597fbb
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/3856-18-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Flig.url powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1000 set thread context of 3856 1000 powershell.exe 82 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1000 powershell.exe 1000 powershell.exe 1000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1000 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1176 wrote to memory of 1000 1176 WScript.exe 80 PID 1176 wrote to memory of 1000 1176 WScript.exe 80 PID 1176 wrote to memory of 1000 1176 WScript.exe 80 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82 PID 1000 wrote to memory of 3856 1000 powershell.exe 82
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Flight Details.pdf.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" [System.Threading.Thread]::GetDomain().Load((ItemProperty HKCU:\/\/\/Software\/\/\/EOsGPFJ).xofORXWG);[PHoQo]::ngwnnupfOozH('C:\Users\Admin\AppData\Local\Temp\Flight Details.pdf.vbs', 'lMbPwuG', 'Flight Details.pdf.vbs')2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵PID:3856
-
-