Analysis

  • max time kernel
    5s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-02-2021 11:30

General

  • Target

    1f54c4b578cdcaf15c817f18ee715a8cf2b7944c44e268ae8fa8bc9427922bf2.exe

  • Size

    3.2MB

  • MD5

    e890b231731a69c7fcc252bf6d8b59d6

  • SHA1

    74d0fb7d0d4f6e314e8cb92a506bbc3e33fad2cd

  • SHA256

    1f54c4b578cdcaf15c817f18ee715a8cf2b7944c44e268ae8fa8bc9427922bf2

  • SHA512

    0751518e5ca71f023b6f0b09f48168ebfd9d2fa97c1ae4be70eddfc672517515b3b36a913e540a74fdd13edb958bfc341f1f6a7a86104c13cf9d7d9673085c86

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 1 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Blocklisted process makes network request 1 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f54c4b578cdcaf15c817f18ee715a8cf2b7944c44e268ae8fa8bc9427922bf2.exe
    "C:\Users\Admin\AppData\Local\Temp\1f54c4b578cdcaf15c817f18ee715a8cf2b7944c44e268ae8fa8bc9427922bf2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Users\Admin\AppData\Local\Temp\1f54c4b578cdcaf15c817f18ee715a8cf2b7944c44e268ae8fa8bc9427922bf2.exe"
      2⤵
      • Blocklisted process makes network request
      PID:1452
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
    1⤵
    • Drops startup file
    PID:1544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1040-2-0x0000000076311000-0x0000000076313000-memory.dmp

    Filesize

    8KB

  • memory/1040-3-0x0000000000320000-0x000000000039B000-memory.dmp

    Filesize

    492KB

  • memory/1040-7-0x0000000002170000-0x00000000022F0000-memory.dmp

    Filesize

    1.5MB

  • memory/1452-8-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1452-9-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB