Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-03-2021 08:12
Static task
static1
Behavioral task
behavioral1
Sample
e83b5f2b03ffe236917d448f42937528.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e83b5f2b03ffe236917d448f42937528.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
e83b5f2b03ffe236917d448f42937528.exe
-
Size
498KB
-
MD5
e83b5f2b03ffe236917d448f42937528
-
SHA1
f316f26720a06f7698e2ad6bb6e5bb64bfd602ef
-
SHA256
978a48a2dabf47b1f89f176583063b5b52f68ef81dc48e6f4acf38a16ef3680f
-
SHA512
da6d0914bdeba06a323f3a22292cf51497ab3e27f8ad1d1c6b77fa7e8e248c5a3139d8b7efd61edb2c2a91ac8482f5b2095d9aade7befe6813766c38d81fe8aa
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1244-9-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe 384 e83b5f2b03ffe236917d448f42937528.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1244 384 e83b5f2b03ffe236917d448f42937528.exe 29 PID 384 wrote to memory of 1232 384 e83b5f2b03ffe236917d448f42937528.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\e83b5f2b03ffe236917d448f42937528.exe"C:\Users\Admin\AppData\Local\Temp\e83b5f2b03ffe236917d448f42937528.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\e83b5f2b03ffe236917d448f42937528.exe"C:\Users\Admin\AppData\Local\Temp\e83b5f2b03ffe236917d448f42937528.exe"3⤵PID:1244
-
-