Analysis
-
max time kernel
137s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
10-05-2021 13:03
Static task
static1
Behavioral task
behavioral1
Sample
DHL_988121.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DHL_988121.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
DHL_988121.exe
-
Size
712KB
-
MD5
da9cf01565ca4a3abbe4630656fadd23
-
SHA1
781194da5ae0e04e02ba0c270483fac9d1c6b431
-
SHA256
29369c122e942e2ca2747a55895c0d0439acfc372f5b698b250bb6af7fc90914
-
SHA512
eeeec69db00809b9fa372a3fb9a185e6cefc0a945cb0b0c1f1f99fc36c971f8b28ea28bf617cea5637b60a4def94610e8a5aa6ad0ae41e2c7c6cfbdea3b5b818
Score
10/10
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1212-74-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cgobib = "C:\\Users\\Public\\bibogC.url" DHL_988121.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 816 1212 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 816 WerFault.exe 816 WerFault.exe 816 WerFault.exe 816 WerFault.exe 816 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 816 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 816 WerFault.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1756 wrote to memory of 1212 1756 DHL_988121.exe 31 PID 1212 wrote to memory of 816 1212 mshta.exe 32 PID 1212 wrote to memory of 816 1212 mshta.exe 32 PID 1212 wrote to memory of 816 1212 mshta.exe 32 PID 1212 wrote to memory of 816 1212 mshta.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL_988121.exe"C:\Users\Admin\AppData\Local\Temp\DHL_988121.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\mshta.exeC:\Windows\System32\mshta.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 1403⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-