Analysis
-
max time kernel
125s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
14-05-2021 18:01
Static task
static1
Behavioral task
behavioral1
Sample
DHL_445612.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DHL_445612.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
DHL_445612.exe
-
Size
680KB
-
MD5
71eb13d39ea53247b31f50215ef68a75
-
SHA1
9c7fffc5d0aaa8e5db3ce242219b3e66a76e7f50
-
SHA256
9e6ca1829c70d7c35efb63e7c8374e8d623068b7c9422a583992c4d49ce92672
-
SHA512
887d35acb85270a1964efded7e8e6f5a14c5e692fd841cdf7f9fa27b18ad7dca1a652866dfd584e3f365c3ba7ceb5a5c3d6ed04919cb341d0a5b318b64cec666
Score
10/10
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/2844-125-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Eldvhu = "C:\\Users\\Public\\uhvdlE.url" DHL_445612.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78 PID 4024 wrote to memory of 2844 4024 DHL_445612.exe 78