Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
14-05-2021 16:51
Static task
static1
Behavioral task
behavioral1
Sample
DHL_45678.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DHL_45678.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
DHL_45678.exe
-
Size
680KB
-
MD5
f6ca1b224a24f24e3711cb9c7d5116e6
-
SHA1
0df6caa2522747881e0b7f727ea8fd8bdfc6ea38
-
SHA256
021490096d2120ed8c0802cb40e95a2501c83c5fde854071122c4e47c4ae370f
-
SHA512
4853b2b5994ab21063e3d9cfb58400911bad4247ad51b170969615cb8355ea4246d3e69c30317df519b1063da289d734934fc7ff664b8269552ac51bdca0b5ef
Score
10/10
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1320-125-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ouqsmx = "C:\\Users\\Public\\xmsquO.url" DHL_45678.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings ieinstal.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 2232 wrote to memory of 1320 2232 DHL_45678.exe 78 PID 1320 wrote to memory of 1668 1320 ieinstal.exe 79 PID 1320 wrote to memory of 1668 1320 ieinstal.exe 79 PID 1320 wrote to memory of 1668 1320 ieinstal.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL_45678.exe"C:\Users\Admin\AppData\Local\Temp\DHL_45678.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\UN.vbs"3⤵PID:1668
-
-