Analysis
-
max time kernel
145s -
max time network
182s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
09-07-2021 10:20
Static task
static1
Behavioral task
behavioral1
Sample
parallax.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
parallax.exe
-
Size
2.0MB
-
MD5
81075ebd93715391ee2b49df955bba56
-
SHA1
fc41898fda17fe85f9aee596a08cace7d6ca4f64
-
SHA256
f36212eaeac80405017b3247f220ad07a15d95687481698808b15f42028d49cf
-
SHA512
6d0ada0ac276990557dd95224661ab2cdb7577cc786fd1b49bfb342253298fda24aafa4a037c55fd4232c7d1df510e37d5b1c63d347afde8cbc6f22cc15e0714
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1716-86-0x0000000000400000-0x0000000000427000-memory.dmp parallax_rat -
resource yara_rule behavioral1/memory/1716-86-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1524 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1660 parallax.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1660 parallax.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1660 parallax.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1660 wrote to memory of 632 1660 parallax.exe 29 PID 1660 wrote to memory of 632 1660 parallax.exe 29 PID 1660 wrote to memory of 632 1660 parallax.exe 29 PID 1660 wrote to memory of 632 1660 parallax.exe 29 PID 632 wrote to memory of 1420 632 cmd.exe 31 PID 632 wrote to memory of 1420 632 cmd.exe 31 PID 632 wrote to memory of 1420 632 cmd.exe 31 PID 632 wrote to memory of 1420 632 cmd.exe 31 PID 1660 wrote to memory of 688 1660 parallax.exe 32 PID 1660 wrote to memory of 688 1660 parallax.exe 32 PID 1660 wrote to memory of 688 1660 parallax.exe 32 PID 1660 wrote to memory of 688 1660 parallax.exe 32 PID 688 wrote to memory of 1524 688 cmd.exe 34 PID 688 wrote to memory of 1524 688 cmd.exe 34 PID 688 wrote to memory of 1524 688 cmd.exe 34 PID 688 wrote to memory of 1524 688 cmd.exe 34 PID 1660 wrote to memory of 1716 1660 parallax.exe 35 PID 1660 wrote to memory of 1716 1660 parallax.exe 35 PID 1660 wrote to memory of 1716 1660 parallax.exe 35 PID 1660 wrote to memory of 1716 1660 parallax.exe 35 PID 1660 wrote to memory of 1716 1660 parallax.exe 35 PID 1660 wrote to memory of 1716 1660 parallax.exe 35 PID 1660 wrote to memory of 1716 1660 parallax.exe 35 PID 1660 wrote to memory of 1716 1660 parallax.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\parallax.exe"C:\Users\Admin\AppData\Local\Temp\parallax.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd /c xcopy "C:\Users\Admin\AppData\Local\Temp\parallax.exe" "%AppData%\Security\" /y2⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\parallax.exe" "C:\Users\Admin\AppData\Roaming\Security\" /y3⤵
- Enumerates system info in registry
PID:1420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%AppData%\Security\parallax.exe" /it /f2⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn "Security" /tr "C:\Users\Admin\AppData\Roaming\Security\parallax.exe" /it /f3⤵
- Creates scheduled task(s)
PID:1524
-
-
-
C:\Windows\SysWOW64\sxstrace.exeC:\Windows\System32\sxstrace.exe2⤵PID:1716
-