Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
09-07-2021 10:20
Static task
static1
Behavioral task
behavioral1
Sample
parallax.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
parallax.exe
-
Size
2.0MB
-
MD5
81075ebd93715391ee2b49df955bba56
-
SHA1
fc41898fda17fe85f9aee596a08cace7d6ca4f64
-
SHA256
f36212eaeac80405017b3247f220ad07a15d95687481698808b15f42028d49cf
-
SHA512
6d0ada0ac276990557dd95224661ab2cdb7577cc786fd1b49bfb342253298fda24aafa4a037c55fd4232c7d1df510e37d5b1c63d347afde8cbc6f22cc15e0714
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1168-176-0x0000000000400000-0x0000000000427000-memory.dmp parallax_rat -
resource yara_rule behavioral2/memory/1168-176-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 500 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3968 parallax.exe 3968 parallax.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3968 parallax.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3968 parallax.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3968 wrote to memory of 3712 3968 parallax.exe 78 PID 3968 wrote to memory of 3712 3968 parallax.exe 78 PID 3968 wrote to memory of 3712 3968 parallax.exe 78 PID 3712 wrote to memory of 4044 3712 cmd.exe 80 PID 3712 wrote to memory of 4044 3712 cmd.exe 80 PID 3712 wrote to memory of 4044 3712 cmd.exe 80 PID 3968 wrote to memory of 3904 3968 parallax.exe 81 PID 3968 wrote to memory of 3904 3968 parallax.exe 81 PID 3968 wrote to memory of 3904 3968 parallax.exe 81 PID 3904 wrote to memory of 500 3904 cmd.exe 83 PID 3904 wrote to memory of 500 3904 cmd.exe 83 PID 3904 wrote to memory of 500 3904 cmd.exe 83 PID 3968 wrote to memory of 1168 3968 parallax.exe 84 PID 3968 wrote to memory of 1168 3968 parallax.exe 84 PID 3968 wrote to memory of 1168 3968 parallax.exe 84 PID 3968 wrote to memory of 1168 3968 parallax.exe 84 PID 3968 wrote to memory of 1168 3968 parallax.exe 84 PID 3968 wrote to memory of 1168 3968 parallax.exe 84 PID 3968 wrote to memory of 1168 3968 parallax.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\parallax.exe"C:\Users\Admin\AppData\Local\Temp\parallax.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.execmd /c xcopy "C:\Users\Admin\AppData\Local\Temp\parallax.exe" "%AppData%\Security\" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\parallax.exe" "C:\Users\Admin\AppData\Roaming\Security\" /y3⤵
- Enumerates system info in registry
PID:4044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%AppData%\Security\parallax.exe" /it /f2⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn "Security" /tr "C:\Users\Admin\AppData\Roaming\Security\parallax.exe" /it /f3⤵
- Creates scheduled task(s)
PID:500
-
-
-
C:\Windows\SysWOW64\sxstrace.exeC:\Windows\System32\sxstrace.exe2⤵PID:1168
-