Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
25-08-2021 12:10
Static task
static1
Behavioral task
behavioral1
Sample
389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe
-
Size
13.6MB
-
MD5
415c3aa31822921311e2f080b3814924
-
SHA1
796231aacfe6bf73ac73e95f1f061307f6c3ae68
-
SHA256
389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a
-
SHA512
637b3feb21e3a4fc497faa5e762d843acb3c2e8688f98cc2f30aaf468d9ac10d62dcbc7736baedb43e677674728afea748dc35acaff1c554ac754e5c8a6eff6a
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/316-92-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Executes dropped EXE 2 IoCs
pid Process 1284 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.tmp 1724 UtorrentV4.exe -
resource yara_rule behavioral1/files/0x0003000000013110-68.dat upx behavioral1/files/0x0003000000013110-70.dat upx -
Loads dropped DLL 6 IoCs
pid Process 788 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe 1284 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.tmp 1724 UtorrentV4.exe 1724 UtorrentV4.exe 1724 UtorrentV4.exe 1724 UtorrentV4.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1724 UtorrentV4.exe 1552 notepad.exe 1552 notepad.exe 1552 notepad.exe 1552 notepad.exe 1552 notepad.exe 1552 notepad.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1552 notepad.exe 1552 notepad.exe 1552 notepad.exe 1552 notepad.exe 1552 notepad.exe 1552 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 788 wrote to memory of 1284 788 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe 26 PID 788 wrote to memory of 1284 788 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe 26 PID 788 wrote to memory of 1284 788 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe 26 PID 788 wrote to memory of 1284 788 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe 26 PID 788 wrote to memory of 1284 788 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe 26 PID 788 wrote to memory of 1284 788 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe 26 PID 788 wrote to memory of 1284 788 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe 26 PID 1284 wrote to memory of 1724 1284 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.tmp 28 PID 1284 wrote to memory of 1724 1284 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.tmp 28 PID 1284 wrote to memory of 1724 1284 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.tmp 28 PID 1284 wrote to memory of 1724 1284 389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.tmp 28 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1724 wrote to memory of 1552 1724 UtorrentV4.exe 31 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 652 1552 notepad.exe 34 PID 1552 wrote to memory of 1384 1552 notepad.exe 35 PID 1552 wrote to memory of 1384 1552 notepad.exe 35 PID 1552 wrote to memory of 1384 1552 notepad.exe 35 PID 1552 wrote to memory of 1384 1552 notepad.exe 35 PID 1552 wrote to memory of 1384 1552 notepad.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe"C:\Users\Admin\AppData\Local\Temp\389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\is-E5CEH.tmp\389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.tmp"C:\Users\Admin\AppData\Local\Temp\is-E5CEH.tmp\389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.tmp" /SL5="$30018,13430622,831488,C:\Users\Admin\AppData\Local\Temp\389c556e30252966f34f1bc23348e182af2c0883771f9c8abe299a8ba54b1f6a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Roaming\UtorrentV4.exe"C:\Users\Admin\AppData\Roaming\UtorrentV4.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1668
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵PID:316
-
-
-
-