Analysis
-
max time kernel
7s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-09-2021 06:59
Static task
static1
Behavioral task
behavioral1
Sample
5c9106490619ef294e77900e55f81a756e68b5b117458b2c6df8eac742b6ebf8.bin.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
5c9106490619ef294e77900e55f81a756e68b5b117458b2c6df8eac742b6ebf8.bin.dll
-
Size
4.8MB
-
MD5
18337a5ab0cd9c6244657872a6769619
-
SHA1
46568704d146cf27a4b364a8838e24fb3fddc8ac
-
SHA256
5c9106490619ef294e77900e55f81a756e68b5b117458b2c6df8eac742b6ebf8
-
SHA512
8a1dc4b9b985c9ca1c5b405d6d984d5b4b154560d0c2eadea26260182b9a56a78bbc81970a210cf76b9d81b5a34550301e4d9d1506ebaa66b082287c1a218367
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/2576-177-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
suricata: ET MALWARE Parallax CnC Response Activity M14
suricata: ET MALWARE Parallax CnC Response Activity M14
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 908 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 740 wrote to memory of 908 740 rundll32.exe 68 PID 740 wrote to memory of 908 740 rundll32.exe 68 PID 740 wrote to memory of 908 740 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c9106490619ef294e77900e55f81a756e68b5b117458b2c6df8eac742b6ebf8.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c9106490619ef294e77900e55f81a756e68b5b117458b2c6df8eac742b6ebf8.bin.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:908 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"3⤵PID:1004
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵PID:2576
-
-
-