Analysis
-
max time kernel
84s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-09-2021 09:45
Static task
static1
Behavioral task
behavioral1
Sample
FireFoxExtension.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
FireFoxExtension.exe
-
Size
19.5MB
-
MD5
2e309f6569ad98bc9dda1178dbcf6296
-
SHA1
4c07d69e84935842ac2ce9a8ded577f1fc17280c
-
SHA256
bc2d39c8020a92de04d4a0749449595c2317d76dc607c56d2c26edf5fa3ef004
-
SHA512
c87bd9836ad2ec45e4192af135d23a5352b3b9331f813902e2f3627a8c913a1afb9c9eb1cb2b8089f236ce971b457a15e15b2c0b41aa5a8aa7cb92d9099f1b81
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1612-92-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Blocklisted process makes network request 4 IoCs
flow pid Process 8 536 cmd.exe 10 536 cmd.exe 12 536 cmd.exe 14 1612 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1716 FireFoxExtension.tmp 1796 opera.exe -
Loads dropped DLL 3 IoCs
pid Process 1544 FireFoxExtension.exe 1716 FireFoxExtension.tmp 1796 opera.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\opera.job cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 0f00000001000000140000005d82adb90d5dd3c7e3524f56f787ec53726187760b000000010000005200000047006f00200044006100640064007900200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f007200690074007900000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b06010505070303140000000100000014000000d2c4b0d291d44c1171b361cb3da1fedda86ad4e31d000000010000001000000099949d2179811f6b30a8c99c4f6b42260300000001000000140000002796bae63f1801e277261ba0d77770028f20eee420000000010000000404000030820400308202e8a003020102020100300d06092a864886f70d01010505003063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137303632305a170d3334303632393137303632305a3063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100de9dd7ea571849a15bebd75f4886eabeddffe4ef671cf46568b35771a05e77bbed9b49e970803d561863086fdaf2ccd03f7f0254225410d8b281d4c0753d4b7fc777c33e78ab1a03b5206b2f6a2bb1c5887ec4bb1eb0c1d845276faa3758f78726d7d82df6a917b71f72364ea6173f659892db2a6e5da2fe88e00bde7fe58d15e1ebcb3ad5e212a2132dd88eaf5f123da0080508b65ca565380445991ea3606074c541a572621b62c51f6f5f1a42be025165a8ae23186afc7803a94d7f80c3faab5afca140a4ca1916feb2c8ef5e730dee77bd9af67998bcb10767a2150ddda058c6447b0a3e62285fba41075358cf117e3874c5f8ffb569908f8474ea971baf020103a381c03081bd301d0603551d0e04160414d2c4b0d291d44c1171b361cb3da1fedda86ad4e330818d0603551d230481853081828014d2c4b0d291d44c1171b361cb3da1fedda86ad4e3a167a4653063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100324bf3b2ca3e91fc12c6a1078c8e77a03306145c901e18f708a63d0a19f98780116e69e4961730ff3491637238eecc1c01a31d9428a431f67ac454d7f6e5315803a2ccce62db944573b5bf45c924b5d58202ad2379698db8b64dcecf4cca3323e81c88aa9d8b416e16c920e5899ecd3bda70f77e992620145425ab6e7385e69b219d0a6c820ea8f8c20cfa101e6c96ef870dc40f618badee832b95f88e92847239eb20ea83ed83cd976e08bceb4e26b6732be4d3f64cfe2671e26111744aff571a870f75482ecf516917a002126195d5d140b2104ceec4ac1043a6a59e0ad595629a0dcf8882c5320ce42b9f45e60d9f289cb1b92a5a57ad370faf1d7fdbbd9f cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 opera.exe 536 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 536 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1716 1544 FireFoxExtension.exe 27 PID 1544 wrote to memory of 1716 1544 FireFoxExtension.exe 27 PID 1544 wrote to memory of 1716 1544 FireFoxExtension.exe 27 PID 1544 wrote to memory of 1716 1544 FireFoxExtension.exe 27 PID 1544 wrote to memory of 1716 1544 FireFoxExtension.exe 27 PID 1544 wrote to memory of 1716 1544 FireFoxExtension.exe 27 PID 1544 wrote to memory of 1716 1544 FireFoxExtension.exe 27 PID 1716 wrote to memory of 1744 1716 FireFoxExtension.tmp 28 PID 1716 wrote to memory of 1744 1716 FireFoxExtension.tmp 28 PID 1716 wrote to memory of 1744 1716 FireFoxExtension.tmp 28 PID 1716 wrote to memory of 1744 1716 FireFoxExtension.tmp 28 PID 1716 wrote to memory of 1828 1716 FireFoxExtension.tmp 30 PID 1716 wrote to memory of 1828 1716 FireFoxExtension.tmp 30 PID 1716 wrote to memory of 1828 1716 FireFoxExtension.tmp 30 PID 1716 wrote to memory of 1828 1716 FireFoxExtension.tmp 30 PID 1716 wrote to memory of 316 1716 FireFoxExtension.tmp 31 PID 1716 wrote to memory of 316 1716 FireFoxExtension.tmp 31 PID 1716 wrote to memory of 316 1716 FireFoxExtension.tmp 31 PID 1716 wrote to memory of 316 1716 FireFoxExtension.tmp 31 PID 316 wrote to memory of 524 316 cmd.exe 34 PID 316 wrote to memory of 524 316 cmd.exe 34 PID 316 wrote to memory of 524 316 cmd.exe 34 PID 316 wrote to memory of 524 316 cmd.exe 34 PID 1744 wrote to memory of 560 1744 cmd.exe 35 PID 1744 wrote to memory of 560 1744 cmd.exe 35 PID 1744 wrote to memory of 560 1744 cmd.exe 35 PID 1744 wrote to memory of 560 1744 cmd.exe 35 PID 1716 wrote to memory of 472 1716 FireFoxExtension.tmp 36 PID 1716 wrote to memory of 472 1716 FireFoxExtension.tmp 36 PID 1716 wrote to memory of 472 1716 FireFoxExtension.tmp 36 PID 1716 wrote to memory of 472 1716 FireFoxExtension.tmp 36 PID 1716 wrote to memory of 872 1716 FireFoxExtension.tmp 38 PID 1716 wrote to memory of 872 1716 FireFoxExtension.tmp 38 PID 1716 wrote to memory of 872 1716 FireFoxExtension.tmp 38 PID 1716 wrote to memory of 872 1716 FireFoxExtension.tmp 38 PID 1716 wrote to memory of 1440 1716 FireFoxExtension.tmp 40 PID 1716 wrote to memory of 1440 1716 FireFoxExtension.tmp 40 PID 1716 wrote to memory of 1440 1716 FireFoxExtension.tmp 40 PID 1716 wrote to memory of 1440 1716 FireFoxExtension.tmp 40 PID 1716 wrote to memory of 1480 1716 FireFoxExtension.tmp 43 PID 1716 wrote to memory of 1480 1716 FireFoxExtension.tmp 43 PID 1716 wrote to memory of 1480 1716 FireFoxExtension.tmp 43 PID 1716 wrote to memory of 1480 1716 FireFoxExtension.tmp 43 PID 1716 wrote to memory of 1796 1716 FireFoxExtension.tmp 44 PID 1716 wrote to memory of 1796 1716 FireFoxExtension.tmp 44 PID 1716 wrote to memory of 1796 1716 FireFoxExtension.tmp 44 PID 1716 wrote to memory of 1796 1716 FireFoxExtension.tmp 44 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45 PID 1796 wrote to memory of 536 1796 opera.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\FireFoxExtension.exe"C:\Users\Admin\AppData\Local\Temp\FireFoxExtension.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\is-J0ATN.tmp\FireFoxExtension.tmp"C:\Users\Admin\AppData\Local\Temp\is-J0ATN.tmp\FireFoxExtension.tmp" /SL5="$40118,19610817,831488,C:\Users\Admin\AppData\Local\Temp\FireFoxExtension.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:560
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:1828
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-81PKC.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Users\Admin\AppData\Local\Temp\is-81PKC.tmp"4⤵PID:524
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-81PKC.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:472
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-81PKC.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-81PKC.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:872
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-81PKC.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:1440
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-81PKC.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-81PKC.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:1480
-
-
C:\Users\Admin\AppData\Roaming\opera.exe"C:\Users\Admin\AppData\Roaming\opera.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:1612
-
-
-
-