Analysis
-
max time kernel
130s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 09:38
Static task
static1
Behavioral task
behavioral1
Sample
c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.exe
Resource
win7-en-20211014
General
-
Target
c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.exe
-
Size
19.5MB
-
MD5
6374c01ed81cea712fe61d0774521ac3
-
SHA1
6a2957d427b9ca85f58266564951e6e56da89566
-
SHA256
c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339
-
SHA512
4a85f10a54a8721d09e2ba9171882c53b83bdb9c87ad3ec84877f7a34d6007b6d12cfe0d9a8b48d41ac9054a3d78781a4fd299def96ff0927917b4d5c4bcab83
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1956-199-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Blocklisted process makes network request 1 IoCs
flow pid Process 30 1956 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 1128 opera.exe -
Loads dropped DLL 1 IoCs
pid Process 1128 opera.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\opera.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1128 opera.exe 1804 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1804 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2792 1352 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.exe 69 PID 1352 wrote to memory of 2792 1352 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.exe 69 PID 1352 wrote to memory of 2792 1352 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.exe 69 PID 2792 wrote to memory of 1528 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 70 PID 2792 wrote to memory of 1528 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 70 PID 2792 wrote to memory of 1528 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 70 PID 2792 wrote to memory of 3792 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 71 PID 2792 wrote to memory of 3792 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 71 PID 2792 wrote to memory of 3792 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 71 PID 2792 wrote to memory of 3932 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 75 PID 2792 wrote to memory of 3932 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 75 PID 2792 wrote to memory of 3932 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 75 PID 3932 wrote to memory of 1112 3932 cmd.exe 76 PID 3932 wrote to memory of 1112 3932 cmd.exe 76 PID 3932 wrote to memory of 1112 3932 cmd.exe 76 PID 1528 wrote to memory of 684 1528 cmd.exe 77 PID 1528 wrote to memory of 684 1528 cmd.exe 77 PID 1528 wrote to memory of 684 1528 cmd.exe 77 PID 2792 wrote to memory of 388 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 78 PID 2792 wrote to memory of 388 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 78 PID 2792 wrote to memory of 388 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 78 PID 2792 wrote to memory of 3996 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 80 PID 2792 wrote to memory of 3996 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 80 PID 2792 wrote to memory of 3996 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 80 PID 2792 wrote to memory of 396 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 82 PID 2792 wrote to memory of 396 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 82 PID 2792 wrote to memory of 396 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 82 PID 2792 wrote to memory of 1056 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 84 PID 2792 wrote to memory of 1056 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 84 PID 2792 wrote to memory of 1056 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 84 PID 2792 wrote to memory of 1128 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 86 PID 2792 wrote to memory of 1128 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 86 PID 2792 wrote to memory of 1128 2792 c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp 86 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87 PID 1128 wrote to memory of 1804 1128 opera.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.exe"C:\Users\Admin\AppData\Local\Temp\c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\is-IJV5F.tmp\c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp"C:\Users\Admin\AppData\Local\Temp\is-IJV5F.tmp\c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.tmp" /SL5="$3011A,19610817,831488,C:\Users\Admin\AppData\Local\Temp\c183d00cdf9f69f815e28277f5aed7503c41c6c77d8351fd1cd38d3f3144d339.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:684
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:3792
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-AK0LN.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\AppData\Local\Microsoft\WindowsApps;C:\Users\Admin\AppData\Local\Temp\is-AK0LN.tmp"4⤵PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-AK0LN.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:388
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-AK0LN.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-AK0LN.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:3996
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-AK0LN.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:396
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-AK0LN.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-AK0LN.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:1056
-
-
C:\Users\Admin\AppData\Roaming\opera.exe"C:\Users\Admin\AppData\Roaming\opera.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:1956
-
-
-
-