Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 09:37
Static task
static1
Behavioral task
behavioral1
Sample
e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.exe
Resource
win7-en-20211014
General
-
Target
e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.exe
-
Size
8.3MB
-
MD5
ccd06635e00d0387499240fba7bc3559
-
SHA1
37c6ecc5808fa6b73fe8855b0c28cabbe7a69956
-
SHA256
e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a
-
SHA512
dc371226c37b324168652c166b9d532104875b10dc05a7eda522e43a8921a952d4877722268bf4dfe5016d2be88e88c6d8e4f65d8c5c50f708b86b487c94f17d
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/2220-248-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
suricata: ET MALWARE Parallax CnC Response Activity M14
suricata: ET MALWARE Parallax CnC Response Activity M14
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 3020 bcdedit.exe -
Executes dropped EXE 2 IoCs
pid Process 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 1684 syskey.exe -
Loads dropped DLL 21 IoCs
pid Process 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe 1684 syskey.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\syskey.job notepad.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1684 syskey.exe 2280 cmd.exe 2280 cmd.exe 2280 cmd.exe 2280 cmd.exe 2280 cmd.exe 2280 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2280 cmd.exe 2280 cmd.exe 2280 cmd.exe 2280 cmd.exe 2280 cmd.exe 2280 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3424 1752 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.exe 70 PID 1752 wrote to memory of 3424 1752 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.exe 70 PID 1752 wrote to memory of 3424 1752 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.exe 70 PID 3424 wrote to memory of 1316 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 71 PID 3424 wrote to memory of 1316 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 71 PID 3424 wrote to memory of 1332 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 73 PID 3424 wrote to memory of 1332 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 73 PID 3424 wrote to memory of 656 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 74 PID 3424 wrote to memory of 656 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 74 PID 1332 wrote to memory of 3020 1332 cmd.exe 77 PID 1332 wrote to memory of 3020 1332 cmd.exe 77 PID 656 wrote to memory of 3420 656 cmd.exe 78 PID 656 wrote to memory of 3420 656 cmd.exe 78 PID 1316 wrote to memory of 1604 1316 cmd.exe 79 PID 1316 wrote to memory of 1604 1316 cmd.exe 79 PID 3424 wrote to memory of 364 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 80 PID 3424 wrote to memory of 364 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 80 PID 3424 wrote to memory of 3732 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 82 PID 3424 wrote to memory of 3732 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 82 PID 3424 wrote to memory of 4016 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 84 PID 3424 wrote to memory of 4016 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 84 PID 3424 wrote to memory of 360 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 86 PID 3424 wrote to memory of 360 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 86 PID 3424 wrote to memory of 1684 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 88 PID 3424 wrote to memory of 1684 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 88 PID 3424 wrote to memory of 1684 3424 e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp 88 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89 PID 1684 wrote to memory of 2280 1684 syskey.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.exe"C:\Users\Admin\AppData\Local\Temp\e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\is-LOJQ6.tmp\e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp"C:\Users\Admin\AppData\Local\Temp\is-LOJQ6.tmp\e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.tmp" /SL5="$30116,7418312,831488,C:\Users\Admin\AppData\Local\Temp\e977ecbe535a71569be5143bb4f1a2868e45e5251903fb2640c1a48dcd18cc9a.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:1604
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\bcdedit.exebcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi4⤵
- Modifies boot configuration data using bcdedit
PID:3020
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-II8IO.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\setx.exesetx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\AppData\Local\Microsoft\WindowsApps;C:\Users\Admin\AppData\Local\Temp\is-II8IO.tmp"4⤵PID:3420
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-II8IO.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:364
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-II8IO.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-II8IO.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:3732
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-II8IO.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:4016
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-II8IO.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-II8IO.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:360
-
-
C:\Users\Admin\AppData\Roaming\syskey.exe"C:\Users\Admin\AppData\Roaming\syskey.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:3720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:3560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:3036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:3160
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵
- Drops file in Windows directory
PID:2220
-
-
-
-