Analysis
-
max time kernel
77s -
max time network
183s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
21-10-2021 09:51
Static task
static1
Behavioral task
behavioral1
Sample
7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe
-
Size
7.1MB
-
MD5
0956923f0ae4416c739e14fc03e8c866
-
SHA1
a8c2b3b618c51afa15425cdc6f9e5f7befa68e6a
-
SHA256
7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5
-
SHA512
9715a323a432e9bd7d44067da14c0f3f923452a5782e6b2007fe87d89d7317df9901eacac6dedbe25223fed958291cd1b12c294be4093f13360adb2c1da8f5a2
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/904-99-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Executes dropped EXE 2 IoCs
pid Process 1720 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.tmp 468 winhlp.exe -
resource yara_rule behavioral1/files/0x0005000000012677-63.dat upx behavioral1/files/0x0005000000012677-65.dat upx behavioral1/files/0x0005000000012677-98.dat upx -
Loads dropped DLL 6 IoCs
pid Process 1212 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe 1720 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.tmp 468 winhlp.exe 468 winhlp.exe 468 winhlp.exe 468 winhlp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\winhlp.job notepad.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 468 winhlp.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe -
Suspicious behavior: MapViewOfSection 11 IoCs
pid Process 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe 932 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1720 1212 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe 27 PID 1212 wrote to memory of 1720 1212 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe 27 PID 1212 wrote to memory of 1720 1212 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe 27 PID 1212 wrote to memory of 1720 1212 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe 27 PID 1212 wrote to memory of 1720 1212 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe 27 PID 1212 wrote to memory of 1720 1212 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe 27 PID 1212 wrote to memory of 1720 1212 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe 27 PID 1720 wrote to memory of 468 1720 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.tmp 28 PID 1720 wrote to memory of 468 1720 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.tmp 28 PID 1720 wrote to memory of 468 1720 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.tmp 28 PID 1720 wrote to memory of 468 1720 7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.tmp 28 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 468 wrote to memory of 932 468 winhlp.exe 29 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1764 932 dllhost.exe 34 PID 932 wrote to memory of 1136 932 dllhost.exe 35 PID 932 wrote to memory of 1136 932 dllhost.exe 35 PID 932 wrote to memory of 1136 932 dllhost.exe 35 PID 932 wrote to memory of 1136 932 dllhost.exe 35 PID 932 wrote to memory of 1136 932 dllhost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe"C:\Users\Admin\AppData\Local\Temp\7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\is-5PFSV.tmp\7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.tmp"C:\Users\Admin\AppData\Local\Temp\is-5PFSV.tmp\7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.tmp" /SL5="$40118,6387055,831488,C:\Users\Admin\AppData\Local\Temp\7cac5beac0a313ef0a69af7c694c87692deb59d7d90839f79c4a20213d7f03e5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\winhlp.exe"C:\Users\Admin\AppData\Roaming\winhlp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1764
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:2036
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵PID:692
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵PID:2020
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵PID:512
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵PID:1916
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵PID:1736
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵
- Drops file in Windows directory
PID:904
-
-
-
-