Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
21-10-2021 10:18
Static task
static1
Behavioral task
behavioral1
Sample
d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe
Resource
win10-en-20210920
General
-
Target
d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe
-
Size
2.0MB
-
MD5
4abef812fd4cc15769b94ad459d0c5e2
-
SHA1
bb772e658af670d38efe94d075a0c57d312af6b1
-
SHA256
d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b
-
SHA512
fe77e6fbba1cf74df4e080948e3c341733167e0bb70bee34aae8175188cdf31e56e00fbaf7f39f65e9d4c4c489bbaea24b0bda522b67e5a2c365a223a385af02
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1036-84-0x0000000000400000-0x0000000000427000-memory.dmp parallax_rat -
suricata: ET MALWARE Parallax CnC Response Activity M14
suricata: ET MALWARE Parallax CnC Response Activity M14
-
resource yara_rule behavioral1/memory/1036-84-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1264 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1472 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 28 PID 1728 wrote to memory of 1472 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 28 PID 1728 wrote to memory of 1472 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 28 PID 1728 wrote to memory of 1472 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 28 PID 1472 wrote to memory of 1404 1472 cmd.exe 30 PID 1472 wrote to memory of 1404 1472 cmd.exe 30 PID 1472 wrote to memory of 1404 1472 cmd.exe 30 PID 1472 wrote to memory of 1404 1472 cmd.exe 30 PID 1728 wrote to memory of 976 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 31 PID 1728 wrote to memory of 976 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 31 PID 1728 wrote to memory of 976 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 31 PID 1728 wrote to memory of 976 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 31 PID 976 wrote to memory of 1264 976 cmd.exe 33 PID 976 wrote to memory of 1264 976 cmd.exe 33 PID 976 wrote to memory of 1264 976 cmd.exe 33 PID 976 wrote to memory of 1264 976 cmd.exe 33 PID 1728 wrote to memory of 1036 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 34 PID 1728 wrote to memory of 1036 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 34 PID 1728 wrote to memory of 1036 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 34 PID 1728 wrote to memory of 1036 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 34 PID 1728 wrote to memory of 1036 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 34 PID 1728 wrote to memory of 1036 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 34 PID 1728 wrote to memory of 1036 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 34 PID 1728 wrote to memory of 1036 1728 d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe"C:\Users\Admin\AppData\Local\Temp\d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c xcopy "C:\Users\Admin\AppData\Local\Temp\d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe" "%AppData%\Security\" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe" "C:\Users\Admin\AppData\Roaming\Security\" /y3⤵
- Enumerates system info in registry
PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%AppData%\Security\d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe" /it /f2⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn "Security" /tr "C:\Users\Admin\AppData\Roaming\Security\d62d2888067b3dab7d93cba362202c4a17c086c531949b071f9758866b4c9d6b.exe" /it /f3⤵
- Creates scheduled task(s)
PID:1264
-
-
-
C:\Windows\SysWOW64\sxstrace.exeC:\Windows\System32\sxstrace.exe2⤵PID:1036
-