Analysis
-
max time kernel
119s -
max time network
155s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
27-10-2021 09:07
Static task
static1
Behavioral task
behavioral1
Sample
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe
Resource
win7-en-20211014
General
-
Target
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe
-
Size
2.6MB
-
MD5
070fda7ec3fff56936fc67efb7b783eb
-
SHA1
eba99aa986390748c0be4287fffbf6b98609db3b
-
SHA256
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576
-
SHA512
79e695eb97f902bd1ce94b1f862ed79228188f1424e5f28e00cf2013f616581f362c2a016eabd31c308654a05ef33f3805a2add22ad09aa4e62a875386f4fd6d
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1596-96-0x0000000000400000-0x0000000000426000-memory.dmp parallax_rat -
Executes dropped EXE 2 IoCs
pid Process 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 1388 wsqmcons.exe -
Loads dropped DLL 3 IoCs
pid Process 1296 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 1388 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1388 wsqmcons.exe 1924 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1924 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 572 1296 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1296 wrote to memory of 572 1296 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1296 wrote to memory of 572 1296 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1296 wrote to memory of 572 1296 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1296 wrote to memory of 572 1296 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1296 wrote to memory of 572 1296 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1296 wrote to memory of 572 1296 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 572 wrote to memory of 540 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 29 PID 572 wrote to memory of 540 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 29 PID 572 wrote to memory of 540 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 29 PID 572 wrote to memory of 540 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 29 PID 572 wrote to memory of 1952 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 31 PID 572 wrote to memory of 1952 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 31 PID 572 wrote to memory of 1952 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 31 PID 572 wrote to memory of 1952 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 31 PID 572 wrote to memory of 1908 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 33 PID 572 wrote to memory of 1908 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 33 PID 572 wrote to memory of 1908 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 33 PID 572 wrote to memory of 1908 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 33 PID 1908 wrote to memory of 816 1908 cmd.exe 35 PID 1908 wrote to memory of 816 1908 cmd.exe 35 PID 1908 wrote to memory of 816 1908 cmd.exe 35 PID 1908 wrote to memory of 816 1908 cmd.exe 35 PID 540 wrote to memory of 1412 540 cmd.exe 36 PID 540 wrote to memory of 1412 540 cmd.exe 36 PID 540 wrote to memory of 1412 540 cmd.exe 36 PID 540 wrote to memory of 1412 540 cmd.exe 36 PID 572 wrote to memory of 836 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 37 PID 572 wrote to memory of 836 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 37 PID 572 wrote to memory of 836 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 37 PID 572 wrote to memory of 836 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 37 PID 572 wrote to memory of 1132 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 39 PID 572 wrote to memory of 1132 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 39 PID 572 wrote to memory of 1132 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 39 PID 572 wrote to memory of 1132 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 39 PID 572 wrote to memory of 1872 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 43 PID 572 wrote to memory of 1872 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 43 PID 572 wrote to memory of 1872 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 43 PID 572 wrote to memory of 1872 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 43 PID 572 wrote to memory of 848 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 41 PID 572 wrote to memory of 848 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 41 PID 572 wrote to memory of 848 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 41 PID 572 wrote to memory of 848 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 41 PID 572 wrote to memory of 1388 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 45 PID 572 wrote to memory of 1388 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 45 PID 572 wrote to memory of 1388 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 45 PID 572 wrote to memory of 1388 572 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 45 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46 PID 1388 wrote to memory of 1924 1388 wsqmcons.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\is-FIJK1.tmp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp"C:\Users\Admin\AppData\Local\Temp\is-FIJK1.tmp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp" /SL5="$A0158,1858392,831488,C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:1952
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-3UKC3.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Users\Admin\AppData\Local\Temp\is-3UKC3.tmp"4⤵PID:816
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-3UKC3.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:836
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-3UKC3.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-3UKC3.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:1132
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-3UKC3.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-3UKC3.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:848
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-3UKC3.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:1872
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1924 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵
- Drops file in Windows directory
PID:1596
-
-
-
-