Analysis
-
max time kernel
122s -
max time network
164s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-10-2021 09:07
Static task
static1
Behavioral task
behavioral1
Sample
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe
Resource
win7-en-20211014
General
-
Target
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe
-
Size
2.6MB
-
MD5
070fda7ec3fff56936fc67efb7b783eb
-
SHA1
eba99aa986390748c0be4287fffbf6b98609db3b
-
SHA256
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576
-
SHA512
79e695eb97f902bd1ce94b1f862ed79228188f1424e5f28e00cf2013f616581f362c2a016eabd31c308654a05ef33f3805a2add22ad09aa4e62a875386f4fd6d
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/2304-202-0x0000000000400000-0x0000000000426000-memory.dmp parallax_rat -
Executes dropped EXE 2 IoCs
pid Process 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 704 wsqmcons.exe -
Loads dropped DLL 1 IoCs
pid Process 704 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 704 wsqmcons.exe 1248 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1248 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 3248 2596 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 69 PID 2596 wrote to memory of 3248 2596 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 69 PID 2596 wrote to memory of 3248 2596 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 69 PID 3248 wrote to memory of 656 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 70 PID 3248 wrote to memory of 656 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 70 PID 3248 wrote to memory of 656 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 70 PID 3248 wrote to memory of 816 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 71 PID 3248 wrote to memory of 816 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 71 PID 3248 wrote to memory of 816 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 71 PID 3248 wrote to memory of 660 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 74 PID 3248 wrote to memory of 660 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 74 PID 3248 wrote to memory of 660 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 74 PID 656 wrote to memory of 3620 656 cmd.exe 76 PID 656 wrote to memory of 3620 656 cmd.exe 76 PID 656 wrote to memory of 3620 656 cmd.exe 76 PID 660 wrote to memory of 3976 660 cmd.exe 77 PID 660 wrote to memory of 3976 660 cmd.exe 77 PID 660 wrote to memory of 3976 660 cmd.exe 77 PID 3248 wrote to memory of 3992 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 78 PID 3248 wrote to memory of 3992 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 78 PID 3248 wrote to memory of 3992 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 78 PID 3248 wrote to memory of 1616 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 80 PID 3248 wrote to memory of 1616 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 80 PID 3248 wrote to memory of 1616 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 80 PID 3248 wrote to memory of 3964 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 81 PID 3248 wrote to memory of 3964 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 81 PID 3248 wrote to memory of 3964 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 81 PID 3248 wrote to memory of 3520 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 84 PID 3248 wrote to memory of 3520 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 84 PID 3248 wrote to memory of 3520 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 84 PID 3248 wrote to memory of 704 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 86 PID 3248 wrote to memory of 704 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 86 PID 3248 wrote to memory of 704 3248 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 86 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87 PID 704 wrote to memory of 1248 704 wsqmcons.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\is-87UKI.tmp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp"C:\Users\Admin\AppData\Local\Temp\is-87UKI.tmp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp" /SL5="$60058,1858392,831488,C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:816
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-L5KAI.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\AppData\Local\Microsoft\WindowsApps;C:\Users\Admin\AppData\Local\Temp\is-L5KAI.tmp"4⤵PID:3976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-L5KAI.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:3992
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-L5KAI.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-L5KAI.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:1616
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-L5KAI.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:3964
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-L5KAI.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-L5KAI.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:3520
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1248 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵
- Drops file in Windows directory
PID:2304
-
-
-
-