Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
27-10-2021 09:32
Static task
static1
Behavioral task
behavioral1
Sample
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe
Resource
win7-en-20210920
General
-
Target
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe
-
Size
2.6MB
-
MD5
070fda7ec3fff56936fc67efb7b783eb
-
SHA1
eba99aa986390748c0be4287fffbf6b98609db3b
-
SHA256
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576
-
SHA512
79e695eb97f902bd1ce94b1f862ed79228188f1424e5f28e00cf2013f616581f362c2a016eabd31c308654a05ef33f3805a2add22ad09aa4e62a875386f4fd6d
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1560-95-0x0000000000400000-0x0000000000426000-memory.dmp parallax_rat -
Executes dropped EXE 2 IoCs
pid Process 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 1488 wsqmcons.exe -
Loads dropped DLL 3 IoCs
pid Process 1416 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 1488 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1488 wsqmcons.exe 1952 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1952 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 752 1416 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1416 wrote to memory of 752 1416 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1416 wrote to memory of 752 1416 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1416 wrote to memory of 752 1416 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1416 wrote to memory of 752 1416 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1416 wrote to memory of 752 1416 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 1416 wrote to memory of 752 1416 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 28 PID 752 wrote to memory of 1536 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 29 PID 752 wrote to memory of 1536 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 29 PID 752 wrote to memory of 1536 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 29 PID 752 wrote to memory of 1536 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 29 PID 752 wrote to memory of 1560 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 31 PID 752 wrote to memory of 1560 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 31 PID 752 wrote to memory of 1560 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 31 PID 752 wrote to memory of 1560 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 31 PID 752 wrote to memory of 976 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 33 PID 752 wrote to memory of 976 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 33 PID 752 wrote to memory of 976 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 33 PID 752 wrote to memory of 976 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 33 PID 1536 wrote to memory of 432 1536 cmd.exe 35 PID 1536 wrote to memory of 432 1536 cmd.exe 35 PID 1536 wrote to memory of 432 1536 cmd.exe 35 PID 1536 wrote to memory of 432 1536 cmd.exe 35 PID 976 wrote to memory of 1796 976 cmd.exe 36 PID 976 wrote to memory of 1796 976 cmd.exe 36 PID 976 wrote to memory of 1796 976 cmd.exe 36 PID 976 wrote to memory of 1796 976 cmd.exe 36 PID 752 wrote to memory of 1300 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 37 PID 752 wrote to memory of 1300 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 37 PID 752 wrote to memory of 1300 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 37 PID 752 wrote to memory of 1300 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 37 PID 752 wrote to memory of 1296 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 39 PID 752 wrote to memory of 1296 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 39 PID 752 wrote to memory of 1296 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 39 PID 752 wrote to memory of 1296 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 39 PID 752 wrote to memory of 2004 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 40 PID 752 wrote to memory of 2004 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 40 PID 752 wrote to memory of 2004 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 40 PID 752 wrote to memory of 2004 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 40 PID 752 wrote to memory of 1328 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 42 PID 752 wrote to memory of 1328 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 42 PID 752 wrote to memory of 1328 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 42 PID 752 wrote to memory of 1328 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 42 PID 752 wrote to memory of 1488 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 45 PID 752 wrote to memory of 1488 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 45 PID 752 wrote to memory of 1488 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 45 PID 752 wrote to memory of 1488 752 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 45 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46 PID 1488 wrote to memory of 1952 1488 wsqmcons.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\is-AKCSS.tmp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp"C:\Users\Admin\AppData\Local\Temp\is-AKCSS.tmp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp" /SL5="$30158,1858392,831488,C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-6R1OP.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Users\Admin\AppData\Local\Temp\is-6R1OP.tmp"4⤵PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-6R1OP.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:1300
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-6R1OP.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-6R1OP.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:1296
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-6R1OP.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:2004
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-6R1OP.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-6R1OP.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:1328
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1952 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵
- Drops file in Windows directory
PID:1560
-
-
-
-