Analysis
-
max time kernel
110s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-10-2021 09:32
Static task
static1
Behavioral task
behavioral1
Sample
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe
Resource
win7-en-20210920
General
-
Target
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe
-
Size
2.6MB
-
MD5
070fda7ec3fff56936fc67efb7b783eb
-
SHA1
eba99aa986390748c0be4287fffbf6b98609db3b
-
SHA256
8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576
-
SHA512
79e695eb97f902bd1ce94b1f862ed79228188f1424e5f28e00cf2013f616581f362c2a016eabd31c308654a05ef33f3805a2add22ad09aa4e62a875386f4fd6d
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/3084-212-0x0000000000400000-0x0000000000426000-memory.dmp parallax_rat -
Executes dropped EXE 2 IoCs
pid Process 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 900 wsqmcons.exe -
Loads dropped DLL 1 IoCs
pid Process 900 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job notepad.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 900 wsqmcons.exe 3576 cmd.exe 3576 cmd.exe 3576 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3576 cmd.exe 3576 cmd.exe 3576 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 3208 2780 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 68 PID 2780 wrote to memory of 3208 2780 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 68 PID 2780 wrote to memory of 3208 2780 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe 68 PID 3208 wrote to memory of 2420 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 69 PID 3208 wrote to memory of 2420 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 69 PID 3208 wrote to memory of 2420 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 69 PID 3208 wrote to memory of 3816 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 70 PID 3208 wrote to memory of 3816 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 70 PID 3208 wrote to memory of 3816 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 70 PID 3208 wrote to memory of 1752 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 73 PID 3208 wrote to memory of 1752 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 73 PID 3208 wrote to memory of 1752 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 73 PID 1752 wrote to memory of 1108 1752 cmd.exe 76 PID 1752 wrote to memory of 1108 1752 cmd.exe 76 PID 1752 wrote to memory of 1108 1752 cmd.exe 76 PID 2420 wrote to memory of 1068 2420 cmd.exe 75 PID 2420 wrote to memory of 1068 2420 cmd.exe 75 PID 2420 wrote to memory of 1068 2420 cmd.exe 75 PID 3208 wrote to memory of 1400 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 77 PID 3208 wrote to memory of 1400 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 77 PID 3208 wrote to memory of 1400 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 77 PID 3208 wrote to memory of 2216 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 79 PID 3208 wrote to memory of 2216 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 79 PID 3208 wrote to memory of 2216 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 79 PID 3208 wrote to memory of 512 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 83 PID 3208 wrote to memory of 512 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 83 PID 3208 wrote to memory of 512 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 83 PID 3208 wrote to memory of 528 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 81 PID 3208 wrote to memory of 528 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 81 PID 3208 wrote to memory of 528 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 81 PID 3208 wrote to memory of 900 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 85 PID 3208 wrote to memory of 900 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 85 PID 3208 wrote to memory of 900 3208 8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp 85 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86 PID 900 wrote to memory of 3576 900 wsqmcons.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\is-04V14.tmp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp"C:\Users\Admin\AppData\Local\Temp\is-04V14.tmp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.tmp" /SL5="$901CC,1858392,831488,C:\Users\Admin\AppData\Local\Temp\8bed7d919d14af37a609f7c0501d58405e51ee10b3b129fbe25e040a3dd3a576.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:3816
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-6T9C5.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\AppData\Local\Microsoft\WindowsApps;C:\Users\Admin\AppData\Local\Temp\is-6T9C5.tmp"4⤵PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-6T9C5.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:1400
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-6T9C5.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-6T9C5.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:2216
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-6T9C5.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-6T9C5.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:528
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-6T9C5.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:512
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3576 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵PID:3260
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵PID:3120
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"5⤵
- Drops file in Windows directory
PID:3084
-
-
-
-