Analysis
-
max time kernel
147s -
max time network
177s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-10-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe
Resource
win7-en-20210920
General
-
Target
293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe
-
Size
2.6MB
-
MD5
12308f01f8fa9f8f8382c6fc4d445476
-
SHA1
0274eef2d23f42f699964ab1d4d9be3e9a8512d1
-
SHA256
293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392
-
SHA512
b69fe6966d1d6dc5656990f64211107aebc1f423b8d2ba4d1e8bbd4cd7621d54b3abcc62a4bb819a1a2f442703f7c1fde086feeed4fb0fbda0174ae549e3446c
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1244-95-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Blocklisted process makes network request 1 IoCs
flow pid Process 10 1244 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 1160 wsqmcons.exe -
Loads dropped DLL 3 IoCs
pid Process 1108 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 1160 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1160 wsqmcons.exe 1832 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1832 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1176 1108 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 28 PID 1108 wrote to memory of 1176 1108 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 28 PID 1108 wrote to memory of 1176 1108 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 28 PID 1108 wrote to memory of 1176 1108 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 28 PID 1108 wrote to memory of 1176 1108 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 28 PID 1108 wrote to memory of 1176 1108 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 28 PID 1108 wrote to memory of 1176 1108 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 28 PID 1176 wrote to memory of 1244 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 29 PID 1176 wrote to memory of 1244 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 29 PID 1176 wrote to memory of 1244 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 29 PID 1176 wrote to memory of 1244 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 29 PID 1176 wrote to memory of 816 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 31 PID 1176 wrote to memory of 816 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 31 PID 1176 wrote to memory of 816 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 31 PID 1176 wrote to memory of 816 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 31 PID 1176 wrote to memory of 1972 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 33 PID 1176 wrote to memory of 1972 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 33 PID 1176 wrote to memory of 1972 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 33 PID 1176 wrote to memory of 1972 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 33 PID 1244 wrote to memory of 1764 1244 cmd.exe 35 PID 1244 wrote to memory of 1764 1244 cmd.exe 35 PID 1244 wrote to memory of 1764 1244 cmd.exe 35 PID 1244 wrote to memory of 1764 1244 cmd.exe 35 PID 1972 wrote to memory of 952 1972 cmd.exe 36 PID 1972 wrote to memory of 952 1972 cmd.exe 36 PID 1972 wrote to memory of 952 1972 cmd.exe 36 PID 1972 wrote to memory of 952 1972 cmd.exe 36 PID 1176 wrote to memory of 956 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 37 PID 1176 wrote to memory of 956 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 37 PID 1176 wrote to memory of 956 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 37 PID 1176 wrote to memory of 956 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 37 PID 1176 wrote to memory of 1048 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 41 PID 1176 wrote to memory of 1048 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 41 PID 1176 wrote to memory of 1048 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 41 PID 1176 wrote to memory of 1048 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 41 PID 1176 wrote to memory of 1872 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 40 PID 1176 wrote to memory of 1872 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 40 PID 1176 wrote to memory of 1872 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 40 PID 1176 wrote to memory of 1872 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 40 PID 1176 wrote to memory of 828 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 43 PID 1176 wrote to memory of 828 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 43 PID 1176 wrote to memory of 828 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 43 PID 1176 wrote to memory of 828 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 43 PID 1176 wrote to memory of 1160 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 45 PID 1176 wrote to memory of 1160 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 45 PID 1176 wrote to memory of 1160 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 45 PID 1176 wrote to memory of 1160 1176 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 45 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46 PID 1160 wrote to memory of 1832 1160 wsqmcons.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe"C:\Users\Admin\AppData\Local\Temp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\is-TVKUG.tmp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp"C:\Users\Admin\AppData\Local\Temp\is-TVKUG.tmp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp" /SL5="$40118,1858391,831488,C:\Users\Admin\AppData\Local\Temp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:816
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-52H85.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Users\Admin\AppData\Local\Temp\is-52H85.tmp"4⤵PID:952
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-52H85.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:956
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-52H85.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:1872
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-52H85.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-52H85.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-52H85.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-52H85.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:828
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:1244
-
-
-
-