Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
28-10-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe
Resource
win7-en-20210920
General
-
Target
293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe
-
Size
2.6MB
-
MD5
12308f01f8fa9f8f8382c6fc4d445476
-
SHA1
0274eef2d23f42f699964ab1d4d9be3e9a8512d1
-
SHA256
293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392
-
SHA512
b69fe6966d1d6dc5656990f64211107aebc1f423b8d2ba4d1e8bbd4cd7621d54b3abcc62a4bb819a1a2f442703f7c1fde086feeed4fb0fbda0174ae549e3446c
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/2252-199-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Blocklisted process makes network request 4 IoCs
flow pid Process 28 2252 cmd.exe 29 2252 cmd.exe 30 2252 cmd.exe 31 2252 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 3488 wsqmcons.exe 2412 calc.exe -
Loads dropped DLL 2 IoCs
pid Process 3488 wsqmcons.exe 2412 calc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job cmd.exe File created C:\Windows\Tasks\calc.job notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3488 wsqmcons.exe 3328 cmd.exe 2412 calc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3328 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2276 2848 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 68 PID 2848 wrote to memory of 2276 2848 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 68 PID 2848 wrote to memory of 2276 2848 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe 68 PID 2276 wrote to memory of 3684 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 69 PID 2276 wrote to memory of 3684 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 69 PID 2276 wrote to memory of 3684 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 69 PID 2276 wrote to memory of 1648 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 70 PID 2276 wrote to memory of 1648 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 70 PID 2276 wrote to memory of 1648 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 70 PID 2276 wrote to memory of 3944 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 71 PID 2276 wrote to memory of 3944 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 71 PID 2276 wrote to memory of 3944 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 71 PID 3944 wrote to memory of 1988 3944 cmd.exe 75 PID 3944 wrote to memory of 1988 3944 cmd.exe 75 PID 3944 wrote to memory of 1988 3944 cmd.exe 75 PID 3684 wrote to memory of 2256 3684 cmd.exe 76 PID 3684 wrote to memory of 2256 3684 cmd.exe 76 PID 3684 wrote to memory of 2256 3684 cmd.exe 76 PID 2276 wrote to memory of 644 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 77 PID 2276 wrote to memory of 644 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 77 PID 2276 wrote to memory of 644 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 77 PID 2276 wrote to memory of 816 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 81 PID 2276 wrote to memory of 816 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 81 PID 2276 wrote to memory of 816 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 81 PID 2276 wrote to memory of 3180 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 80 PID 2276 wrote to memory of 3180 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 80 PID 2276 wrote to memory of 3180 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 80 PID 2276 wrote to memory of 1768 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 83 PID 2276 wrote to memory of 1768 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 83 PID 2276 wrote to memory of 1768 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 83 PID 2276 wrote to memory of 3488 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 85 PID 2276 wrote to memory of 3488 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 85 PID 2276 wrote to memory of 3488 2276 293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp 85 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86 PID 3488 wrote to memory of 3328 3488 wsqmcons.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe"C:\Users\Admin\AppData\Local\Temp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\is-GFOP4.tmp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp"C:\Users\Admin\AppData\Local\Temp\is-GFOP4.tmp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.tmp" /SL5="$301CC,1858391,831488,C:\Users\Admin\AppData\Local\Temp\293a83bfe2839bfa6d40fa52f5088e43b62791c08343c3f4dade4f1118000392.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:1648
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-D6NRE.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\AppData\Local\Microsoft\WindowsApps;C:\Users\Admin\AppData\Local\Temp\is-D6NRE.tmp"4⤵PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-D6NRE.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:644
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-D6NRE.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:3180
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-D6NRE.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-D6NRE.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:816
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-D6NRE.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-D6NRE.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:1768
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:2252 -
C:\Users\Admin\AppData\Roaming\calc.exe"C:\Users\Admin\AppData\Roaming\calc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"7⤵PID:1228
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"8⤵PID:1452
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"8⤵
- Drops file in Windows directory
PID:1332
-
-
-
-
-
-
-