Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
02-11-2021 07:34
Static task
static1
Behavioral task
behavioral1
Sample
8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe
Resource
win7-en-20211014
General
-
Target
8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe
-
Size
6.0MB
-
MD5
36439a5f029df1777b51a34bd454b9d2
-
SHA1
66ab3a5c3f35fad196b07bc91930bcc171b0132f
-
SHA256
8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008
-
SHA512
e412f202184412e39e8fed102b042c68e7b65eeb6545096481db3e62e5dfdf641031736f616e1cf7e61e59705473af37a1e7c0c13762cbdc5a6aa5acaace8da9
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/3120-199-0x0000000000400000-0x0000000000426000-memory.dmp parallax_rat -
Blocklisted process makes network request 1 IoCs
flow pid Process 26 3120 rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 64 wsqmcons.exe -
Loads dropped DLL 1 IoCs
pid Process 64 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 64 wsqmcons.exe 604 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 604 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3804 wrote to memory of 3680 3804 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 69 PID 3804 wrote to memory of 3680 3804 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 69 PID 3804 wrote to memory of 3680 3804 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 69 PID 3680 wrote to memory of 584 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 70 PID 3680 wrote to memory of 584 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 70 PID 3680 wrote to memory of 584 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 70 PID 3680 wrote to memory of 644 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 71 PID 3680 wrote to memory of 644 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 71 PID 3680 wrote to memory of 644 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 71 PID 3680 wrote to memory of 804 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 72 PID 3680 wrote to memory of 804 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 72 PID 3680 wrote to memory of 804 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 72 PID 804 wrote to memory of 900 804 cmd.exe 76 PID 804 wrote to memory of 900 804 cmd.exe 76 PID 804 wrote to memory of 900 804 cmd.exe 76 PID 584 wrote to memory of 68 584 cmd.exe 77 PID 584 wrote to memory of 68 584 cmd.exe 77 PID 584 wrote to memory of 68 584 cmd.exe 77 PID 3680 wrote to memory of 1200 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 78 PID 3680 wrote to memory of 1200 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 78 PID 3680 wrote to memory of 1200 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 78 PID 3680 wrote to memory of 1512 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 80 PID 3680 wrote to memory of 1512 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 80 PID 3680 wrote to memory of 1512 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 80 PID 3680 wrote to memory of 3284 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 81 PID 3680 wrote to memory of 3284 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 81 PID 3680 wrote to memory of 3284 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 81 PID 3680 wrote to memory of 3540 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 84 PID 3680 wrote to memory of 3540 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 84 PID 3680 wrote to memory of 3540 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 84 PID 3680 wrote to memory of 64 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 86 PID 3680 wrote to memory of 64 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 86 PID 3680 wrote to memory of 64 3680 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 86 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87 PID 64 wrote to memory of 604 64 wsqmcons.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe"C:\Users\Admin\AppData\Local\Temp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\is-1M8UI.tmp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp"C:\Users\Admin\AppData\Local\Temp\is-1M8UI.tmp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp" /SL5="$601DE,5451459,831488,C:\Users\Admin\AppData\Local\Temp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:68
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:644
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-15F9U.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\AppData\Local\Microsoft\WindowsApps;C:\Users\Admin\AppData\Local\Temp\is-15F9U.tmp"4⤵PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-15F9U.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:1200
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-15F9U.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-15F9U.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:1512
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-15F9U.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:3284
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-15F9U.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-15F9U.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:3540
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:604 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe"5⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:3120
-
-
-
-