Resubmissions
08-11-2021 13:19
211108-qkhmeacba6 10Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
08-11-2021 13:19
Static task
static1
Behavioral task
behavioral1
Sample
3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe
Resource
win7-en-20211104
General
-
Target
3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe
-
Size
3.3MB
-
MD5
281277343c24ce9611314044e5df610c
-
SHA1
d531e047d55bc162b3e338aed504c9eff77fde80
-
SHA256
3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc
-
SHA512
a7e4823e343c7a2f68a67be920edc6209ca441d9ece19339049faf44173d7c252b2928d599b12a8b6d6246149e40910c3f9e6bf045a5b7e4971c705885dc6de9
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1744-96-0x0000000000400000-0x0000000000426000-memory.dmp parallax_rat -
Blocklisted process makes network request 3 IoCs
flow pid Process 9 1080 cmd.exe 11 1080 cmd.exe 13 1080 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 1852 wsqmcons.exe -
Loads dropped DLL 3 IoCs
pid Process 1224 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 1852 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job nslookup.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1852 wsqmcons.exe 1080 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1080 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1304 1224 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 28 PID 1224 wrote to memory of 1304 1224 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 28 PID 1224 wrote to memory of 1304 1224 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 28 PID 1224 wrote to memory of 1304 1224 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 28 PID 1224 wrote to memory of 1304 1224 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 28 PID 1224 wrote to memory of 1304 1224 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 28 PID 1224 wrote to memory of 1304 1224 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 28 PID 1304 wrote to memory of 1968 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 29 PID 1304 wrote to memory of 1968 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 29 PID 1304 wrote to memory of 1968 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 29 PID 1304 wrote to memory of 1968 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 29 PID 1304 wrote to memory of 1452 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 30 PID 1304 wrote to memory of 1452 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 30 PID 1304 wrote to memory of 1452 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 30 PID 1304 wrote to memory of 1452 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 30 PID 1304 wrote to memory of 1956 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 32 PID 1304 wrote to memory of 1956 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 32 PID 1304 wrote to memory of 1956 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 32 PID 1304 wrote to memory of 1956 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 32 PID 1968 wrote to memory of 1732 1968 cmd.exe 35 PID 1968 wrote to memory of 1732 1968 cmd.exe 35 PID 1968 wrote to memory of 1732 1968 cmd.exe 35 PID 1968 wrote to memory of 1732 1968 cmd.exe 35 PID 1956 wrote to memory of 964 1956 cmd.exe 36 PID 1956 wrote to memory of 964 1956 cmd.exe 36 PID 1956 wrote to memory of 964 1956 cmd.exe 36 PID 1956 wrote to memory of 964 1956 cmd.exe 36 PID 1304 wrote to memory of 680 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 37 PID 1304 wrote to memory of 680 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 37 PID 1304 wrote to memory of 680 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 37 PID 1304 wrote to memory of 680 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 37 PID 1304 wrote to memory of 1840 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 38 PID 1304 wrote to memory of 1840 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 38 PID 1304 wrote to memory of 1840 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 38 PID 1304 wrote to memory of 1840 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 38 PID 1304 wrote to memory of 836 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 40 PID 1304 wrote to memory of 836 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 40 PID 1304 wrote to memory of 836 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 40 PID 1304 wrote to memory of 836 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 40 PID 1304 wrote to memory of 2044 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 43 PID 1304 wrote to memory of 2044 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 43 PID 1304 wrote to memory of 2044 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 43 PID 1304 wrote to memory of 2044 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 43 PID 1304 wrote to memory of 1852 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 45 PID 1304 wrote to memory of 1852 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 45 PID 1304 wrote to memory of 1852 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 45 PID 1304 wrote to memory of 1852 1304 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 45 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46 PID 1852 wrote to memory of 1080 1852 wsqmcons.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe"C:\Users\Admin\AppData\Local\Temp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\is-O9RHR.tmp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp"C:\Users\Admin\AppData\Local\Temp\is-O9RHR.tmp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp" /SL5="$40156,2608321,831488,C:\Users\Admin\AppData\Local\Temp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:1452
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-MHOKM.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Users\Admin\AppData\Local\Temp\is-MHOKM.tmp"4⤵PID:964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-MHOKM.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-MHOKM.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-MHOKM.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:1840
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-MHOKM.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:836
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-MHOKM.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-MHOKM.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:2044
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1080 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe"5⤵
- Drops file in Windows directory
PID:1744
-
-
-
-