Resubmissions
08-11-2021 13:19
211108-qkhmeacba6 10Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
08-11-2021 13:19
Static task
static1
Behavioral task
behavioral1
Sample
3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe
Resource
win7-en-20211104
General
-
Target
3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe
-
Size
3.3MB
-
MD5
281277343c24ce9611314044e5df610c
-
SHA1
d531e047d55bc162b3e338aed504c9eff77fde80
-
SHA256
3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc
-
SHA512
a7e4823e343c7a2f68a67be920edc6209ca441d9ece19339049faf44173d7c252b2928d599b12a8b6d6246149e40910c3f9e6bf045a5b7e4971c705885dc6de9
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/2600-199-0x0000000000400000-0x0000000000426000-memory.dmp parallax_rat -
Executes dropped EXE 2 IoCs
pid Process 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 1608 wsqmcons.exe -
Loads dropped DLL 1 IoCs
pid Process 1608 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job nslookup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1608 wsqmcons.exe 1712 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1712 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3284 2800 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 68 PID 2800 wrote to memory of 3284 2800 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 68 PID 2800 wrote to memory of 3284 2800 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe 68 PID 3284 wrote to memory of 1788 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 69 PID 3284 wrote to memory of 1788 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 69 PID 3284 wrote to memory of 1788 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 69 PID 3284 wrote to memory of 356 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 70 PID 3284 wrote to memory of 356 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 70 PID 3284 wrote to memory of 356 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 70 PID 3284 wrote to memory of 1912 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 74 PID 3284 wrote to memory of 1912 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 74 PID 3284 wrote to memory of 1912 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 74 PID 1912 wrote to memory of 628 1912 cmd.exe 75 PID 1912 wrote to memory of 628 1912 cmd.exe 75 PID 1912 wrote to memory of 628 1912 cmd.exe 75 PID 1788 wrote to memory of 1216 1788 cmd.exe 76 PID 1788 wrote to memory of 1216 1788 cmd.exe 76 PID 1788 wrote to memory of 1216 1788 cmd.exe 76 PID 3284 wrote to memory of 2208 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 77 PID 3284 wrote to memory of 2208 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 77 PID 3284 wrote to memory of 2208 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 77 PID 3284 wrote to memory of 2392 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 79 PID 3284 wrote to memory of 2392 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 79 PID 3284 wrote to memory of 2392 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 79 PID 3284 wrote to memory of 3532 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 81 PID 3284 wrote to memory of 3532 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 81 PID 3284 wrote to memory of 3532 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 81 PID 3284 wrote to memory of 652 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 83 PID 3284 wrote to memory of 652 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 83 PID 3284 wrote to memory of 652 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 83 PID 3284 wrote to memory of 1608 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 84 PID 3284 wrote to memory of 1608 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 84 PID 3284 wrote to memory of 1608 3284 3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp 84 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86 PID 1608 wrote to memory of 1712 1608 wsqmcons.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe"C:\Users\Admin\AppData\Local\Temp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\is-I9VPN.tmp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp"C:\Users\Admin\AppData\Local\Temp\is-I9VPN.tmp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.tmp" /SL5="$601DC,2608321,831488,C:\Users\Admin\AppData\Local\Temp\3800cfc1779229230276e658dc437da44c074712247a23ef3a0543daf86505dc.bin.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:1216
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:356
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-NJ7IC.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\AppData\Local\Microsoft\WindowsApps;C:\Users\Admin\AppData\Local\Temp\is-NJ7IC.tmp"4⤵PID:628
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-NJ7IC.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:2208
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-NJ7IC.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-NJ7IC.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:2392
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-NJ7IC.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:3532
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-NJ7IC.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-NJ7IC.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:652
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1712 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe"5⤵
- Drops file in Windows directory
PID:2600
-
-
-
-