Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-11-2021 13:22
Static task
static1
Behavioral task
behavioral1
Sample
ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.exe
Resource
win7-en-20211014
General
-
Target
ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.exe
-
Size
3.3MB
-
MD5
bf815840ff00a0c3ba04d47cc2d158ee
-
SHA1
c4852fecddf4aa661b46d61866b2b1e8893b5048
-
SHA256
ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59
-
SHA512
c8d97bd92e7d873e45b4ea77032d7f6caebb644a361b2bfdc876b66f2925218082107143d0052b2259404fbfd884c3a8665a61f5640c7e6dd825899038281267
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/2008-202-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Blocklisted process makes network request 1 IoCs
flow pid Process 35 2008 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 3696 wsqmcons.exe -
Loads dropped DLL 1 IoCs
pid Process 3696 wsqmcons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wsqmcons.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3696 wsqmcons.exe 528 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 528 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4032 3732 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.exe 69 PID 3732 wrote to memory of 4032 3732 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.exe 69 PID 3732 wrote to memory of 4032 3732 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.exe 69 PID 4032 wrote to memory of 4092 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 70 PID 4032 wrote to memory of 4092 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 70 PID 4032 wrote to memory of 4092 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 70 PID 4032 wrote to memory of 3968 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 71 PID 4032 wrote to memory of 3968 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 71 PID 4032 wrote to memory of 3968 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 71 PID 4032 wrote to memory of 4356 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 73 PID 4032 wrote to memory of 4356 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 73 PID 4032 wrote to memory of 4356 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 73 PID 4092 wrote to memory of 4456 4092 cmd.exe 76 PID 4092 wrote to memory of 4456 4092 cmd.exe 76 PID 4092 wrote to memory of 4456 4092 cmd.exe 76 PID 4356 wrote to memory of 4512 4356 cmd.exe 77 PID 4356 wrote to memory of 4512 4356 cmd.exe 77 PID 4356 wrote to memory of 4512 4356 cmd.exe 77 PID 4032 wrote to memory of 4488 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 78 PID 4032 wrote to memory of 4488 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 78 PID 4032 wrote to memory of 4488 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 78 PID 4032 wrote to memory of 4516 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 85 PID 4032 wrote to memory of 4516 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 85 PID 4032 wrote to memory of 4516 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 85 PID 4032 wrote to memory of 4396 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 81 PID 4032 wrote to memory of 4396 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 81 PID 4032 wrote to memory of 4396 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 81 PID 4032 wrote to memory of 3272 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 83 PID 4032 wrote to memory of 3272 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 83 PID 4032 wrote to memory of 3272 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 83 PID 4032 wrote to memory of 3696 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 86 PID 4032 wrote to memory of 3696 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 86 PID 4032 wrote to memory of 3696 4032 ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp 86 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87 PID 3696 wrote to memory of 528 3696 wsqmcons.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.exe"C:\Users\Admin\AppData\Local\Temp\ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\is-B6IDM.tmp\ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp"C:\Users\Admin\AppData\Local\Temp\is-B6IDM.tmp\ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.tmp" /SL5="$50080,2608320,831488,C:\Users\Admin\AppData\Local\Temp\ab711cdbe0142ca44fc643c6741f396e5d027458253a985a2eb8cd9258f94b59.bin.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:4456
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:3968
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-BJVL5.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\AppData\Local\Microsoft\WindowsApps;C:\Users\Admin\AppData\Local\Temp\is-BJVL5.tmp"4⤵PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-BJVL5.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:4488
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-BJVL5.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:4396
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-BJVL5.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-BJVL5.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:3272
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-BJVL5.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-BJVL5.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:4516
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:2008
-
-
-
-