Analysis
-
max time kernel
121s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
10-11-2021 10:17
Static task
static1
Behavioral task
behavioral1
Sample
cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe
Resource
win7-en-20211104
General
-
Target
cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe
-
Size
2.2MB
-
MD5
135abdbf6c27453815906380cb4b568a
-
SHA1
a6b5fc116b667ca4c1c33f4a636d5d678c1fc270
-
SHA256
cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9
-
SHA512
b6136ab88abf64bcfed022d09e5b921db43e9c3337416c630e33c236a1db72a20720395b77cb20be5436969336f335b460e761c76b449bea15e1bfffcf5603ed
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1876-61-0x0000000000400000-0x0000000000427000-memory.dmp parallax_rat -
suricata: ET MALWARE Parallax CnC Response Activity M14
suricata: ET MALWARE Parallax CnC Response Activity M14
-
resource yara_rule behavioral1/memory/1876-61-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 724 wrote to memory of 1876 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 28 PID 724 wrote to memory of 1876 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 28 PID 724 wrote to memory of 1876 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 28 PID 724 wrote to memory of 1876 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 28 PID 724 wrote to memory of 1876 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 28 PID 724 wrote to memory of 1876 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 28 PID 724 wrote to memory of 1876 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 28 PID 724 wrote to memory of 1876 724 cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe"C:\Users\Admin\AppData\Local\Temp\cb55e00c2fc38e06759379f12f6ab27310d6b61f27a3c510549f326afb17d0e9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1876
-