Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
10-11-2021 10:17
Static task
static1
Behavioral task
behavioral1
Sample
26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
General
-
Target
26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe
-
Size
2.1MB
-
MD5
e65c43ae67da3e8767d7e029ead0a531
-
SHA1
a206528979d3aba8dfdd19c456d6efc62a44c005
-
SHA256
26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb
-
SHA512
fc4b16f6c8573f81f2b0eb2422b179b6b3b78a5ebbac19bc82971726d7bb80716713de7d48c984214392c024fb697372d720bb6e5b0d9995d8aa00edb9ccde89
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1364-61-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1364 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 28 PID 1668 wrote to memory of 1364 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 28 PID 1668 wrote to memory of 1364 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 28 PID 1668 wrote to memory of 1364 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 28 PID 1668 wrote to memory of 1364 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 28 PID 1668 wrote to memory of 1364 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 28 PID 1668 wrote to memory of 1364 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 28 PID 1668 wrote to memory of 1364 1668 26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe"C:\Users\Admin\AppData\Local\Temp\26ba40a83c4dd2e31ae8d1cd1595cc9723cad21a4ee2f7c54d422350bce7effb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1364
-