Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
10-11-2021 10:21
Static task
static1
Behavioral task
behavioral1
Sample
bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe
Resource
win7-en-20211014
General
-
Target
bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe
-
Size
2.4MB
-
MD5
3fbf2dadf2ae2aa59c175683a54f315e
-
SHA1
f9a5e44e563b1794477e70d1a0f368cc489a2d3c
-
SHA256
bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4
-
SHA512
a151a669baa2a86f21c13a22fbc4c627fb693be587081dd790555ac94fe88a587b988a6a89c68753288db1cbf9e1040aaf1848e05696a04936d8721669912884
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/804-124-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
suricata: ET MALWARE Parallax CnC Response Activity M14
suricata: ET MALWARE Parallax CnC Response Activity M14
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2680 wrote to memory of 584 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 68 PID 2680 wrote to memory of 584 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 68 PID 2680 wrote to memory of 584 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 68 PID 2680 wrote to memory of 804 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 69 PID 2680 wrote to memory of 804 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 69 PID 2680 wrote to memory of 804 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 69 PID 2680 wrote to memory of 804 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 69 PID 2680 wrote to memory of 804 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 69 PID 2680 wrote to memory of 804 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 69 PID 2680 wrote to memory of 804 2680 bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe"C:\Users\Admin\AppData\Local\Temp\bd4d52cc6d6a213f9582edcf7d40664e4804f495bb6a6bfd0fc06be4a2b832d4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:584
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:804
-