Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
16-11-2021 11:55
Static task
static1
Behavioral task
behavioral1
Sample
4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe
Resource
win7-en-20211014
General
-
Target
4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe
-
Size
2.1MB
-
MD5
fe4cf3c47ab7cd452897f4c238e89fd5
-
SHA1
85b9f90278ef9404e274a09b839385e71ca87063
-
SHA256
4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2
-
SHA512
129a7c0b881893387477ee92a59f2d6efd1aed1eb36f0284109ffa9a01a2d45be1cd2f2d9543c037e5c746729f7ae8a1da1ca8478f99bb5a12eedeec83277485
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1576-101-0x0000000000400000-0x0000000000426000-memory.dmp parallax_rat -
suricata: ET MALWARE Parallax CnC Response Activity M16
suricata: ET MALWARE Parallax CnC Response Activity M16
-
Blocklisted process makes network request 4 IoCs
flow pid Process 8 1716 cmd.exe 10 1716 cmd.exe 12 1716 cmd.exe 14 1576 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 1604 wsqmcons.exe -
Loads dropped DLL 4 IoCs
pid Process 1488 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 1604 wsqmcons.exe 1576 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1604 wsqmcons.exe 1716 cmd.exe 1716 cmd.exe 1716 cmd.exe 1716 cmd.exe 1716 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1716 cmd.exe 1716 cmd.exe 1716 cmd.exe 1716 cmd.exe 1716 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1204 1488 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe 28 PID 1488 wrote to memory of 1204 1488 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe 28 PID 1488 wrote to memory of 1204 1488 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe 28 PID 1488 wrote to memory of 1204 1488 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe 28 PID 1488 wrote to memory of 1204 1488 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe 28 PID 1488 wrote to memory of 1204 1488 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe 28 PID 1488 wrote to memory of 1204 1488 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe 28 PID 1204 wrote to memory of 560 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 29 PID 1204 wrote to memory of 560 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 29 PID 1204 wrote to memory of 560 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 29 PID 1204 wrote to memory of 560 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 29 PID 1204 wrote to memory of 1932 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 33 PID 1204 wrote to memory of 1932 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 33 PID 1204 wrote to memory of 1932 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 33 PID 1204 wrote to memory of 1932 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 33 PID 1204 wrote to memory of 1524 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 32 PID 1204 wrote to memory of 1524 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 32 PID 1204 wrote to memory of 1524 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 32 PID 1204 wrote to memory of 1524 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 32 PID 560 wrote to memory of 756 560 cmd.exe 35 PID 560 wrote to memory of 756 560 cmd.exe 35 PID 560 wrote to memory of 756 560 cmd.exe 35 PID 560 wrote to memory of 756 560 cmd.exe 35 PID 1524 wrote to memory of 1512 1524 cmd.exe 36 PID 1524 wrote to memory of 1512 1524 cmd.exe 36 PID 1524 wrote to memory of 1512 1524 cmd.exe 36 PID 1524 wrote to memory of 1512 1524 cmd.exe 36 PID 1204 wrote to memory of 1536 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 37 PID 1204 wrote to memory of 1536 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 37 PID 1204 wrote to memory of 1536 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 37 PID 1204 wrote to memory of 1536 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 37 PID 1204 wrote to memory of 1052 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 39 PID 1204 wrote to memory of 1052 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 39 PID 1204 wrote to memory of 1052 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 39 PID 1204 wrote to memory of 1052 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 39 PID 1204 wrote to memory of 1452 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 41 PID 1204 wrote to memory of 1452 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 41 PID 1204 wrote to memory of 1452 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 41 PID 1204 wrote to memory of 1452 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 41 PID 1204 wrote to memory of 1660 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 43 PID 1204 wrote to memory of 1660 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 43 PID 1204 wrote to memory of 1660 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 43 PID 1204 wrote to memory of 1660 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 43 PID 1204 wrote to memory of 1604 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 45 PID 1204 wrote to memory of 1604 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 45 PID 1204 wrote to memory of 1604 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 45 PID 1204 wrote to memory of 1604 1204 4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp 45 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46 PID 1604 wrote to memory of 1716 1604 wsqmcons.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe"C:\Users\Admin\AppData\Local\Temp\4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\is-F8HIR.tmp\4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp"C:\Users\Admin\AppData\Local\Temp\is-F8HIR.tmp\4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.tmp" /SL5="$40154,1397605,831488,C:\Users\Admin\AppData\Local\Temp\4f74803791d37f2d626b63e9a3618f28cbb07537760a931a78bf755965e9c2f2.bin.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:756
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-JIS7L.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Users\Admin\AppData\Local\Temp\is-JIS7L.tmp"4⤵PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:1932
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-JIS7L.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:1536
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-JIS7L.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-JIS7L.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:1052
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-JIS7L.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:1452
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-JIS7L.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-JIS7L.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:1660
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1732
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1576
-
-
-
-