Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-12-2021 07:05
Static task
static1
Behavioral task
behavioral1
Sample
452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe
Resource
win10-en-20211208
General
-
Target
452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe
-
Size
3.3MB
-
MD5
c46bfdcee95bb995c627283835c746e3
-
SHA1
1d61f1843b9d0a2779c2d522fa6755b55627b4f1
-
SHA256
452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6
-
SHA512
844a0d01ef7a832f13e428df0a594ee61aaa9f1208edbdbcdb8aefbef4573104a776b3eb766a75680c78da829dda80d68a80a6426a01165869bb8b8e228105c2
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1564-79-0x0000000000400000-0x0000000000429000-memory.dmp parallax_rat -
resource yara_rule behavioral1/memory/1564-79-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Security xcopy.exe File created C:\Program Files (x86)\Security\452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe xcopy.exe File opened for modification C:\Program Files (x86)\Security\452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe xcopy.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 872 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1348 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 27 PID 1744 wrote to memory of 1348 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 27 PID 1744 wrote to memory of 1348 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 27 PID 1744 wrote to memory of 1348 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 27 PID 1348 wrote to memory of 572 1348 cmd.exe 29 PID 1348 wrote to memory of 572 1348 cmd.exe 29 PID 1348 wrote to memory of 572 1348 cmd.exe 29 PID 1348 wrote to memory of 572 1348 cmd.exe 29 PID 1744 wrote to memory of 672 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 30 PID 1744 wrote to memory of 672 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 30 PID 1744 wrote to memory of 672 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 30 PID 1744 wrote to memory of 672 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 30 PID 672 wrote to memory of 872 672 cmd.exe 32 PID 672 wrote to memory of 872 672 cmd.exe 32 PID 672 wrote to memory of 872 672 cmd.exe 32 PID 672 wrote to memory of 872 672 cmd.exe 32 PID 1744 wrote to memory of 1564 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 33 PID 1744 wrote to memory of 1564 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 33 PID 1744 wrote to memory of 1564 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 33 PID 1744 wrote to memory of 1564 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 33 PID 1744 wrote to memory of 1564 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 33 PID 1744 wrote to memory of 1564 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 33 PID 1744 wrote to memory of 1564 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 33 PID 1744 wrote to memory of 1564 1744 452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe"C:\Users\Admin\AppData\Local\Temp\452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c xcopy "C:\Users\Admin\AppData\Local\Temp\452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe" "%ProgramFiles%\Security\" /y /i /c /q2⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe" "C:\Program Files (x86)\Security\" /y /i /c /q3⤵
- Drops file in Program Files directory
- Enumerates system info in registry
PID:572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe" /it /f2⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\452e41c2ea90d817a0a293c1a1b5f79e8e8f52ac9c74bf9c6e34a896de1408b6.bin.exe" /it /f3⤵
- Creates scheduled task(s)
PID:872
-
-
-
C:\Windows\SysWOW64\xwizard.exeC:\Windows\System32\xwizard.exe2⤵PID:1564
-