Analysis
-
max time kernel
117s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
17-12-2021 05:40
Static task
static1
Behavioral task
behavioral1
Sample
7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe
Resource
win10-en-20211208
General
-
Target
7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe
-
Size
2.9MB
-
MD5
69113dd327820ae7bff3419bfdb28873
-
SHA1
6b3531e38944c90f962d23efa4dd52e6d2dd86c0
-
SHA256
7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f
-
SHA512
ccd242015871518f1581304887fd64b02c7311a5d9e6f684c808933aebd2c9aadf136de9e8976bc570889c13ea7ad9e8a75eb26aa3658e311377df69c147f8ee
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1372-73-0x0000000000400000-0x0000000000429000-memory.dmp parallax_rat -
resource yara_rule behavioral1/memory/1372-73-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Security xcopy.exe File created C:\Program Files (x86)\Security\7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe xcopy.exe File opened for modification C:\Program Files (x86)\Security\7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe xcopy.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 540 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 736 wrote to memory of 1640 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 27 PID 736 wrote to memory of 1640 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 27 PID 736 wrote to memory of 1640 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 27 PID 736 wrote to memory of 1640 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 27 PID 1640 wrote to memory of 652 1640 cmd.exe 29 PID 1640 wrote to memory of 652 1640 cmd.exe 29 PID 1640 wrote to memory of 652 1640 cmd.exe 29 PID 1640 wrote to memory of 652 1640 cmd.exe 29 PID 736 wrote to memory of 528 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 30 PID 736 wrote to memory of 528 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 30 PID 736 wrote to memory of 528 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 30 PID 736 wrote to memory of 528 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 30 PID 528 wrote to memory of 540 528 cmd.exe 32 PID 528 wrote to memory of 540 528 cmd.exe 32 PID 528 wrote to memory of 540 528 cmd.exe 32 PID 528 wrote to memory of 540 528 cmd.exe 32 PID 736 wrote to memory of 1372 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 33 PID 736 wrote to memory of 1372 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 33 PID 736 wrote to memory of 1372 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 33 PID 736 wrote to memory of 1372 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 33 PID 736 wrote to memory of 1372 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 33 PID 736 wrote to memory of 1372 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 33 PID 736 wrote to memory of 1372 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 33 PID 736 wrote to memory of 1372 736 7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe"C:\Users\Admin\AppData\Local\Temp\7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\cmd.execmd /c xcopy "C:\Users\Admin\AppData\Local\Temp\7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe" "%ProgramFiles%\Security\" /y /i /c /q2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe" "C:\Program Files (x86)\Security\" /y /i /c /q3⤵
- Drops file in Program Files directory
- Enumerates system info in registry
PID:652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe" /it /f2⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\7852cf2dfe60b60194dae9b037298ed0a9c84fa1d850f3898751575f4377215f.exe" /it /f3⤵
- Creates scheduled task(s)
PID:540
-
-
-
C:\Windows\SysWOW64\xwizard.exeC:\Windows\System32\xwizard.exe2⤵PID:1372
-