Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
17-12-2021 05:40
Static task
static1
Behavioral task
behavioral1
Sample
f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe
-
Size
3.3MB
-
MD5
65a0ec476aaefcf6aeb328ac1641ed29
-
SHA1
38d23c5f5cce4ef14a6eb29615494044027adb89
-
SHA256
f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79
-
SHA512
a7bc88b5811289e55bb5be5c771009b0c5665041c846dd9ce639d85b763b4d6912cbda476098a688cdcf0f78aa7f06fb9c8b6618c327ae6dfa7cf32fafb2e050
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/964-73-0x0000000000400000-0x0000000000429000-memory.dmp parallax_rat -
resource yara_rule behavioral1/memory/964-73-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Security\f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe xcopy.exe File opened for modification C:\Program Files (x86)\Security\f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe xcopy.exe File opened for modification C:\Program Files (x86)\Security xcopy.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1652 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 944 wrote to memory of 468 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 27 PID 944 wrote to memory of 468 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 27 PID 944 wrote to memory of 468 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 27 PID 944 wrote to memory of 468 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 27 PID 468 wrote to memory of 1548 468 cmd.exe 29 PID 468 wrote to memory of 1548 468 cmd.exe 29 PID 468 wrote to memory of 1548 468 cmd.exe 29 PID 468 wrote to memory of 1548 468 cmd.exe 29 PID 944 wrote to memory of 1092 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 30 PID 944 wrote to memory of 1092 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 30 PID 944 wrote to memory of 1092 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 30 PID 944 wrote to memory of 1092 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 30 PID 1092 wrote to memory of 1652 1092 cmd.exe 32 PID 1092 wrote to memory of 1652 1092 cmd.exe 32 PID 1092 wrote to memory of 1652 1092 cmd.exe 32 PID 1092 wrote to memory of 1652 1092 cmd.exe 32 PID 944 wrote to memory of 964 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 33 PID 944 wrote to memory of 964 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 33 PID 944 wrote to memory of 964 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 33 PID 944 wrote to memory of 964 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 33 PID 944 wrote to memory of 964 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 33 PID 944 wrote to memory of 964 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 33 PID 944 wrote to memory of 964 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 33 PID 944 wrote to memory of 964 944 f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe"C:\Users\Admin\AppData\Local\Temp\f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.execmd /c xcopy "C:\Users\Admin\AppData\Local\Temp\f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe" "%ProgramFiles%\Security\" /y /i /c /q2⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe" "C:\Program Files (x86)\Security\" /y /i /c /q3⤵
- Drops file in Program Files directory
- Enumerates system info in registry
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe" /it /f2⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\f0b3b36086e58964bf4b9d655568ab5c7f798bd89e7a8581069e65f8189c0b79.exe" /it /f3⤵
- Creates scheduled task(s)
PID:1652
-
-
-
C:\Windows\SysWOW64\xwizard.exeC:\Windows\System32\xwizard.exe2⤵PID:964
-