Analysis
-
max time kernel
30s -
max time network
166s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 06:12
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY_.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
INQUIRY_.exe
-
Size
355KB
-
MD5
50ad2932e2e76773f14886ce03dc8d19
-
SHA1
1d16cca7e71e36d76d0d22395bb3d60ae9db0f48
-
SHA256
3bd7eae6d409d1654f4317994ec8311946d96737f1c9042ff1fc5b8fb089d549
-
SHA512
f64db23ae8dc25ece8292d4b1231e8e1d60f4185cd66e999c794a3f9571e4ba1c4764158f506baf1636a4e539f22bea4cfd5b5173483f205dec36775deb41eea
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1040-160-0x0000000000400000-0x0000000000429000-memory.dmp parallax_rat -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.