Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 06:58

General

  • Target

    MAILPRIN.exe

  • Size

    3.6MB

  • MD5

    f3657fe3d3aa2264fc487d7d2e35a06a

  • SHA1

    85c5b30ebe711953857cc6d5e5c52dc51786c518

  • SHA256

    0232fe4b3256a6a4700de482e5e9074baf4548d7604cf4404182be73353ee32f

  • SHA512

    f4a1186373821716e75b85405d7e31938902e9d1774d5c897f16baeb31bb0d227406011e6e462875c4a29ebbd85961213b98c780bf80a0e4a54bbbde61236cf4

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 2 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MAILPRIN.exe
    "C:\Users\Admin\AppData\Local\Temp\MAILPRIN.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\SysWOW64\calc.exe
      calc.exe
      2⤵
        PID:1692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 132
          3⤵
          • Program crash
          PID:1820
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
      1⤵
      • Drops startup file
      PID:872

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1692-58-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1692-41018-0x0000000077CB0000-0x0000000077E30000-memory.dmp

      Filesize

      1.5MB

    • memory/1692-41019-0x0000000077CB0000-0x0000000077E30000-memory.dmp

      Filesize

      1.5MB

    • memory/1692-41021-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1692-41020-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/1692-41024-0x0000000000401000-0x000000000040B000-memory.dmp

      Filesize

      40KB

    • memory/1892-54-0x0000000076C61000-0x0000000076C63000-memory.dmp

      Filesize

      8KB

    • memory/1892-55-0x0000000000220000-0x000000000029B000-memory.dmp

      Filesize

      492KB

    • memory/1892-57-0x0000000002170000-0x00000000022F0000-memory.dmp

      Filesize

      1.5MB