Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
08-02-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe
-
Size
2.3MB
-
MD5
adcd1e7797068098efc7b13cdad89450
-
SHA1
4f5cc3b2bbc0e2d3da8a8a09572708566620f6e2
-
SHA256
c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736
-
SHA512
304e003325285c2c710a273e52046d0d9bc9ddbaa46c08a02d18cdb3337fff397714afcd570fe25ff972405825519de62f2fc6367966d9f4443784d0dcaac4db
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/588-63-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vpm.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28 PID 1088 wrote to memory of 588 1088 c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe"C:\Users\Admin\AppData\Local\Temp\c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.exe"C:\Users\Admin\AppData\Local\Temp\c779c44651b3f0c11a913b74202de89dc091e5fc4f0e10eef63faaec51d57736.exe"2⤵PID:588
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:268