Analysis
-
max time kernel
169s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-03-2022 16:27
Static task
static1
Behavioral task
behavioral1
Sample
fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe
-
Size
887KB
-
MD5
11a38e5469c9c0accdcc5c9663fee890
-
SHA1
3ebb8eb0353703bafbe9108eff332d55f0e801b4
-
SHA256
fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3
-
SHA512
82a62d52d22b756b9ac91659c7e781123645c91a64db0daa952fabe49e20dc9bb8a8e5b71773dd9e8b5fadce1810190d5d2186ce5138127c62987aa13f6f2354
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/3804-136-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apxs.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apxs.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90 PID 4156 wrote to memory of 3804 4156 fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe"C:\Users\Admin\AppData\Local\Temp\fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\rundll32.exe"C:\Users\Admin\AppData\Local\Temp\fb0e29d13c0d6f91a13ff92ab66aaf70200e65842d7c4ecf45b0d3afaf7d12d3.exe"2⤵PID:3804
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:4684