Analysis
-
max time kernel
164s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-03-2022 06:06
Static task
static1
Behavioral task
behavioral1
Sample
3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe
-
Size
4.0MB
-
MD5
5ae6a04d90e7f22821a22d097ba4f8de
-
SHA1
e50512219af472d2b6da07d498a6f055aafcce0f
-
SHA256
3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8
-
SHA512
18d59bf6324b92bed43c0b8231f52df4f23df3ae7763812a43f04a134a09d16877eca57113e6794dde9de281cce52df6ff2bf909fbcf9562e04aae17e48a388e
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/984-136-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apxs.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apxs.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86 PID 3068 wrote to memory of 984 3068 3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe"C:\Users\Admin\AppData\Local\Temp\3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exe"C:\Users\Admin\AppData\Local\Temp\3eeb9d943610ccf31198aefe6705c3f558d459e874b4622efa1cfe177f9101a8.exe"2⤵PID:984
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:3276