Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 21:11
Static task
static1
Behavioral task
behavioral1
Sample
418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe
Resource
win7-20220414-en
General
-
Target
418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe
-
Size
1.8MB
-
MD5
6ce823abf08804817553fb0d2b9a00fb
-
SHA1
cc5633d752e27f6179448bb3f8fb855d547e11c0
-
SHA256
418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d
-
SHA512
cdb32028fc5320103fc81874a2ff475c56338bf3c933435dcb4ea852279cf32c5c4f43736964fb365c65714e83967b5073b76d603d3b26f27369947d0cc327e4
Malware Config
Signatures
-
ParallaxRat payload 2 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/520-84-0x00000000044E0000-0x0000000004516000-memory.dmp parallax_rat behavioral1/memory/828-98-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat -
Blocklisted process makes network request 4 IoCs
flow pid Process 12 828 cmd.exe 12 828 cmd.exe 12 828 cmd.exe 12 828 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 1664 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 1324 MasterDrive.exe 1048 atikmdag-patcher.exe -
Loads dropped DLL 6 IoCs
pid Process 1412 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 1140 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\lsm.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 1324 MasterDrive.exe 520 mstsc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 520 mstsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1664 1412 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 28 PID 1412 wrote to memory of 1664 1412 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 28 PID 1412 wrote to memory of 1664 1412 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 28 PID 1412 wrote to memory of 1664 1412 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 28 PID 1412 wrote to memory of 1664 1412 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 28 PID 1412 wrote to memory of 1664 1412 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 28 PID 1412 wrote to memory of 1664 1412 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 28 PID 1664 wrote to memory of 1140 1664 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 29 PID 1664 wrote to memory of 1140 1664 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 29 PID 1664 wrote to memory of 1140 1664 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 29 PID 1664 wrote to memory of 1140 1664 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 29 PID 1140 wrote to memory of 1076 1140 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 30 PID 1140 wrote to memory of 1076 1140 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 30 PID 1140 wrote to memory of 1076 1140 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 30 PID 1140 wrote to memory of 1076 1140 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 30 PID 1140 wrote to memory of 1076 1140 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 30 PID 1140 wrote to memory of 1076 1140 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 30 PID 1140 wrote to memory of 1076 1140 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 30 PID 1076 wrote to memory of 1324 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 31 PID 1076 wrote to memory of 1324 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 31 PID 1076 wrote to memory of 1324 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 31 PID 1076 wrote to memory of 1324 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 31 PID 1076 wrote to memory of 1048 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 32 PID 1076 wrote to memory of 1048 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 32 PID 1076 wrote to memory of 1048 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 32 PID 1076 wrote to memory of 1048 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 32 PID 1076 wrote to memory of 1048 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 32 PID 1076 wrote to memory of 1048 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 32 PID 1076 wrote to memory of 1048 1076 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 32 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 1324 wrote to memory of 520 1324 MasterDrive.exe 33 PID 520 wrote to memory of 828 520 mstsc.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe"C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\is-VMN4R.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp"C:\Users\Admin\AppData\Local\Temp\is-VMN4R.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp" /SL5="$60124,1181168,740864,C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe"C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe" /VERYSILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\is-NLQVM.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp"C:\Users\Admin\AppData\Local\Temp\is-NLQVM.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp" /SL5="$70124,1181168,740864,C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\MasterDrive.exe"C:\Users\Admin\AppData\Local\Temp\MasterDrive.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\system32\mstsc.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"7⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher.exe"C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher.exe"5⤵
- Executes dropped EXE
PID:1048
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1020KB
MD5c9eaffd90d45b526adac135a898844a5
SHA1bd297848d85bf68299741c15ddf4a44486c549b4
SHA256160da6fae97c7b54a2c1f0d55ce76399f689e98ed7228d4d9205aebb63ad4480
SHA51212f86cd14c7d5652eaa18dd250802ad1f1210ee025857817dfea2cb7d2d146655d261ceccc0dcc60f19053b7e06424e6f563ecd488a72a95d0e7ed22e9b230b0
-
Filesize
1020KB
MD5c9eaffd90d45b526adac135a898844a5
SHA1bd297848d85bf68299741c15ddf4a44486c549b4
SHA256160da6fae97c7b54a2c1f0d55ce76399f689e98ed7228d4d9205aebb63ad4480
SHA51212f86cd14c7d5652eaa18dd250802ad1f1210ee025857817dfea2cb7d2d146655d261ceccc0dcc60f19053b7e06424e6f563ecd488a72a95d0e7ed22e9b230b0
-
Filesize
93KB
MD5d61992cbdda1a789a9d5f597fd0de125
SHA130ee90f65129e2529c7ad940f2006db1a6cf3918
SHA256ba57d1539f4a7286075d8d383012a50af2e019714f8889ba03e23fbe1a2f73d0
SHA512ced9e4a7a9b915dcb233a35493633b10a97bf716c976638b6f0be4d8c643a4c7fad1f6655cfa4704f807f22920757dec875dd2f26d61ef535d55a64460bd1a74
-
C:\Users\Admin\AppData\Local\Temp\is-NLQVM.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp
Filesize2.4MB
MD5cb8ddb3cebc725405485ae32d8e58331
SHA161bc7caa715458b30d7a574b1d102b6966b86b5e
SHA256f1b253174ea05ac8b1b452eed3ef5ae8adb0d1fa2c3527b3620e0a9b5d1ba6e7
SHA51256abdd8bde5ce947126dcf203ddbfd730ee062488e150561fc9f73a9ee0b570f751d2f9f6466eefaa7c2c4b7dfc1d98dcf7606f846a25c162319fdb3dde49655
-
C:\Users\Admin\AppData\Local\Temp\is-VMN4R.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp
Filesize2.4MB
MD5cb8ddb3cebc725405485ae32d8e58331
SHA161bc7caa715458b30d7a574b1d102b6966b86b5e
SHA256f1b253174ea05ac8b1b452eed3ef5ae8adb0d1fa2c3527b3620e0a9b5d1ba6e7
SHA51256abdd8bde5ce947126dcf203ddbfd730ee062488e150561fc9f73a9ee0b570f751d2f9f6466eefaa7c2c4b7dfc1d98dcf7606f846a25c162319fdb3dde49655
-
Filesize
1020KB
MD5c9eaffd90d45b526adac135a898844a5
SHA1bd297848d85bf68299741c15ddf4a44486c549b4
SHA256160da6fae97c7b54a2c1f0d55ce76399f689e98ed7228d4d9205aebb63ad4480
SHA51212f86cd14c7d5652eaa18dd250802ad1f1210ee025857817dfea2cb7d2d146655d261ceccc0dcc60f19053b7e06424e6f563ecd488a72a95d0e7ed22e9b230b0
-
Filesize
1020KB
MD5c9eaffd90d45b526adac135a898844a5
SHA1bd297848d85bf68299741c15ddf4a44486c549b4
SHA256160da6fae97c7b54a2c1f0d55ce76399f689e98ed7228d4d9205aebb63ad4480
SHA51212f86cd14c7d5652eaa18dd250802ad1f1210ee025857817dfea2cb7d2d146655d261ceccc0dcc60f19053b7e06424e6f563ecd488a72a95d0e7ed22e9b230b0
-
Filesize
93KB
MD5d61992cbdda1a789a9d5f597fd0de125
SHA130ee90f65129e2529c7ad940f2006db1a6cf3918
SHA256ba57d1539f4a7286075d8d383012a50af2e019714f8889ba03e23fbe1a2f73d0
SHA512ced9e4a7a9b915dcb233a35493633b10a97bf716c976638b6f0be4d8c643a4c7fad1f6655cfa4704f807f22920757dec875dd2f26d61ef535d55a64460bd1a74
-
Filesize
93KB
MD5d61992cbdda1a789a9d5f597fd0de125
SHA130ee90f65129e2529c7ad940f2006db1a6cf3918
SHA256ba57d1539f4a7286075d8d383012a50af2e019714f8889ba03e23fbe1a2f73d0
SHA512ced9e4a7a9b915dcb233a35493633b10a97bf716c976638b6f0be4d8c643a4c7fad1f6655cfa4704f807f22920757dec875dd2f26d61ef535d55a64460bd1a74
-
\Users\Admin\AppData\Local\Temp\is-NLQVM.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp
Filesize2.4MB
MD5cb8ddb3cebc725405485ae32d8e58331
SHA161bc7caa715458b30d7a574b1d102b6966b86b5e
SHA256f1b253174ea05ac8b1b452eed3ef5ae8adb0d1fa2c3527b3620e0a9b5d1ba6e7
SHA51256abdd8bde5ce947126dcf203ddbfd730ee062488e150561fc9f73a9ee0b570f751d2f9f6466eefaa7c2c4b7dfc1d98dcf7606f846a25c162319fdb3dde49655
-
\Users\Admin\AppData\Local\Temp\is-VMN4R.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp
Filesize2.4MB
MD5cb8ddb3cebc725405485ae32d8e58331
SHA161bc7caa715458b30d7a574b1d102b6966b86b5e
SHA256f1b253174ea05ac8b1b452eed3ef5ae8adb0d1fa2c3527b3620e0a9b5d1ba6e7
SHA51256abdd8bde5ce947126dcf203ddbfd730ee062488e150561fc9f73a9ee0b570f751d2f9f6466eefaa7c2c4b7dfc1d98dcf7606f846a25c162319fdb3dde49655