Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 21:11
Static task
static1
Behavioral task
behavioral1
Sample
418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe
Resource
win7-20220414-en
General
-
Target
418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe
-
Size
1.8MB
-
MD5
6ce823abf08804817553fb0d2b9a00fb
-
SHA1
cc5633d752e27f6179448bb3f8fb855d547e11c0
-
SHA256
418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d
-
SHA512
cdb32028fc5320103fc81874a2ff475c56338bf3c933435dcb4ea852279cf32c5c4f43736964fb365c65714e83967b5073b76d603d3b26f27369947d0cc327e4
Malware Config
Signatures
-
ParallaxRat payload 2 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/4320-150-0x0000000004AB0000-0x0000000004AE6000-memory.dmp parallax_rat behavioral2/memory/1636-164-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat -
Blocklisted process makes network request 4 IoCs
flow pid Process 39 1636 cmd.exe 39 1636 cmd.exe 39 1636 cmd.exe 39 1636 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2344 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 2660 MasterDrive.exe 2036 atikmdag-patcher.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\lsm.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 2660 MasterDrive.exe 4320 mstsc.exe 4320 mstsc.exe 4320 mstsc.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4320 mstsc.exe 4320 mstsc.exe 4320 mstsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2344 2468 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 77 PID 2468 wrote to memory of 2344 2468 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 77 PID 2468 wrote to memory of 2344 2468 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 77 PID 2344 wrote to memory of 3520 2344 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 78 PID 2344 wrote to memory of 3520 2344 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 78 PID 2344 wrote to memory of 3520 2344 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 78 PID 3520 wrote to memory of 2608 3520 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 79 PID 3520 wrote to memory of 2608 3520 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 79 PID 3520 wrote to memory of 2608 3520 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe 79 PID 2608 wrote to memory of 2660 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 80 PID 2608 wrote to memory of 2660 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 80 PID 2608 wrote to memory of 2660 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 80 PID 2608 wrote to memory of 2036 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 81 PID 2608 wrote to memory of 2036 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 81 PID 2608 wrote to memory of 2036 2608 418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp 81 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84 PID 2660 wrote to memory of 4320 2660 MasterDrive.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe"C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\is-6IOV4.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp"C:\Users\Admin\AppData\Local\Temp\is-6IOV4.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp" /SL5="$90058,1181168,740864,C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe"C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\is-MQSVV.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp"C:\Users\Admin\AppData\Local\Temp\is-MQSVV.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp" /SL5="$801DC,1181168,740864,C:\Users\Admin\AppData\Local\Temp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\MasterDrive.exe"C:\Users\Admin\AppData\Local\Temp\MasterDrive.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\system32\mstsc.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"7⤵PID:4800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"7⤵PID:1840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"7⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:1636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher.exe"C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher.exe"5⤵
- Executes dropped EXE
PID:2036
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1020KB
MD5c9eaffd90d45b526adac135a898844a5
SHA1bd297848d85bf68299741c15ddf4a44486c549b4
SHA256160da6fae97c7b54a2c1f0d55ce76399f689e98ed7228d4d9205aebb63ad4480
SHA51212f86cd14c7d5652eaa18dd250802ad1f1210ee025857817dfea2cb7d2d146655d261ceccc0dcc60f19053b7e06424e6f563ecd488a72a95d0e7ed22e9b230b0
-
Filesize
1020KB
MD5c9eaffd90d45b526adac135a898844a5
SHA1bd297848d85bf68299741c15ddf4a44486c549b4
SHA256160da6fae97c7b54a2c1f0d55ce76399f689e98ed7228d4d9205aebb63ad4480
SHA51212f86cd14c7d5652eaa18dd250802ad1f1210ee025857817dfea2cb7d2d146655d261ceccc0dcc60f19053b7e06424e6f563ecd488a72a95d0e7ed22e9b230b0
-
Filesize
93KB
MD5d61992cbdda1a789a9d5f597fd0de125
SHA130ee90f65129e2529c7ad940f2006db1a6cf3918
SHA256ba57d1539f4a7286075d8d383012a50af2e019714f8889ba03e23fbe1a2f73d0
SHA512ced9e4a7a9b915dcb233a35493633b10a97bf716c976638b6f0be4d8c643a4c7fad1f6655cfa4704f807f22920757dec875dd2f26d61ef535d55a64460bd1a74
-
Filesize
93KB
MD5d61992cbdda1a789a9d5f597fd0de125
SHA130ee90f65129e2529c7ad940f2006db1a6cf3918
SHA256ba57d1539f4a7286075d8d383012a50af2e019714f8889ba03e23fbe1a2f73d0
SHA512ced9e4a7a9b915dcb233a35493633b10a97bf716c976638b6f0be4d8c643a4c7fad1f6655cfa4704f807f22920757dec875dd2f26d61ef535d55a64460bd1a74
-
C:\Users\Admin\AppData\Local\Temp\is-6IOV4.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp
Filesize2.4MB
MD5cb8ddb3cebc725405485ae32d8e58331
SHA161bc7caa715458b30d7a574b1d102b6966b86b5e
SHA256f1b253174ea05ac8b1b452eed3ef5ae8adb0d1fa2c3527b3620e0a9b5d1ba6e7
SHA51256abdd8bde5ce947126dcf203ddbfd730ee062488e150561fc9f73a9ee0b570f751d2f9f6466eefaa7c2c4b7dfc1d98dcf7606f846a25c162319fdb3dde49655
-
C:\Users\Admin\AppData\Local\Temp\is-MQSVV.tmp\418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d.tmp
Filesize2.4MB
MD5cb8ddb3cebc725405485ae32d8e58331
SHA161bc7caa715458b30d7a574b1d102b6966b86b5e
SHA256f1b253174ea05ac8b1b452eed3ef5ae8adb0d1fa2c3527b3620e0a9b5d1ba6e7
SHA51256abdd8bde5ce947126dcf203ddbfd730ee062488e150561fc9f73a9ee0b570f751d2f9f6466eefaa7c2c4b7dfc1d98dcf7606f846a25c162319fdb3dde49655