Analysis
-
max time kernel
137s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 22:34
Static task
static1
Behavioral task
behavioral1
Sample
0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe
-
Size
943KB
-
MD5
618d133915377c048d0a869d29d3c721
-
SHA1
c46ada9b200dc161d6de5e5fe5b6cecf0a07b527
-
SHA256
0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574
-
SHA512
81d6651a173d02e9642c0b96ef9a4822113051915ee1e53643016693b557a04a999cb6f35530163728ce530156277a3857d1d5bf7a928505aceecdacef0340f6
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2032-63-0x0000000000400000-0x0000000000452000-memory.dmp parallax_rat -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2032 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28 PID 1908 wrote to memory of 2032 1908 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe"C:\Users\Admin\AppData\Local\Temp\0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe"C:\Users\Admin\AppData\Local\Temp\0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-