Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 22:34
Static task
static1
Behavioral task
behavioral1
Sample
0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe
-
Size
943KB
-
MD5
618d133915377c048d0a869d29d3c721
-
SHA1
c46ada9b200dc161d6de5e5fe5b6cecf0a07b527
-
SHA256
0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574
-
SHA512
81d6651a173d02e9642c0b96ef9a4822113051915ee1e53643016693b557a04a999cb6f35530163728ce530156277a3857d1d5bf7a928505aceecdacef0340f6
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1332-137-0x0000000000400000-0x0000000000452000-memory.dmp parallax_rat -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 1332 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82 PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82 PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82 PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82 PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82 PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82 PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82 PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82 PID 2420 wrote to memory of 1332 2420 0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe"C:\Users\Admin\AppData\Local\Temp\0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe"C:\Users\Admin\AppData\Local\Temp\0bb1921f6f7b64e66d9490f4c5fe5afce72022ccbc3e6a84e9c71cc81076c574.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-