Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 01:30
Static task
static1
Behavioral task
behavioral1
Sample
d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe
-
Size
2.9MB
-
MD5
036a2be92fbcc6e07b8588a32591cd2a
-
SHA1
03fe38861d1f883bac2b24067b3995071e1acd4c
-
SHA256
d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1
-
SHA512
9db687e3ab3e52da4bed71eb14bb710f84186ec35944002ca5b62cd29c1decffbfbe1e4d6f24328b72f076bb258f5bdb2428858ffffb6913cc950ee4a244cbb8
Malware Config
Signatures
-
ParallaxRat payload 2 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/316-60-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/316-62-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1612 wrote to memory of 316 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 28 PID 1612 wrote to memory of 316 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 28 PID 1612 wrote to memory of 316 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 28 PID 1612 wrote to memory of 316 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 28 PID 1612 wrote to memory of 316 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 28 PID 1612 wrote to memory of 316 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 28 PID 1612 wrote to memory of 316 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 28 PID 1612 wrote to memory of 316 1612 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe"C:\Users\Admin\AppData\Local\Temp\d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:316
-