Analysis
-
max time kernel
135s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 01:30
Static task
static1
Behavioral task
behavioral1
Sample
d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe
-
Size
2.9MB
-
MD5
036a2be92fbcc6e07b8588a32591cd2a
-
SHA1
03fe38861d1f883bac2b24067b3995071e1acd4c
-
SHA256
d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1
-
SHA512
9db687e3ab3e52da4bed71eb14bb710f84186ec35944002ca5b62cd29c1decffbfbe1e4d6f24328b72f076bb258f5bdb2428858ffffb6913cc950ee4a244cbb8
Malware Config
Signatures
-
ParallaxRat payload 2 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/3300-135-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3300-136-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3300 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 82 PID 1560 wrote to memory of 3300 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 82 PID 1560 wrote to memory of 3300 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 82 PID 1560 wrote to memory of 3300 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 82 PID 1560 wrote to memory of 3300 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 82 PID 1560 wrote to memory of 3300 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 82 PID 1560 wrote to memory of 3300 1560 d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe"C:\Users\Admin\AppData\Local\Temp\d7df4ac0cb45d0a0e9e6d237ffc95b19c557a6d8a8753dfbea41b5425ffb84f1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3300
-