Analysis

  • max time kernel
    156s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 17:33

General

  • Target

    a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe

  • Size

    557KB

  • MD5

    11db2be72948149d039223e80f20c7bb

  • SHA1

    f3c8ad546a0830a6d5eae197ef812479b1520696

  • SHA256

    a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d

  • SHA512

    38457af6ec05d23d5851ec2f7d7f0e281fd9634df2d44a50db1a75c73c4e8c42bacfd7e77445f83a981e479dbb1cd27250f450900d05bef37f701f590c7bc91a

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 6 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe
    "C:\Users\Admin\AppData\Local\Temp\a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Roaming\System32\csrss.exe.exe
      "C:\Users\Admin\AppData\Roaming\System32\csrss.exe.exe"
      2⤵
      • Adds Run key to start application
      PID:1284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1176-54-0x0000000075A61000-0x0000000075A63000-memory.dmp

    Filesize

    8KB

  • memory/1176-55-0x0000000002310000-0x00000000026A0000-memory.dmp

    Filesize

    3.6MB

  • memory/1176-56-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1176-58-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1176-61-0x0000000002310000-0x00000000026A0000-memory.dmp

    Filesize

    3.6MB

  • memory/1176-62-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1284-63-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1284-65-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/1284-66-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB