Analysis
-
max time kernel
156s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 17:33
Static task
static1
Behavioral task
behavioral1
Sample
a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe
Resource
win10v2004-20220414-en
General
-
Target
a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe
-
Size
557KB
-
MD5
11db2be72948149d039223e80f20c7bb
-
SHA1
f3c8ad546a0830a6d5eae197ef812479b1520696
-
SHA256
a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d
-
SHA512
38457af6ec05d23d5851ec2f7d7f0e281fd9634df2d44a50db1a75c73c4e8c42bacfd7e77445f83a981e479dbb1cd27250f450900d05bef37f701f590c7bc91a
Malware Config
Signatures
-
ParallaxRat payload 6 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1176-56-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral1/memory/1176-58-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral1/memory/1176-62-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral1/memory/1284-63-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral1/memory/1284-65-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral1/memory/1284-66-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\csrss.exe.exe" csrss.exe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1176 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1176 wrote to memory of 1284 1176 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe 27 PID 1176 wrote to memory of 1284 1176 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe 27 PID 1176 wrote to memory of 1284 1176 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe 27 PID 1176 wrote to memory of 1284 1176 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe"C:\Users\Admin\AppData\Local\Temp\a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Roaming\System32\csrss.exe.exe"C:\Users\Admin\AppData\Roaming\System32\csrss.exe.exe"2⤵
- Adds Run key to start application
PID:1284
-