Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 17:33
Static task
static1
Behavioral task
behavioral1
Sample
a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe
Resource
win10v2004-20220414-en
General
-
Target
a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe
-
Size
557KB
-
MD5
11db2be72948149d039223e80f20c7bb
-
SHA1
f3c8ad546a0830a6d5eae197ef812479b1520696
-
SHA256
a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d
-
SHA512
38457af6ec05d23d5851ec2f7d7f0e281fd9634df2d44a50db1a75c73c4e8c42bacfd7e77445f83a981e479dbb1cd27250f450900d05bef37f701f590c7bc91a
Malware Config
Signatures
-
ParallaxRat payload 6 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/2004-131-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral2/memory/2004-133-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral2/memory/2004-135-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral2/memory/4492-136-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral2/memory/4492-138-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat behavioral2/memory/4492-139-0x0000000000400000-0x0000000000491000-memory.dmp parallax_rat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\csrss.exe.exe" csrss.exe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2004 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2004 wrote to memory of 4492 2004 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe 87 PID 2004 wrote to memory of 4492 2004 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe 87 PID 2004 wrote to memory of 4492 2004 a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe"C:\Users\Admin\AppData\Local\Temp\a352d00e0322a0e397f167c1164f7667c672935ba14d29c4f4b60f26d0a88f5d.exe"1⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\System32\csrss.exe.exe"C:\Users\Admin\AppData\Roaming\System32\csrss.exe.exe"2⤵
- Adds Run key to start application
PID:4492
-