Analysis
-
max time kernel
129s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2023 19:02
Static task
static1
Behavioral task
behavioral1
Sample
angle.exe
Resource
win7-20230220-en
windows7-x64
1 signatures
150 seconds
General
-
Target
angle.exe
-
Size
3.9MB
-
MD5
bbfd2735e39574dcfbc86322d870e811
-
SHA1
0f627fd2f71fd34425cd62007a8a4d276bff1435
-
SHA256
533cda19ddd4581250a297e0c7a899cc7c215f0e3bbfbefcfcdf443c6ad2aaf0
-
SHA512
49f209477423d9ad3b9a7744f6cd015e0c88a3ea2271f07274841c8d66ed8fc7edad03f3070343b1442e20d30cbc0be26fc90b303f123aaad90b378744a74d5a
-
SSDEEP
24576:bcqJge1JYGhCP3dbTb2XShCFVshuhBcomEl+11suoYx9liYtR+/K:EyXALoh+HZd
Malware Config
Signatures
-
ParallaxRat payload 4 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/5064-142-0x0000000000400000-0x00000000007F0000-memory.dmp parallax_rat behavioral2/memory/5064-155-0x0000000000400000-0x00000000007F0000-memory.dmp parallax_rat behavioral2/memory/5064-167-0x0000000000400000-0x00000000007F0000-memory.dmp parallax_rat behavioral2/memory/5064-179-0x0000000000400000-0x00000000007F0000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WiFIDriver.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WiFIDriver.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe 5064 angle.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3156 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE Token: SeShutdownPrivilege 3156 Explorer.EXE Token: SeCreatePagefilePrivilege 3156 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3156 Explorer.EXE 3156 Explorer.EXE -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 5064 wrote to memory of 3156 5064 angle.exe 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\angle.exe"C:\Users\Admin\AppData\Local\Temp\angle.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5064
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:3556