Analysis
-
max time kernel
122s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 21:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
authorize.exe
Resource
win7-20230712-en
windows7-x64
6 signatures
150 seconds
General
-
Target
authorize.exe
-
Size
1.7MB
-
MD5
c906f5482d2a7d1f0ff3e6f3a945e27c
-
SHA1
23f3894f3d3ef6bca88def2ff3320471b309d940
-
SHA256
7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7
-
SHA512
ed9378c87541df0cd0516864f122d9866d3d8e1d65921df851576a409d6d503d3084e49cd3247ee62072a59d12a1a128ee07fc7936ff9e925e1b11d9c88312b2
-
SSDEEP
12288:ANVV/rGvaRlb2nZS1dUpSp3fHwS6K68ZaAouhdKiIXZam:MVQPnZSXUpShfQxKy9urDgam
Malware Config
Signatures
-
ParallaxRat payload 23 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2880-58-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-59-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-60-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-61-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-65-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-74-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-75-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-76-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-77-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-79-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-78-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-81-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-80-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-83-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-82-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-84-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-85-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-87-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-86-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-89-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-88-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-90-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2880-91-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\obwure.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe 1260 authorize.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29 PID 1260 wrote to memory of 2880 1260 authorize.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\authorize.exe"C:\Users\Admin\AppData\Local\Temp\authorize.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\authorize.exe"2⤵PID:2880
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2448