Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 21:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
authorize.exe
Resource
win7-20230712-en
windows7-x64
6 signatures
150 seconds
General
-
Target
authorize.exe
-
Size
1.7MB
-
MD5
c906f5482d2a7d1f0ff3e6f3a945e27c
-
SHA1
23f3894f3d3ef6bca88def2ff3320471b309d940
-
SHA256
7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7
-
SHA512
ed9378c87541df0cd0516864f122d9866d3d8e1d65921df851576a409d6d503d3084e49cd3247ee62072a59d12a1a128ee07fc7936ff9e925e1b11d9c88312b2
-
SSDEEP
12288:ANVV/rGvaRlb2nZS1dUpSp3fHwS6K68ZaAouhdKiIXZam:MVQPnZSXUpShfQxKy9urDgam
Malware Config
Signatures
-
ParallaxRat payload 19 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/3692-139-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-143-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-146-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-145-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-147-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-148-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-149-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-150-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-151-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-152-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-153-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-154-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-155-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-156-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-157-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-158-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-159-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-160-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/3692-161-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\obwure.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\obwure.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe 3828 authorize.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3828 wrote to memory of 2600 3828 authorize.exe 82 PID 3828 wrote to memory of 2600 3828 authorize.exe 82 PID 3828 wrote to memory of 2600 3828 authorize.exe 82 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85 PID 3828 wrote to memory of 3692 3828 authorize.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\authorize.exe"C:\Users\Admin\AppData\Local\Temp\authorize.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\authorize.exe"2⤵PID:2600
-
-
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\authorize.exe"2⤵PID:3692
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:1068