Analysis
-
max time kernel
367s -
max time network
596s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
09-08-2023 10:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
type.exe
Resource
win7-20230712-en
windows7-x64
6 signatures
600 seconds
General
-
Target
type.exe
-
Size
1.6MB
-
MD5
904e137f26519f1c93f2983d22be096c
-
SHA1
e15afc29eb44bcbfbdf74a6cb97ff3aa0e498d98
-
SHA256
ee58424bc83a40bb269df0d5b731d9c0d40997b765320cd40e2a898d2088d1ef
-
SHA512
c459fb03126d86e5832400c1fe1c52f9a900cfc471ddf72459b3e86b4ca91559de95530e9c8d37aa86db66e9c81b51a0549ce4f50774c15e03378e8388983b74
-
SSDEEP
12288:RNVVlrGvaRlb2nZS1dUpSp3fHn6O2VWIFQWBA+JPZ/:1VKPnZSXUpShfYVWI6WBRxx
Malware Config
Signatures
-
ParallaxRat payload 23 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2908-58-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-59-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-60-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-61-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-65-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-73-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-75-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-76-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-77-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-79-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-78-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-80-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-81-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-82-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-83-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-85-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-84-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-86-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-87-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-89-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-88-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-90-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2908-91-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\loreenw.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe 2784 type.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29 PID 2784 wrote to memory of 2908 2784 type.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\type.exe"C:\Users\Admin\AppData\Local\Temp\type.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\type.exe"2⤵PID:2908
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2328