Analysis
-
max time kernel
417s -
max time network
602s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 10:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
type.exe
Resource
win7-20230712-en
windows7-x64
6 signatures
600 seconds
General
-
Target
type.exe
-
Size
1.6MB
-
MD5
904e137f26519f1c93f2983d22be096c
-
SHA1
e15afc29eb44bcbfbdf74a6cb97ff3aa0e498d98
-
SHA256
ee58424bc83a40bb269df0d5b731d9c0d40997b765320cd40e2a898d2088d1ef
-
SHA512
c459fb03126d86e5832400c1fe1c52f9a900cfc471ddf72459b3e86b4ca91559de95530e9c8d37aa86db66e9c81b51a0549ce4f50774c15e03378e8388983b74
-
SSDEEP
12288:RNVVlrGvaRlb2nZS1dUpSp3fHn6O2VWIFQWBA+JPZ/:1VKPnZSXUpShfYVWI6WBRxx
Malware Config
Signatures
-
ParallaxRat payload 19 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/932-137-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-143-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-144-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-145-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-146-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-147-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-149-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-148-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-150-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-151-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-153-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-152-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-154-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-156-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-157-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-155-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-158-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-159-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/932-160-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\loreenw.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\loreenw.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe 1736 type.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83 PID 1736 wrote to memory of 932 1736 type.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\type.exe"C:\Users\Admin\AppData\Local\Temp\type.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\type.exe"2⤵PID:932
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:3512