Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
09-08-2023 13:43
Static task
static1
1 signatures
General
-
Target
fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe
-
Size
1.6MB
-
MD5
18462ea23f4eb50b95c5c3c30674f26c
-
SHA1
052ff2ecd199f4fae7965edc8a5ae0fe45583a10
-
SHA256
fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e
-
SHA512
9c4f21d07afc1f4a6b7064765ee21401d914699ea3db008cd3337c86c206e110638366273f285e09823717151c0e5af394fb813e5216c16d322f3f7fdf8f2a05
-
SSDEEP
12288:QNVVsrGvaRlb2nZS1dUpSp3fHdwBhT3eTcS5x:8VTPnZSXUpShfWBhT3ewS5
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/3940-129-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-134-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-133-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-132-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-131-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-130-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-135-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-136-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-139-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-138-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-137-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-140-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-143-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-145-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-144-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-142-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-141-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat behavioral1/memory/3940-151-0x0000000003630000-0x000000000365C000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reter.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reter.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3084 Explorer.EXE -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3084 3940 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe"C:\Users\Admin\AppData\Local\Temp\fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3940
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2676