Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 13:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
defense.exe
Resource
win7-20230712-en
windows7-x64
8 signatures
150 seconds
General
-
Target
defense.exe
-
Size
1.6MB
-
MD5
eb11d76f4db6786d48ef7ae3f6c3ad9a
-
SHA1
294482263073bfcc916e0ef6112031e6a195c28d
-
SHA256
4ceab10c2d3cdb9ae245f25c67fe95e5349d3c632d3b9140112e7d77720b5252
-
SHA512
9df543053e17f321c7880db66822d875c45b08f061c550daebaaff9214259039d7bb0cbcee4dc44053439df3b10c144a16762f73ee153eeed6d84d9935cc2c8c
-
SSDEEP
12288:8NVVyrGvaRlb2nZS1dUpSp3fHdSF9e+dy0p1i3v7fjAu1X:IVNPnZSXUpShf2c+dF1BuR
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1056-141-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-142-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-144-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-143-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-145-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-147-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-146-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-148-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-149-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-150-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-151-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-152-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-153-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-154-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-155-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-156-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-157-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat behavioral2/memory/1056-163-0x00000000034C0000-0x00000000034EC000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\loreen.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\loreen.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe 1056 defense.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1276 1056 defense.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\defense.exe"C:\Users\Admin\AppData\Local\Temp\defense.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1056
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:3452