Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
09-08-2023 13:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
html.exe
Resource
win7-20230712-en
windows7-x64
6 signatures
150 seconds
General
-
Target
html.exe
-
Size
1.5MB
-
MD5
77f82a88068d77ba9ece00d21bf3a4db
-
SHA1
cedf93d2a9dae5a41c7797baaf535f008d0166e9
-
SHA256
33dd66da63f57e1d64d469172a5d5e7615924bcde919e962c4a5a00c51306051
-
SHA512
1c3e8eb58ea6139e738bcf1662037669f470d46cdc60c9b4297542bcc545a2673447686a99827a8d07ae06d0260d5b1778159cd41552bc2c571a06ef297a9e1d
-
SSDEEP
12288:KNVVyrGvaRlb2nZS1dUpSp3fHgY+bE6gVVpQIcsmvG5SYmG7Sa:SVNPnZSXUpShfj+bE6gLpKpu5SYm6
Malware Config
Signatures
-
ParallaxRat payload 23 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1856-59-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-61-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-60-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-62-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-66-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-73-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-75-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-76-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-77-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-78-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-80-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-79-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-81-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-82-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-83-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-84-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-85-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-87-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-86-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-88-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-90-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-89-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1856-91-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\retero.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe 2384 html.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29 PID 2384 wrote to memory of 1856 2384 html.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\html.exe"C:\Users\Admin\AppData\Local\Temp\html.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\html.exe"2⤵PID:1856
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2628