Analysis
-
max time kernel
119s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
09-08-2023 13:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
html.exe
Resource
win7-20230712-en
windows7-x64
6 signatures
150 seconds
General
-
Target
html.exe
-
Size
1.5MB
-
MD5
77f82a88068d77ba9ece00d21bf3a4db
-
SHA1
cedf93d2a9dae5a41c7797baaf535f008d0166e9
-
SHA256
33dd66da63f57e1d64d469172a5d5e7615924bcde919e962c4a5a00c51306051
-
SHA512
1c3e8eb58ea6139e738bcf1662037669f470d46cdc60c9b4297542bcc545a2673447686a99827a8d07ae06d0260d5b1778159cd41552bc2c571a06ef297a9e1d
-
SSDEEP
12288:KNVVyrGvaRlb2nZS1dUpSp3fHgY+bE6gVVpQIcsmvG5SYmG7Sa:SVNPnZSXUpShfj+bE6gLpKpu5SYm6
Malware Config
Signatures
-
ParallaxRat payload 23 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2432-61-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-59-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-63-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-64-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-69-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-75-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-76-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-77-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-78-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-79-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-80-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-81-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-82-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-83-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-84-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-85-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-86-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-87-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-89-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-88-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-90-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-91-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/2432-92-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\retero.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe 1704 html.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31 PID 1704 wrote to memory of 2432 1704 html.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\html.exe"C:\Users\Admin\AppData\Local\Temp\html.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\html.exe"2⤵PID:2432
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:1708