Analysis

  • max time kernel
    113s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2023 18:13

General

  • Target

    0x0004000000004ed7-39.ps1

  • Size

    894KB

  • MD5

    15f6043283bca82a89fe8bfe9437d95f

  • SHA1

    e095820f8ef5a81e6cd6d8769d10196fb95a815f

  • SHA256

    05a4408dde667582f0c04b49264be872c5502499814530d3e1880fc403e09a9e

  • SHA512

    dc1587897e8e0dc73bf422a2edf5c50b351b2480b84cac419fe70b5af4a2ac42b5a2d4761af24da3366675c5cc39fe3173694c1b0a6f516fd6d4b3537634666e

  • SSDEEP

    24576:D0VOCg6fsQsenEYTHKRCXT4QmeL3eGdYTz47btorrG:E/trTq0X3/Om

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 12 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0x0004000000004ed7-39.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\winlogon.exe
      "C:\Users\Admin\AppData\Local\Temp\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\winlogon.exe

    Filesize

    670KB

    MD5

    55c7be4330887d76e753be2cbc2e0cf9

    SHA1

    9241c8ff194463057f75e47113339b9958b28151

    SHA256

    c148faf2e25b7b05e3d9e960a84014a6de63d96b37313b00017851d57de817d0

    SHA512

    8a0797ede983ee0639ec56f38f62d4059e0885a1114d1c3dba34331685c309c2e9e76247c2e432565c4d032dfc03a2e31576cf4cd93bc30064e61d1669a66dbe

  • C:\Users\Admin\AppData\Local\Temp\winlogon.exe

    Filesize

    670KB

    MD5

    55c7be4330887d76e753be2cbc2e0cf9

    SHA1

    9241c8ff194463057f75e47113339b9958b28151

    SHA256

    c148faf2e25b7b05e3d9e960a84014a6de63d96b37313b00017851d57de817d0

    SHA512

    8a0797ede983ee0639ec56f38f62d4059e0885a1114d1c3dba34331685c309c2e9e76247c2e432565c4d032dfc03a2e31576cf4cd93bc30064e61d1669a66dbe

  • memory/1216-27-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-24-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-22-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-21-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-31-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-30-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-29-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-28-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-23-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-26-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-32-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-25-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/1216-19-0x0000000000400000-0x0000000000775000-memory.dmp

    Filesize

    3.5MB

  • memory/2780-8-0x0000000002810000-0x0000000002890000-memory.dmp

    Filesize

    512KB

  • memory/2780-9-0x0000000002810000-0x0000000002890000-memory.dmp

    Filesize

    512KB

  • memory/2780-20-0x000007FEF5FE0000-0x000007FEF697D000-memory.dmp

    Filesize

    9.6MB

  • memory/2780-4-0x000000001B320000-0x000000001B602000-memory.dmp

    Filesize

    2.9MB

  • memory/2780-5-0x0000000001FB0000-0x0000000001FB8000-memory.dmp

    Filesize

    32KB

  • memory/2780-6-0x000007FEF5FE0000-0x000007FEF697D000-memory.dmp

    Filesize

    9.6MB

  • memory/2780-11-0x0000000002810000-0x0000000002890000-memory.dmp

    Filesize

    512KB

  • memory/2780-10-0x000007FEF5FE0000-0x000007FEF697D000-memory.dmp

    Filesize

    9.6MB

  • memory/2780-7-0x0000000002810000-0x0000000002890000-memory.dmp

    Filesize

    512KB