Analysis
-
max time kernel
113s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 18:13
Static task
static1
Behavioral task
behavioral1
Sample
0x0004000000004ed7-39.ps1
Resource
win7-20230831-en
General
-
Target
0x0004000000004ed7-39.ps1
-
Size
894KB
-
MD5
15f6043283bca82a89fe8bfe9437d95f
-
SHA1
e095820f8ef5a81e6cd6d8769d10196fb95a815f
-
SHA256
05a4408dde667582f0c04b49264be872c5502499814530d3e1880fc403e09a9e
-
SHA512
dc1587897e8e0dc73bf422a2edf5c50b351b2480b84cac419fe70b5af4a2ac42b5a2d4761af24da3366675c5cc39fe3173694c1b0a6f516fd6d4b3537634666e
-
SSDEEP
24576:D0VOCg6fsQsenEYTHKRCXT4QmeL3eGdYTz47btorrG:E/trTq0X3/Om
Malware Config
Signatures
-
ParallaxRat payload 12 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1216-21-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-22-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-23-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-24-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-25-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-26-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-27-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-28-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-29-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-30-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-31-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat behavioral1/memory/1216-32-0x0000000000400000-0x0000000000775000-memory.dmp parallax_rat -
Executes dropped EXE 1 IoCs
pid Process 1216 winlogon.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1216 winlogon.exe 1216 winlogon.exe 1216 winlogon.exe 1216 winlogon.exe 1216 winlogon.exe 1216 winlogon.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2780 powershell.exe 2780 powershell.exe 2780 powershell.exe 1216 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2780 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1216 winlogon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1216 2780 powershell.exe 29 PID 2780 wrote to memory of 1216 2780 powershell.exe 29 PID 2780 wrote to memory of 1216 2780 powershell.exe 29 PID 2780 wrote to memory of 1216 2780 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0x0004000000004ed7-39.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\winlogon.exe"C:\Users\Admin\AppData\Local\Temp\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
670KB
MD555c7be4330887d76e753be2cbc2e0cf9
SHA19241c8ff194463057f75e47113339b9958b28151
SHA256c148faf2e25b7b05e3d9e960a84014a6de63d96b37313b00017851d57de817d0
SHA5128a0797ede983ee0639ec56f38f62d4059e0885a1114d1c3dba34331685c309c2e9e76247c2e432565c4d032dfc03a2e31576cf4cd93bc30064e61d1669a66dbe
-
Filesize
670KB
MD555c7be4330887d76e753be2cbc2e0cf9
SHA19241c8ff194463057f75e47113339b9958b28151
SHA256c148faf2e25b7b05e3d9e960a84014a6de63d96b37313b00017851d57de817d0
SHA5128a0797ede983ee0639ec56f38f62d4059e0885a1114d1c3dba34331685c309c2e9e76247c2e432565c4d032dfc03a2e31576cf4cd93bc30064e61d1669a66dbe