Analysis
-
max time kernel
170s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:47
Static task
static1
General
-
Target
bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe
-
Size
2.3MB
-
MD5
2c5aa603c83f1b64b043fade5a7f4d5d
-
SHA1
e29f92e7a1e09fc887ffa07e0787e8a6b40a34fa
-
SHA256
bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d
-
SHA512
5812d1634c5f3510302d3304b5a67f2b6c05b441ecdbe6f9379b82c47fcf0f8f1829ebed8c0876e50dfae5e6397eb8da47765855cd86c0237080a22050d7f083
-
SSDEEP
49152:Oq3QscuJsVPCYc80pixEXY2QpvH8nsf9Gion08onIy89kTcuC0:O0nJsVPBcexz2QpvHqg9GiokIy89NH0
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/4100-4-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-5-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-6-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-8-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-9-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-7-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-10-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-12-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-11-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-13-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-14-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-15-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-17-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-18-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-16-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-19-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-20-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat behavioral1/memory/4100-23-0x0000000003870000-0x000000000389C000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\webDAV.exe.exe DllHost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\webDAV.exe.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4100 bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe"C:\Users\Admin\AppData\Local\Temp\bc1a655a9485bda2733da9d1a15d8536245ceb52833b7f3d73c43b2f06e0b29d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4100
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:3988