Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 08:03

General

  • Target

    sss.exe

  • Size

    2.3MB

  • MD5

    69b85492367598683cc28f7353148a5c

  • SHA1

    e03f54756a9628a142ee2cb2a9190dd1511b5336

  • SHA256

    50390617ca0f0b27057a4447414d7799996b69e615bea931a31d673394d92695

  • SHA512

    658e39b982d48317dd659b5a303b89079f68ccdd1dfcf3fe373cf23ddb71a998627e1966b74e08596635e2ac9056fc372ae16b2c4816ca09fbb7adc62920da32

  • SSDEEP

    49152:Eq3QscuJsVPCYc80pixEXY2QpvH8nzf9Gion08mkCSgo:E0nJsVPBcexz2QpvHqL9GiouSx

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 18 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sss.exe
    "C:\Users\Admin\AppData\Local\Temp\sss.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2252
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
    1⤵
    • Drops startup file
    PID:2036

Network

    No results found
  • 104.194.222.123:80
    sss.exe
    14.8kB
    11.7kB
    293
    292
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2252-0-0x0000000000160000-0x00000000001E0000-memory.dmp

    Filesize

    512KB

  • memory/2252-1-0x000000007722F000-0x0000000077230000-memory.dmp

    Filesize

    4KB

  • memory/2252-4-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-5-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-6-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-7-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-8-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-9-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-10-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-12-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-11-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-13-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-14-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-15-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-16-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-17-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-18-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-19-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-20-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

  • memory/2252-21-0x0000000000160000-0x00000000001E0000-memory.dmp

    Filesize

    512KB

  • memory/2252-22-0x0000000000960000-0x000000000098C000-memory.dmp

    Filesize

    176KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.