Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 15:19
Static task
static1
Behavioral task
behavioral1
Sample
2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe
-
Size
3.1MB
-
MD5
93ebd2582b92bda84dd7a781c9ccb087
-
SHA1
4f343fea4961e054ca980c38ec0ba31d235912fb
-
SHA256
2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11
-
SHA512
d9892b339b060ba57336a327aa52252b675b6b19bcedbe94c55f5bfad689a94688fa6b5c8597dc76bb3a216055ed7bd5bd108ecb84345660967df75f57ee7b4b
-
SSDEEP
49152:Nq3QscuJsVPCYc80pixEXY2QpvH8n7f9GioB08341OPc9:N0nJsVPBcexz2QpvHqD9Giod4OPc
Malware Config
Signatures
-
ParallaxRat payload 5 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1560-6-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1560-8-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1560-10-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1560-11-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/1560-19-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lefasc.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2792 1560 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 2208 wrote to memory of 1560 2208 2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe 29 PID 1560 wrote to memory of 2792 1560 pipanel.exe 30 PID 1560 wrote to memory of 2792 1560 pipanel.exe 30 PID 1560 wrote to memory of 2792 1560 pipanel.exe 30 PID 1560 wrote to memory of 2792 1560 pipanel.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe"C:\Users\Admin\AppData\Local\Temp\2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\2ee076dac5df5fe560093b56afe32431838e041e275b378b69198860cd290d11_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 883⤵
- Program crash
PID:2792
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2600