Analysis
-
max time kernel
158s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
General
-
Target
NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe
-
Size
2.3MB
-
MD5
674582d117bb8e4e58b8121dd7b12bd0
-
SHA1
1be1f3d6e375d26997546ba58b3bcb38de6b541d
-
SHA256
eb6b949f2cbb2e1a822a29fb7ef1f65c10a1fa0c70542aa581b3a5f3c6c9be8e
-
SHA512
7d4dd3ee28d8089dbe6fcb9f08e093bcc3932be356058000f6657f25dbc88c679715ccc88ab49a748794623e5c1ea9bec2071f5af6618e0875dc081bde14c3cc
-
SSDEEP
49152:rq3QscuJsVPCYc80pixEXY2QpvH8n4f9Gion08Li:r0nJsVPBcexz2QpvHqM9GioDi
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1668-7-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-8-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-9-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-10-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-11-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-13-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-12-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-14-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-16-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-15-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-17-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-18-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-20-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-19-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-22-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-21-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-23-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat behavioral2/memory/1668-25-0x0000000003DA0000-0x0000000003DCC000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\webDAV.exe.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\webDAV.exe.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1668 NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.674582d117bb8e4e58b8121dd7b12bd0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1668
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:1688