Analysis

  • max time kernel
    165s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 05:41

General

  • Target

    c8808d17e4ce35534a702f4b318684ef.exe

  • Size

    6.5MB

  • MD5

    c8808d17e4ce35534a702f4b318684ef

  • SHA1

    3739e8d38d5598a0ac67bc06cbef408ba6e3aa8f

  • SHA256

    d8eb5792d969c21c364da69eca1322ab5f63e0a39b0e542bad4ee95be873c296

  • SHA512

    db966f831ea28ce8110e5ac9df0ebfcc5f3ba30500cd87e404b69929821174fc9431e48b3838b893a9da39b02d9ce1b7396d66a1fcec80ec8451c6e4eceefeb1

  • SSDEEP

    98304:OO5VI/yA/FFrWw//NtM/SmfGnp3b0o5O:/I/D/M/SmenP5O

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 19 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8808d17e4ce35534a702f4b318684ef.exe
    "C:\Users\Admin\AppData\Local\Temp\c8808d17e4ce35534a702f4b318684ef.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\system32\notepad.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:388
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
          PID:5116
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          3⤵
            PID:760
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            3⤵
            • Drops file in Windows directory
            PID:3752

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/388-10-0x0000000000800000-0x0000000000808000-memory.dmp

        Filesize

        32KB

      • memory/388-22-0x0000000004610000-0x0000000004643000-memory.dmp

        Filesize

        204KB

      • memory/388-12-0x00007FFC580B0000-0x00007FFC582A5000-memory.dmp

        Filesize

        2.0MB

      • memory/388-11-0x0000000004610000-0x0000000004643000-memory.dmp

        Filesize

        204KB

      • memory/388-4-0x00000000004A0000-0x00000000004A2000-memory.dmp

        Filesize

        8KB

      • memory/3752-28-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-33-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-44-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-43-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-15-0x0000000000FD0000-0x0000000000FD9000-memory.dmp

        Filesize

        36KB

      • memory/3752-16-0x00007FFC580B0000-0x00007FFC582A5000-memory.dmp

        Filesize

        2.0MB

      • memory/3752-42-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-27-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-29-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-41-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-30-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-31-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-32-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-40-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-34-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-35-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-37-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-36-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-38-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/3752-39-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/4920-6-0x0000000000D00000-0x0000000000D01000-memory.dmp

        Filesize

        4KB

      • memory/4920-0-0x0000000000400000-0x0000000000AAA000-memory.dmp

        Filesize

        6.7MB

      • memory/4920-1-0x0000000000D00000-0x0000000000D01000-memory.dmp

        Filesize

        4KB

      • memory/4920-2-0x0000000000400000-0x0000000000AAA000-memory.dmp

        Filesize

        6.7MB

      • memory/4920-3-0x0000000000400000-0x0000000000AAA000-memory.dmp

        Filesize

        6.7MB