Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/01/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
83c5bbe9284eead577d370cfe429685e.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
83c5bbe9284eead577d370cfe429685e.exe
-
Size
3.6MB
-
MD5
83c5bbe9284eead577d370cfe429685e
-
SHA1
c33c6f6a0f65673439fe1f18e110e46564cf7586
-
SHA256
0cb06c655b686f300f944519e89bee199089d22598bfa83ac969b88a6b2cb15e
-
SHA512
943c68646bbbb1e1d2c6d4387bf024ffeb03fc2f24dd9bf07237446a3dc6466fb257bb6cb59d52aaefce7a26bd2a88d1eaaa2755c040d545943bc4541402d22f
-
SSDEEP
49152:ZLOYEQ7B+hS3oSbQzmlpkz1oGVpOtGQHZY1:4Yp+hqpeZpOtBHZY1
Malware Config
Signatures
-
ParallaxRat payload 19 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2368-5-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-11-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-13-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-24-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-26-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-25-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-23-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-22-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-21-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-20-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-27-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-19-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-18-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-17-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-16-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-15-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-14-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-12-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral1/memory/2368-28-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
Blocklisted process makes network request 7 IoCs
flow pid Process 2 2368 rundll32.exe 2 2368 rundll32.exe 5 2368 rundll32.exe 5 2368 rundll32.exe 2 2368 rundll32.exe 2 2368 rundll32.exe 5 2368 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe 1928 83c5bbe9284eead577d370cfe429685e.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28 PID 1928 wrote to memory of 2368 1928 83c5bbe9284eead577d370cfe429685e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\83c5bbe9284eead577d370cfe429685e.exe"C:\Users\Admin\AppData\Local\Temp\83c5bbe9284eead577d370cfe429685e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exe"C:\Users\Admin\AppData\Local\Temp\83c5bbe9284eead577d370cfe429685e.exe"2⤵
- Blocklisted process makes network request
PID:2368
-