Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-02-2024 05:03

General

  • Target

    https://github.com/yuankong666/Ultimate-RAT-Collection/raw/main/ParallaxRat/Parallax%20v1.0.7.7z

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 3 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://github.com/yuankong666/Ultimate-RAT-Collection/raw/main/ParallaxRat/Parallax%20v1.0.7.7z"
    1⤵
      PID:812
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2644
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      PID:168
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:760
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3332
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2836
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1420
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Parallax v1.0.7.7z"
      1⤵
      • NTFS ADS
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\7zO47BE21D7\Parallax Launcher.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO47BE21D7\Parallax Launcher.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3436
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W91E2TXQ\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\NIBIQVXF\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Parallax v1.0.7.7z

      Filesize

      68KB

      MD5

      8fc562d36e7e7d57d2c2d0b7c6268887

      SHA1

      ae54a1e539c0b514d4a555eb93e49acdd0de080e

      SHA256

      c8caf8a7ea9778d0ff98b8fc76105b9bf9f6dd51d376e48292bbc06d92251f65

      SHA512

      7605bc4cf87825e28e7da1aa1a57910d5255cd400c0441da89317e961683e0772d074e69940488104654888db4fe5ba60f1b5b2d82d4dafea6dbe2fccd46ff99

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Parallax v1.0.7.7z

      Filesize

      90KB

      MD5

      694b26daaef2c99daf93c99a0c271116

      SHA1

      98505a911d67b2d4bc83d06b24e3d08ad0f2c4d1

      SHA256

      9c8ffd1c2ed8d889ef03da3c3a311d935ff2b6d607825c560c4f73b67e9c282a

      SHA512

      bccb763d70caf2b23364cbf27fea2fa49e4121b77ad331358f6f364605d90fa9eef7f4c4878646f6c608e59e5e9bca01cfec48a51614d9f5ac165041a9305850

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Parallax v1.0.7.7z.4vd2had.partial

      Filesize

      428KB

      MD5

      f4e2fc1c7aa7981a4cb666809f59ec17

      SHA1

      bc89fc6f3b3ab5b79c2c42586e0fd9e42d5ff45e

      SHA256

      a10a1706783f31fba576d327958d79693b957f7eef555c79398ea5ae8145dc7d

      SHA512

      455932f0fcd6e5a7c1ae8f09a5501e26e14128b8dec79daea00ad77ed2bc5cb2f724a9489cc1e3949ce84e283ecacedfb7d5c108ac67523c5cec430892e66af3

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\EAARFAI7\Parallax%20v1.0.7[1].7z

      Filesize

      441KB

      MD5

      c849521964426fd6a8987f684270797f

      SHA1

      92633f6d5920284c6fb879433388cfff560a361f

      SHA256

      021bdd16298971fb3b2b40c1badf88e0ff7663fc40f541a6ed2dc4ac2081c8f2

      SHA512

      a445274c05efa815b8cd6dda02594aebf57f625ff4581a6158a2066ade2a2158df8d1757a21e666731316fe0f2a48736d5d089e9589af647c88df6ae57ee15a9

    • C:\Users\Admin\AppData\Local\Temp\7zO47BE21D7\Parallax Launcher.exe

      Filesize

      1.9MB

      MD5

      9de5aeb5d17b1587761abc0d46eb5851

      SHA1

      91c00d583e7cfbbc4cb265ec7b5fcba181441842

      SHA256

      b2d9c966b140c8216a8e9f6300c28d36f70e1a93e24a7319a18f42e982588356

      SHA512

      d14447103ce5fda3c0d5187ebe0282015aff2d806a07e0db4a1d40e988b53730ad4bf1a6e715d44efeba0ac3878e2d8bcd285c304ab30a98248c677117dcc7da

    • C:\Users\Admin\AppData\Local\Temp\7zO47BE21D7\Parallax Launcher.exe

      Filesize

      2.4MB

      MD5

      b644085a31537f3fc3fb4ce615c54f36

      SHA1

      c24842beac193dc007c45376a1b096e71b8f491f

      SHA256

      e9756b60719855cafc3878e9f6f328b5904464093a9135389f802cfb14b1dcfd

      SHA512

      7c73f7cb6f3155576f454dbc4e4347d8f7388843ed2d83ac3bcda6ee241b425ece9eb931a1cd6f8139dab694b0b9e0b46f58b4c6bde4969aee8331bdf18ffd19

    • memory/2644-71-0x00000271F44D0000-0x00000271F44D1000-memory.dmp

      Filesize

      4KB

    • memory/2644-0-0x00000271EDE20000-0x00000271EDE30000-memory.dmp

      Filesize

      64KB

    • memory/2644-73-0x00000271F44E0000-0x00000271F44E1000-memory.dmp

      Filesize

      4KB

    • memory/2644-35-0x00000271EE1A0000-0x00000271EE1A2000-memory.dmp

      Filesize

      8KB

    • memory/2644-16-0x00000271EE700000-0x00000271EE710000-memory.dmp

      Filesize

      64KB

    • memory/2836-70-0x0000017BB9340000-0x0000017BB9342000-memory.dmp

      Filesize

      8KB

    • memory/2836-68-0x0000017BB9280000-0x0000017BB9282000-memory.dmp

      Filesize

      8KB

    • memory/2836-65-0x0000017BB9250000-0x0000017BB9252000-memory.dmp

      Filesize

      8KB

    • memory/3436-128-0x0000000001210000-0x0000000001211000-memory.dmp

      Filesize

      4KB

    • memory/3436-129-0x0000000003030000-0x0000000003031000-memory.dmp

      Filesize

      4KB

    • memory/3436-134-0x0000000003090000-0x0000000003091000-memory.dmp

      Filesize

      4KB

    • memory/3436-133-0x0000000003080000-0x0000000003081000-memory.dmp

      Filesize

      4KB

    • memory/3436-132-0x0000000003070000-0x0000000003071000-memory.dmp

      Filesize

      4KB

    • memory/3436-131-0x0000000003040000-0x0000000003041000-memory.dmp

      Filesize

      4KB

    • memory/3436-130-0x00000000000F0000-0x0000000000DCA000-memory.dmp

      Filesize

      12.9MB

    • memory/3436-135-0x00000000030A0000-0x00000000030A1000-memory.dmp

      Filesize

      4KB

    • memory/3436-137-0x00000000000F0000-0x0000000000DCA000-memory.dmp

      Filesize

      12.9MB

    • memory/3436-140-0x00000000000F0000-0x0000000000DCA000-memory.dmp

      Filesize

      12.9MB