Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/02/2024, 05:03

General

  • Target

    https://github.com/yuankong666/Ultimate-RAT-Collection/raw/main/ParallaxRat/Parallax%20v1.0.7.7z

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 3 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://github.com/yuankong666/Ultimate-RAT-Collection/raw/main/ParallaxRat/Parallax%20v1.0.7.7z"
    1⤵
      PID:812
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2644
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      PID:168
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:760
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3332
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2836
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1420
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Parallax v1.0.7.7z"
      1⤵
      • NTFS ADS
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\7zO47BE21D7\Parallax Launcher.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO47BE21D7\Parallax Launcher.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3436
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2140

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W91E2TXQ\edgecompatviewlist[1].xml

            Filesize

            74KB

            MD5

            d4fc49dc14f63895d997fa4940f24378

            SHA1

            3efb1437a7c5e46034147cbbc8db017c69d02c31

            SHA256

            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

            SHA512

            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\NIBIQVXF\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Parallax v1.0.7.7z

            Filesize

            68KB

            MD5

            8fc562d36e7e7d57d2c2d0b7c6268887

            SHA1

            ae54a1e539c0b514d4a555eb93e49acdd0de080e

            SHA256

            c8caf8a7ea9778d0ff98b8fc76105b9bf9f6dd51d376e48292bbc06d92251f65

            SHA512

            7605bc4cf87825e28e7da1aa1a57910d5255cd400c0441da89317e961683e0772d074e69940488104654888db4fe5ba60f1b5b2d82d4dafea6dbe2fccd46ff99

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Parallax v1.0.7.7z

            Filesize

            90KB

            MD5

            694b26daaef2c99daf93c99a0c271116

            SHA1

            98505a911d67b2d4bc83d06b24e3d08ad0f2c4d1

            SHA256

            9c8ffd1c2ed8d889ef03da3c3a311d935ff2b6d607825c560c4f73b67e9c282a

            SHA512

            bccb763d70caf2b23364cbf27fea2fa49e4121b77ad331358f6f364605d90fa9eef7f4c4878646f6c608e59e5e9bca01cfec48a51614d9f5ac165041a9305850

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Parallax v1.0.7.7z.4vd2had.partial

            Filesize

            428KB

            MD5

            f4e2fc1c7aa7981a4cb666809f59ec17

            SHA1

            bc89fc6f3b3ab5b79c2c42586e0fd9e42d5ff45e

            SHA256

            a10a1706783f31fba576d327958d79693b957f7eef555c79398ea5ae8145dc7d

            SHA512

            455932f0fcd6e5a7c1ae8f09a5501e26e14128b8dec79daea00ad77ed2bc5cb2f724a9489cc1e3949ce84e283ecacedfb7d5c108ac67523c5cec430892e66af3

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\EAARFAI7\Parallax%20v1.0.7[1].7z

            Filesize

            441KB

            MD5

            c849521964426fd6a8987f684270797f

            SHA1

            92633f6d5920284c6fb879433388cfff560a361f

            SHA256

            021bdd16298971fb3b2b40c1badf88e0ff7663fc40f541a6ed2dc4ac2081c8f2

            SHA512

            a445274c05efa815b8cd6dda02594aebf57f625ff4581a6158a2066ade2a2158df8d1757a21e666731316fe0f2a48736d5d089e9589af647c88df6ae57ee15a9

          • C:\Users\Admin\AppData\Local\Temp\7zO47BE21D7\Parallax Launcher.exe

            Filesize

            1.9MB

            MD5

            9de5aeb5d17b1587761abc0d46eb5851

            SHA1

            91c00d583e7cfbbc4cb265ec7b5fcba181441842

            SHA256

            b2d9c966b140c8216a8e9f6300c28d36f70e1a93e24a7319a18f42e982588356

            SHA512

            d14447103ce5fda3c0d5187ebe0282015aff2d806a07e0db4a1d40e988b53730ad4bf1a6e715d44efeba0ac3878e2d8bcd285c304ab30a98248c677117dcc7da

          • C:\Users\Admin\AppData\Local\Temp\7zO47BE21D7\Parallax Launcher.exe

            Filesize

            2.4MB

            MD5

            b644085a31537f3fc3fb4ce615c54f36

            SHA1

            c24842beac193dc007c45376a1b096e71b8f491f

            SHA256

            e9756b60719855cafc3878e9f6f328b5904464093a9135389f802cfb14b1dcfd

            SHA512

            7c73f7cb6f3155576f454dbc4e4347d8f7388843ed2d83ac3bcda6ee241b425ece9eb931a1cd6f8139dab694b0b9e0b46f58b4c6bde4969aee8331bdf18ffd19

          • memory/2644-71-0x00000271F44D0000-0x00000271F44D1000-memory.dmp

            Filesize

            4KB

          • memory/2644-0-0x00000271EDE20000-0x00000271EDE30000-memory.dmp

            Filesize

            64KB

          • memory/2644-73-0x00000271F44E0000-0x00000271F44E1000-memory.dmp

            Filesize

            4KB

          • memory/2644-35-0x00000271EE1A0000-0x00000271EE1A2000-memory.dmp

            Filesize

            8KB

          • memory/2644-16-0x00000271EE700000-0x00000271EE710000-memory.dmp

            Filesize

            64KB

          • memory/2836-70-0x0000017BB9340000-0x0000017BB9342000-memory.dmp

            Filesize

            8KB

          • memory/2836-68-0x0000017BB9280000-0x0000017BB9282000-memory.dmp

            Filesize

            8KB

          • memory/2836-65-0x0000017BB9250000-0x0000017BB9252000-memory.dmp

            Filesize

            8KB

          • memory/3436-128-0x0000000001210000-0x0000000001211000-memory.dmp

            Filesize

            4KB

          • memory/3436-129-0x0000000003030000-0x0000000003031000-memory.dmp

            Filesize

            4KB

          • memory/3436-134-0x0000000003090000-0x0000000003091000-memory.dmp

            Filesize

            4KB

          • memory/3436-133-0x0000000003080000-0x0000000003081000-memory.dmp

            Filesize

            4KB

          • memory/3436-132-0x0000000003070000-0x0000000003071000-memory.dmp

            Filesize

            4KB

          • memory/3436-131-0x0000000003040000-0x0000000003041000-memory.dmp

            Filesize

            4KB

          • memory/3436-130-0x00000000000F0000-0x0000000000DCA000-memory.dmp

            Filesize

            12.9MB

          • memory/3436-135-0x00000000030A0000-0x00000000030A1000-memory.dmp

            Filesize

            4KB

          • memory/3436-137-0x00000000000F0000-0x0000000000DCA000-memory.dmp

            Filesize

            12.9MB

          • memory/3436-140-0x00000000000F0000-0x0000000000DCA000-memory.dmp

            Filesize

            12.9MB