Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-02-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
337e300721c80ee6c114cc38b2ed786a.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
337e300721c80ee6c114cc38b2ed786a.exe
-
Size
1.8MB
-
MD5
337e300721c80ee6c114cc38b2ed786a
-
SHA1
c6403b50de536acd4b7b90a4173ebe86bb86a001
-
SHA256
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb
-
SHA512
bdec678edfcdd29d0c8fb585cedd628ee6629410e79cfae3f8747066f9264c2f4ad92a35a31df4a48ab8e4682b47aca49fbff3ce22c9e80f6ccad5796f6530b4
-
SSDEEP
24576:DTEk3Xn9SWNNjE6zdAiYVs6hkBWa514UeWgzSULrGlK3Tacr+bZ47x:3nN4AAU6AoPQULrGlK3TcZ47
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2412-12-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-19-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-18-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-17-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-16-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-15-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-14-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-13-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-20-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-22-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-21-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-25-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-26-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-24-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-23-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-27-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-28-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat behavioral1/memory/2412-34-0x00000000038C0000-0x00000000038EC000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe 2412 337e300721c80ee6c114cc38b2ed786a.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1236 2412 337e300721c80ee6c114cc38b2ed786a.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\337e300721c80ee6c114cc38b2ed786a.exe"C:\Users\Admin\AppData\Local\Temp\337e300721c80ee6c114cc38b2ed786a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2656