Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
337e300721c80ee6c114cc38b2ed786a.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
337e300721c80ee6c114cc38b2ed786a.exe
-
Size
1.8MB
-
MD5
337e300721c80ee6c114cc38b2ed786a
-
SHA1
c6403b50de536acd4b7b90a4173ebe86bb86a001
-
SHA256
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb
-
SHA512
bdec678edfcdd29d0c8fb585cedd628ee6629410e79cfae3f8747066f9264c2f4ad92a35a31df4a48ab8e4682b47aca49fbff3ce22c9e80f6ccad5796f6530b4
-
SSDEEP
24576:DTEk3Xn9SWNNjE6zdAiYVs6hkBWa514UeWgzSULrGlK3Tacr+bZ47x:3nN4AAU6AoPQULrGlK3TcZ47
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/4384-10-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-11-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-13-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-12-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-15-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-16-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-17-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-18-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-19-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-14-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-26-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-25-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-24-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-23-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-22-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-21-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-20-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat behavioral2/memory/4384-38-0x0000000003380000-0x00000000033AC000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe 4384 337e300721c80ee6c114cc38b2ed786a.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3464 4384 337e300721c80ee6c114cc38b2ed786a.exe 59
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\337e300721c80ee6c114cc38b2ed786a.exe"C:\Users\Admin\AppData\Local\Temp\337e300721c80ee6c114cc38b2ed786a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4384
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2244