Analysis
-
max time kernel
118s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-02-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
Resource
win7-20231215-en
General
-
Target
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
-
Size
1.8MB
-
MD5
337e300721c80ee6c114cc38b2ed786a
-
SHA1
c6403b50de536acd4b7b90a4173ebe86bb86a001
-
SHA256
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb
-
SHA512
bdec678edfcdd29d0c8fb585cedd628ee6629410e79cfae3f8747066f9264c2f4ad92a35a31df4a48ab8e4682b47aca49fbff3ce22c9e80f6ccad5796f6530b4
-
SSDEEP
24576:DTEk3Xn9SWNNjE6zdAiYVs6hkBWa514UeWgzSULrGlK3Tacr+bZ47x:3nN4AAU6AoPQULrGlK3TcZ47
Malware Config
Signatures
-
ParallaxRat payload 17 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2540-12-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-13-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-15-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-14-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-16-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-17-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-18-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-19-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-20-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-21-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-22-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-23-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-24-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-26-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-25-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-27-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat behavioral1/memory/2540-28-0x00000000037D0000-0x00000000037FC000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1264 2540 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe"C:\Users\Admin\AppData\Local\Temp\500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2164