Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
Resource
win7-20231215-en
General
-
Target
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
-
Size
1.8MB
-
MD5
337e300721c80ee6c114cc38b2ed786a
-
SHA1
c6403b50de536acd4b7b90a4173ebe86bb86a001
-
SHA256
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb
-
SHA512
bdec678edfcdd29d0c8fb585cedd628ee6629410e79cfae3f8747066f9264c2f4ad92a35a31df4a48ab8e4682b47aca49fbff3ce22c9e80f6ccad5796f6530b4
-
SSDEEP
24576:DTEk3Xn9SWNNjE6zdAiYVs6hkBWa514UeWgzSULrGlK3Tacr+bZ47x:3nN4AAU6AoPQULrGlK3TcZ47
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/4812-10-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-11-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-13-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-12-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-14-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-15-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-18-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-16-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-17-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-19-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-20-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-22-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-21-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-23-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-24-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-25-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-26-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat behavioral2/memory/4812-37-0x0000000003240000-0x000000000326C000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3260 4812 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 78
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe"C:\Users\Admin\AppData\Local\Temp\500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4812
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:3956