Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 19:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
9c7cad9eda9e00f3ab502d8f02cba2ca
-
SHA1
a249034719737a3d6f4adda631e72c2145787949
-
SHA256
842360492263c33b06bbe3d241a035b29bf29900066d29b3267f000eee07e6a2
-
SHA512
7892319b2872dec33031ab4a50efd2de5bf0a58641a011c091c57eaa62dc9957acd82765bfecec60a656736a79328c5fa1ef4733456bde3160ffc3cadffe712e
-
SSDEEP
24576:s7p3zW7nsL1lzFGE64M3ICpoy5hn5TbtgqzHNJltNupD2m9dDZYK:sV3zHXS3VpNh5TJgqrNJl4CEdGK
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2344-9-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-10-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-11-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-12-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-13-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-14-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-15-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-16-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-17-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-18-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-19-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-20-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-21-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-22-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-23-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-24-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-25-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat behavioral1/memory/2344-26-0x00000000031D0000-0x00000000031FC000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\geargul.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe 2344 file.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1200 2344 file.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:2732