Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 19:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
9c7cad9eda9e00f3ab502d8f02cba2ca
-
SHA1
a249034719737a3d6f4adda631e72c2145787949
-
SHA256
842360492263c33b06bbe3d241a035b29bf29900066d29b3267f000eee07e6a2
-
SHA512
7892319b2872dec33031ab4a50efd2de5bf0a58641a011c091c57eaa62dc9957acd82765bfecec60a656736a79328c5fa1ef4733456bde3160ffc3cadffe712e
-
SSDEEP
24576:s7p3zW7nsL1lzFGE64M3ICpoy5hn5TbtgqzHNJltNupD2m9dDZYK:sV3zHXS3VpNh5TJgqrNJl4CEdGK
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1564-8-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-9-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-10-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-11-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-12-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-13-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-14-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-17-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-16-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-15-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-18-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-19-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-20-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-21-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-22-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-24-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-23-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat behavioral2/memory/1564-32-0x00000000030A0000-0x00000000030CC000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\geargul.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\geargul.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe 1564 file.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3556 Explorer.EXE -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3556 1564 file.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:4136