Resubmissions

16-03-2024 11:43

240316-nvvcvaac5x 10

16-03-2024 11:42

240316-nvhztaac4z 3

Analysis

  • max time kernel
    59s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-03-2024 11:43

General

  • Target

    842360492263c33b06bbe3d241a035b29bf29900066d29b3267f000eee07e6a2.exe

  • Size

    1.8MB

  • MD5

    9c7cad9eda9e00f3ab502d8f02cba2ca

  • SHA1

    a249034719737a3d6f4adda631e72c2145787949

  • SHA256

    842360492263c33b06bbe3d241a035b29bf29900066d29b3267f000eee07e6a2

  • SHA512

    7892319b2872dec33031ab4a50efd2de5bf0a58641a011c091c57eaa62dc9957acd82765bfecec60a656736a79328c5fa1ef4733456bde3160ffc3cadffe712e

  • SSDEEP

    24576:s7p3zW7nsL1lzFGE64M3ICpoy5hn5TbtgqzHNJltNupD2m9dDZYK:sV3zHXS3VpNh5TJgqrNJl4CEdGK

Score
10/10

Malware Config

Signatures

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 18 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\842360492263c33b06bbe3d241a035b29bf29900066d29b3267f000eee07e6a2.exe
      "C:\Users\Admin\AppData\Local\Temp\842360492263c33b06bbe3d241a035b29bf29900066d29b3267f000eee07e6a2.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3940
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2404
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
    1⤵
    • Drops startup file
    PID:4496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\geargul.exe

    Filesize

    1.8MB

    MD5

    9c7cad9eda9e00f3ab502d8f02cba2ca

    SHA1

    a249034719737a3d6f4adda631e72c2145787949

    SHA256

    842360492263c33b06bbe3d241a035b29bf29900066d29b3267f000eee07e6a2

    SHA512

    7892319b2872dec33031ab4a50efd2de5bf0a58641a011c091c57eaa62dc9957acd82765bfecec60a656736a79328c5fa1ef4733456bde3160ffc3cadffe712e

  • memory/2404-26-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-38-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-36-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-37-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-34-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-35-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-32-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-33-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-28-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-27-0x00000298F21F0000-0x00000298F21F1000-memory.dmp

    Filesize

    4KB

  • memory/3452-5-0x0000000001350000-0x0000000001351000-memory.dmp

    Filesize

    4KB

  • memory/3940-11-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-12-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-16-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-17-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-18-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-19-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-20-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-21-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-22-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-23-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-24-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-15-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-14-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-13-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-0-0x0000000002430000-0x00000000024B0000-memory.dmp

    Filesize

    512KB

  • memory/3940-10-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-9-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-8-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB

  • memory/3940-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/3940-6-0x00000000025C0000-0x00000000025C1000-memory.dmp

    Filesize

    4KB

  • memory/3940-2-0x0000000002430000-0x00000000024B0000-memory.dmp

    Filesize

    512KB

  • memory/3940-40-0x00000000030F0000-0x00000000031AE000-memory.dmp

    Filesize

    760KB

  • memory/3940-41-0x00000000031B0000-0x0000000003479000-memory.dmp

    Filesize

    2.8MB

  • memory/3940-1-0x0000000077442000-0x0000000077443000-memory.dmp

    Filesize

    4KB

  • memory/3940-46-0x00000000030C0000-0x00000000030EC000-memory.dmp

    Filesize

    176KB