Overview
overview
8Static
static
3parsec-windows.exe
windows7-x64
8parsec-windows.exe
windows10-2004-x64
3$PLUGINSDI...ID.dll
windows7-x64
3$PLUGINSDI...ID.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3parsecd.exe
windows7-x64
1parsecd.exe
windows10-2004-x64
1pservice.exe
windows7-x64
1pservice.exe
windows10-2004-x64
1skel/parse...3b.dll
windows7-x64
1skel/parse...3b.dll
windows10-2004-x64
1teams.exe
windows7-x64
1teams.exe
windows10-2004-x64
1vusb/parsec-vud.exe
windows7-x64
3vusb/parsec-vud.exe
windows10-2004-x64
3wscripts/f...dd.vbs
windows7-x64
1wscripts/f...dd.vbs
windows10-2004-x64
1wscripts/f...ve.vbs
windows7-x64
8wscripts/f...ve.vbs
windows10-2004-x64
8wscripts/l...up.vbs
windows7-x64
3wscripts/l...up.vbs
windows10-2004-x64
7wscripts/s...ll.vbs
windows7-x64
8wscripts/s...ll.vbs
windows10-2004-x64
8wscripts/s...ec.vbs
windows7-x64
4wscripts/s...ec.vbs
windows10-2004-x64
7wscripts/s...ve.vbs
windows7-x64
8wscripts/s...ve.vbs
windows10-2004-x64
8Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
parsec-windows.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
parsec-windows.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ApplicationID.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ApplicationID.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
parsecd.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
parsecd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
pservice.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
pservice.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
skel/parsecd-150-93b.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
skel/parsecd-150-93b.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
teams.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
teams.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
vusb/parsec-vud.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
vusb/parsec-vud.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
wscripts/firewall-add.vbs
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
wscripts/firewall-add.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
wscripts/firewall-remove.vbs
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
wscripts/firewall-remove.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
wscripts/legacy-cleanup.vbs
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
wscripts/legacy-cleanup.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
wscripts/service-install.vbs
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
wscripts/service-install.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
wscripts/service-kill-parsec.vbs
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
wscripts/service-kill-parsec.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
wscripts/service-remove.vbs
Resource
win7-20240221-en
General
-
Target
wscripts/firewall-remove.vbs
-
Size
367B
-
MD5
5d4d70cdf36fcdaa292da1da9133320c
-
SHA1
92dc18d3d1128d43f482ab56804136c687b00713
-
SHA256
75f1dece4fda689a907f6d74b513adb0c1771c1b79ea71160179542c9c4ab2f0
-
SHA512
b54c92fbecb10ddf66d1b7ad950ffbc13f504c71081a8bd56c28c5689a2bf19bd81b467e0697c38f140c72a273eb9eb837105e738c6f1ac4f43344e2ab521778
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 2056 netsh.exe 2108 netsh.exe 1680 netsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2056 2176 WScript.exe 28 PID 2176 wrote to memory of 2056 2176 WScript.exe 28 PID 2176 wrote to memory of 2056 2176 WScript.exe 28 PID 2176 wrote to memory of 2108 2176 WScript.exe 30 PID 2176 wrote to memory of 2108 2176 WScript.exe 30 PID 2176 wrote to memory of 2108 2176 WScript.exe 30 PID 2176 wrote to memory of 1680 2176 WScript.exe 32 PID 2176 wrote to memory of 1680 2176 WScript.exe 32 PID 2176 wrote to memory of 1680 2176 WScript.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wscripts\firewall-remove.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name=Parsec2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2056
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name=parsec.exe2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2108
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name=parsecd.exe2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1680
-