Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 14:44
Static task
static1
Behavioral task
behavioral1
Sample
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
Resource
win10v2004-20241007-en
General
-
Target
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
-
Size
1.8MB
-
MD5
337e300721c80ee6c114cc38b2ed786a
-
SHA1
c6403b50de536acd4b7b90a4173ebe86bb86a001
-
SHA256
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb
-
SHA512
bdec678edfcdd29d0c8fb585cedd628ee6629410e79cfae3f8747066f9264c2f4ad92a35a31df4a48ab8e4682b47aca49fbff3ce22c9e80f6ccad5796f6530b4
-
SSDEEP
24576:DTEk3Xn9SWNNjE6zdAiYVs6hkBWa514UeWgzSULrGlK3Tacr+bZ47x:3nN4AAU6AoPQULrGlK3TcZ47
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2600-13-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-14-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-29-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-28-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-26-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-25-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-23-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-22-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-20-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-19-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-17-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-15-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-27-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-24-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-21-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-18-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-16-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat behavioral1/memory/2600-33-0x00000000037C0000-0x00000000037EC000-memory.dmp parallax_rat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1192 2600 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe"C:\Users\Admin\AppData\Local\Temp\500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2904