Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 10:37

General

  • Target

    313dc38bada29a700a34ec2c11e61f6f3edb7e031e134afbd8bca668b494b599.dll

  • Size

    583KB

  • MD5

    25f1acad71927d1f4f8559a75bb6319a

  • SHA1

    33425c95c8d1cdfc5c244078fd799ca765fd6dc8

  • SHA256

    313dc38bada29a700a34ec2c11e61f6f3edb7e031e134afbd8bca668b494b599

  • SHA512

    5592b2cd5e5800f001e431f4d3eabeafeb80a4a53c83f6c42eb91fbf3e9f8db1d2d215a3a3701620ddb3d45616f9f8501993c5bb857285e0bcdab6270c0e6ca3

Score
10/10

Malware Config

Signatures

  • Valak

    Valak is a JavaScript loader, a link in a chain of distribution of other malware families.

  • Valak JavaScript Loader 2 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\313dc38bada29a700a34ec2c11e61f6f3edb7e031e134afbd8bca668b494b599.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\313dc38bada29a700a34ec2c11e61f6f3edb7e031e134afbd8bca668b494b599.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Windows\SysWOW64\wscript.exe
        wscript.exe //E:jscript "C:\Users\Public\xSsGKcUqL.vA_YV
        3⤵
        • Blocklisted process makes network request
        • Modifies system certificate store
        PID:1328
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1276

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\xSsGKcUqL.vA_YV

      MD5

      9bb0250408c43581e7f9977da9c64e36

      SHA1

      10bb73ae8b19a28b833daffd8c89041ca9c58dca

      SHA256

      732a56132c0ec98955de6f53cd6e5ed9d15bcb3ebc42a9f43e0a8b399c496543

      SHA512

      53829569b9737511a18e77f219b91d1681b858ccf0ed5e9bcffb6fe5caf909be7807902681dfb99825bdb7bec9cbd8b840cce945670b69795db3d851f1df442a

    • memory/1560-54-0x0000000076911000-0x0000000076913000-memory.dmp

      Filesize

      8KB

    • memory/1560-56-0x0000000074F40000-0x0000000074FE5000-memory.dmp

      Filesize

      660KB

    • memory/1560-55-0x0000000074F40000-0x0000000074F5B000-memory.dmp

      Filesize

      108KB

    • memory/1560-58-0x0000000000100000-0x0000000000101000-memory.dmp

      Filesize

      4KB