Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:40
Static task
static1
Behavioral task
behavioral1
Sample
2c75e5005993fff65b5b8310c3c50c2e0ac219ba7014f5c480736636e7c5dcd5.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2c75e5005993fff65b5b8310c3c50c2e0ac219ba7014f5c480736636e7c5dcd5.dll
Resource
win10v2004-en-20220113
General
-
Target
2c75e5005993fff65b5b8310c3c50c2e0ac219ba7014f5c480736636e7c5dcd5.dll
-
Size
304KB
-
MD5
fc3ee202834c5bfd785b2b93c1608a08
-
SHA1
ac7fdde56e486989d88290d6fc71f61c86958079
-
SHA256
2c75e5005993fff65b5b8310c3c50c2e0ac219ba7014f5c480736636e7c5dcd5
-
SHA512
fada49bc8ecc55c864ec4efdcd7e46240e583b5ece71f28a94badf8d528cf6aed8bcd200885c4ab7375835403505c9131447fd49bb9f49800668f1dd5cd56b2d
Malware Config
Signatures
-
Valak JavaScript Loader 2 IoCs
Processes:
resource yara_rule C:\Users\Public\iVIwVADQD.eLxan valak C:\Users\Public\iVIwVADQD.eLxan valak_js -
Blocklisted process makes network request 2 IoCs
Processes:
wscript.exeflow pid process 5 1252 wscript.exe 8 1252 wscript.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 604 wrote to memory of 820 604 rundll32.exe rundll32.exe PID 604 wrote to memory of 820 604 rundll32.exe rundll32.exe PID 604 wrote to memory of 820 604 rundll32.exe rundll32.exe PID 604 wrote to memory of 820 604 rundll32.exe rundll32.exe PID 604 wrote to memory of 820 604 rundll32.exe rundll32.exe PID 604 wrote to memory of 820 604 rundll32.exe rundll32.exe PID 604 wrote to memory of 820 604 rundll32.exe rundll32.exe PID 820 wrote to memory of 1252 820 rundll32.exe wscript.exe PID 820 wrote to memory of 1252 820 rundll32.exe wscript.exe PID 820 wrote to memory of 1252 820 rundll32.exe wscript.exe PID 820 wrote to memory of 1252 820 rundll32.exe wscript.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c75e5005993fff65b5b8310c3c50c2e0ac219ba7014f5c480736636e7c5dcd5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c75e5005993fff65b5b8310c3c50c2e0ac219ba7014f5c480736636e7c5dcd5.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\wscript.exewscript.exe //E:jscript "C:\Users\Public\iVIwVADQD.eLxan3⤵
- Blocklisted process makes network request
PID:1252
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1204
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bc9ac467126926bfd2782428da6f1a09
SHA1f9d6fbc917446025fb63cc622a117a11544ce34b
SHA2560eab2d2538e95419e764bd23408ad7e0cb830b3df3e3e1a77c71af75e6184dd9
SHA512f82193aa1551794f5fbaeb2f958cf00a2b43ea2f135be338425e677ad99b523bb6f3787348e3e714f23f9c037ad21a4925db9c40b432a5c4da460f46fed8a62c