Analysis
-
max time kernel
155s -
max time network
155s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:50
Static task
static1
Behavioral task
behavioral1
Sample
1907cb31a7cf2b9d72a04bffc54f3c3e586185f52f34c55a9c2801e5f0a3ece9.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1907cb31a7cf2b9d72a04bffc54f3c3e586185f52f34c55a9c2801e5f0a3ece9.dll
Resource
win10v2004-en-20220112
General
-
Target
1907cb31a7cf2b9d72a04bffc54f3c3e586185f52f34c55a9c2801e5f0a3ece9.dll
-
Size
304KB
-
MD5
ebfdc4d7dde8997830fb7f5fa0f57bb4
-
SHA1
37fa2d70133adf5af114b15aff803fb52ad597c8
-
SHA256
1907cb31a7cf2b9d72a04bffc54f3c3e586185f52f34c55a9c2801e5f0a3ece9
-
SHA512
1d28659b13ac3646ab80af537be2b8aa290ace1eeca81161e5dc9ee0ddba2a12c241d2f1e240f508322bd338f4b9b9b9e4ff312fc557b2787e320eb6d2d50198
Malware Config
Signatures
-
Valak JavaScript Loader 2 IoCs
Processes:
resource yara_rule C:\Users\Public\iVIwVADQD.eLxan valak C:\Users\Public\iVIwVADQD.eLxan valak_js -
Blocklisted process makes network request 2 IoCs
Processes:
wscript.exeflow pid process 5 760 wscript.exe 8 760 wscript.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1272 wrote to memory of 1428 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1428 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1428 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1428 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1428 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1428 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1428 1272 rundll32.exe rundll32.exe PID 1428 wrote to memory of 760 1428 rundll32.exe wscript.exe PID 1428 wrote to memory of 760 1428 rundll32.exe wscript.exe PID 1428 wrote to memory of 760 1428 rundll32.exe wscript.exe PID 1428 wrote to memory of 760 1428 rundll32.exe wscript.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1907cb31a7cf2b9d72a04bffc54f3c3e586185f52f34c55a9c2801e5f0a3ece9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1907cb31a7cf2b9d72a04bffc54f3c3e586185f52f34c55a9c2801e5f0a3ece9.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\wscript.exewscript.exe //E:jscript "C:\Users\Public\iVIwVADQD.eLxan3⤵
- Blocklisted process makes network request
PID:760
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1180
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bc9ac467126926bfd2782428da6f1a09
SHA1f9d6fbc917446025fb63cc622a117a11544ce34b
SHA2560eab2d2538e95419e764bd23408ad7e0cb830b3df3e3e1a77c71af75e6184dd9
SHA512f82193aa1551794f5fbaeb2f958cf00a2b43ea2f135be338425e677ad99b523bb6f3787348e3e714f23f9c037ad21a4925db9c40b432a5c4da460f46fed8a62c