Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    04-02-2022 18:41

General

  • Target

    9ce4835ef1842b7407b3c8777a6495ceb1b69dac0c13f7059c2fec1b2c209cb1.dll

  • Size

    409KB

  • MD5

    d1b867b08265e436af211eb1a72e1705

  • SHA1

    f6cbaa3538d2a990feebd5edc4ac62067290f1b8

  • SHA256

    9ce4835ef1842b7407b3c8777a6495ceb1b69dac0c13f7059c2fec1b2c209cb1

  • SHA512

    529efd71b8d3bb3d52a0ee7dc98710b24147fce60c31fc6cc67fd89396f32a61372b8d6e770a1a2ee1127ba146b8af86bd9b2e06eb59e49b70e4e1cc5b8d340a

Malware Config

Signatures

  • Valak

    Valak is a JavaScript loader, a link in a chain of distribution of other malware families.

  • Valak JavaScript Loader 1 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9ce4835ef1842b7407b3c8777a6495ceb1b69dac0c13f7059c2fec1b2c209cb1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9ce4835ef1842b7407b3c8777a6495ceb1b69dac0c13f7059c2fec1b2c209cb1.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Windows\SysWOW64\wscript.exe
        wscript.exe //E:jscript "C:\Users\Admin\AppData\Local\Temp\s2as.0 "
        3⤵
        • Blocklisted process makes network request
        PID:1892
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:2584
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe ff7e53c77bcbe4d48a99e90d184e1201 0VucKhjdJ020y2vJjWpX8Q.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:2608
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\s2as.0

    MD5

    99b6dca5b8e85e916e684197b696383e

    SHA1

    ed553c8952859ab355cb27df3f78b38b6758ed23

    SHA256

    71880236ed275d8a0d1290636efe14ddc265fc4cad5797f20ebcf2e35ac9798d

    SHA512

    debec520c220ce47f34d3ced6d0b86421b230deb28a40b48ed37da167e21d617a3d78b4b7020d31fd1b634197aef91e73572d56eb5063f0b0b70355c188e8f2f

  • memory/2980-132-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/2980-133-0x0000000010000000-0x0000000010F6F000-memory.dmp

    Filesize

    15.4MB

  • memory/2980-135-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

    Filesize

    4KB