Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2024 20:32

General

  • Target

    92eeeba062b887fb60a664de550ca5aa.dll

  • Size

    248KB

  • MD5

    92eeeba062b887fb60a664de550ca5aa

  • SHA1

    e422797e5e3cc8bd3dcbc7bc338f5e7f15d3d6eb

  • SHA256

    2c98f53860dea50bae2bd50c1e84fe44f7d94df0a756d79ad6bbdc778948e683

  • SHA512

    3d8a66423748cffbfb8e08e92037230403af0087dcddc16749eb438a37459def790e4d7bbd21b7ba6c8193efe173bc8d14e100cc43723808091826826cc4cbcf

  • SSDEEP

    6144:7sZV/WeuAci2Fe1Eu9DB5aFRBS6KnvXM3oIFt0dw5B8tAe:7sWeuAcLerWFXS6KvcoIn0a5OtAe

Score
10/10

Malware Config

Signatures

  • Valak

    Valak is a JavaScript loader, a link in a chain of distribution of other malware families.

  • Valak JavaScript Loader 1 IoCs
  • Valak JavaScript loader 1 IoCs
  • Blocklisted process makes network request 11 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\92eeeba062b887fb60a664de550ca5aa.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\92eeeba062b887fb60a664de550ca5aa.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Windows\SysWOW64\wscript.exe
        wscript.exe //E:jscript "C:\Users\Public\styARQqjL.nmKvY
        3⤵
        • Blocklisted process makes network request
        • Modifies system certificate store
        PID:2664
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2476

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7dd0b9e520ecbfb1449e3e806eb31b1a

      SHA1

      1f2e283e73ba07cf7d6c709365c0e0c2dee45bd5

      SHA256

      7a0b256ff1f4bad0ec0d1f81cf2a004f2a3ceb5394efa2aa9682750fed5063ba

      SHA512

      f116604fca7b11ce1d40cf08da1a5a85ec5be4b306491d9ad8d9c3b031bc4d5d703159aaf7507817eee982d9aab1698e8941fee6d4eaacfd41dd702cdc03bfd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      5d96ad39b708e4645b6d244e17c1ea77

      SHA1

      367683185f5016d32848b8f347d105ccf8d65e59

      SHA256

      287d78c6c6f49b6e53a49751050b67031d60b2c67bd87d2bde3a70127d610bd7

      SHA512

      59f59d0f48b2be195dc493a8a8453482173e980e22802a2b33d0e99cd0ee0e2c4f40296b75216bfc375614579638c2b71fb7b99374e6a152a93df00cfbf4d6e6

    • C:\Users\Admin\AppData\Local\Temp\Tar288C.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Public\styARQqjL.nmKvY

      Filesize

      13KB

      MD5

      65fed9e5ba48663004a86ddbf114efd3

      SHA1

      579d59754e802876c2568805b5c10da4dd3db948

      SHA256

      97b2ace5522dc0c034ecc7bdb214690f4e8477dab75b8ca8a4e8c38d3131962a

      SHA512

      716f374d9b3aff74d44aa1586479b4a6dfa8645b98c7efec7abce063b3a0bf8565980567b7c99595abeb385815471ef857adec5a0f2a55b7e96b38ab70b0622b

    • memory/640-0-0x00000000747C0000-0x0000000074818000-memory.dmp

      Filesize

      352KB

    • memory/640-4-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/640-3-0x00000000747C0000-0x0000000074818000-memory.dmp

      Filesize

      352KB