Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe
Resource
win10v2004-20250314-en
General
-
Target
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe
-
Size
2.7MB
-
MD5
2c54a502a6e895067b44c10518cc526b
-
SHA1
be97549d3a00f0e33787998145d4498b1bb06860
-
SHA256
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b
-
SHA512
720862858a1d9f428772e940ab9a15cf4b915afb15ae983a532bb27e1c59671cd28a7f1ffc7fffb3ce45b0c91697739d5c07338c3e9b15e566d8376aceee1025
-
SSDEEP
49152:m1dJHUNmnJgPa4g5X9IrE76Iech3cfxVfCzhJTzkaNogFZDqVnDnE:m1P0NAJgar5tIrOFech3cfvfCtJTzkIR
Malware Config
Extracted
valleyrat_s2
1.0
154.44.8.39:443
154.44.8.39:80
154.44.8.39:8011
-
campaign_date
2025. 3. 7
Signatures
-
ValleyRat
ValleyRat stage2 is a backdoor written in C++.
-
Valleyrat_s2 family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation 0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe -
Executes dropped EXE 1 IoCs
pid Process 4844 Update.exe -
Loads dropped DLL 1 IoCs
pid Process 4844 Update.exe -
pid Process 2260 powershell.exe 5036 powershell.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: Update.exe File opened (read-only) \??\Q: Update.exe File opened (read-only) \??\R: Update.exe File opened (read-only) \??\S: Update.exe File opened (read-only) \??\T: Update.exe File opened (read-only) \??\X: Update.exe File opened (read-only) \??\I: Update.exe File opened (read-only) \??\J: Update.exe File opened (read-only) \??\N: Update.exe File opened (read-only) \??\O: Update.exe File opened (read-only) \??\P: Update.exe File opened (read-only) \??\G: Update.exe File opened (read-only) \??\H: Update.exe File opened (read-only) \??\L: Update.exe File opened (read-only) \??\V: Update.exe File opened (read-only) \??\Y: Update.exe File opened (read-only) \??\Z: Update.exe File opened (read-only) \??\E: Update.exe File opened (read-only) \??\K: Update.exe File opened (read-only) \??\M: Update.exe File opened (read-only) \??\U: Update.exe File opened (read-only) \??\W: Update.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 5808 tasklist.exe 2448 tasklist.exe 5968 tasklist.exe 3680 tasklist.exe 4680 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 5416 timeout.exe 5012 timeout.exe 3360 timeout.exe 208 timeout.exe 4848 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe 4844 Update.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3680 tasklist.exe Token: SeDebugPrivilege 5036 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 4680 tasklist.exe Token: SeDebugPrivilege 5808 tasklist.exe Token: SeDebugPrivilege 2448 tasklist.exe Token: SeDebugPrivilege 5968 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1644 0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe 4844 Update.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4844 1644 0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe 93 PID 1644 wrote to memory of 4844 1644 0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe 93 PID 1644 wrote to memory of 4844 1644 0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe 93 PID 4844 wrote to memory of 5024 4844 Update.exe 94 PID 4844 wrote to memory of 5024 4844 Update.exe 94 PID 4844 wrote to memory of 5024 4844 Update.exe 94 PID 5024 wrote to memory of 3680 5024 cmd.exe 96 PID 5024 wrote to memory of 3680 5024 cmd.exe 96 PID 5024 wrote to memory of 3680 5024 cmd.exe 96 PID 5024 wrote to memory of 3360 5024 cmd.exe 97 PID 5024 wrote to memory of 3360 5024 cmd.exe 97 PID 5024 wrote to memory of 3360 5024 cmd.exe 97 PID 5024 wrote to memory of 5416 5024 cmd.exe 98 PID 5024 wrote to memory of 5416 5024 cmd.exe 98 PID 5024 wrote to memory of 5416 5024 cmd.exe 98 PID 4844 wrote to memory of 5332 4844 Update.exe 102 PID 4844 wrote to memory of 5332 4844 Update.exe 102 PID 4844 wrote to memory of 5332 4844 Update.exe 102 PID 4844 wrote to memory of 5868 4844 Update.exe 103 PID 4844 wrote to memory of 5868 4844 Update.exe 103 PID 4844 wrote to memory of 5868 4844 Update.exe 103 PID 5868 wrote to memory of 5036 5868 cmd.exe 106 PID 5868 wrote to memory of 5036 5868 cmd.exe 106 PID 5868 wrote to memory of 5036 5868 cmd.exe 106 PID 5332 wrote to memory of 2260 5332 cmd.exe 107 PID 5332 wrote to memory of 2260 5332 cmd.exe 107 PID 5332 wrote to memory of 2260 5332 cmd.exe 107 PID 5024 wrote to memory of 4680 5024 cmd.exe 117 PID 5024 wrote to memory of 4680 5024 cmd.exe 117 PID 5024 wrote to memory of 4680 5024 cmd.exe 117 PID 5024 wrote to memory of 692 5024 cmd.exe 118 PID 5024 wrote to memory of 692 5024 cmd.exe 118 PID 5024 wrote to memory of 692 5024 cmd.exe 118 PID 5024 wrote to memory of 5012 5024 cmd.exe 119 PID 5024 wrote to memory of 5012 5024 cmd.exe 119 PID 5024 wrote to memory of 5012 5024 cmd.exe 119 PID 5024 wrote to memory of 5808 5024 cmd.exe 122 PID 5024 wrote to memory of 5808 5024 cmd.exe 122 PID 5024 wrote to memory of 5808 5024 cmd.exe 122 PID 5024 wrote to memory of 2280 5024 cmd.exe 123 PID 5024 wrote to memory of 2280 5024 cmd.exe 123 PID 5024 wrote to memory of 2280 5024 cmd.exe 123 PID 5024 wrote to memory of 3360 5024 cmd.exe 124 PID 5024 wrote to memory of 3360 5024 cmd.exe 124 PID 5024 wrote to memory of 3360 5024 cmd.exe 124 PID 5024 wrote to memory of 2448 5024 cmd.exe 125 PID 5024 wrote to memory of 2448 5024 cmd.exe 125 PID 5024 wrote to memory of 2448 5024 cmd.exe 125 PID 5024 wrote to memory of 2120 5024 cmd.exe 126 PID 5024 wrote to memory of 2120 5024 cmd.exe 126 PID 5024 wrote to memory of 2120 5024 cmd.exe 126 PID 5024 wrote to memory of 208 5024 cmd.exe 127 PID 5024 wrote to memory of 208 5024 cmd.exe 127 PID 5024 wrote to memory of 208 5024 cmd.exe 127 PID 5024 wrote to memory of 5968 5024 cmd.exe 128 PID 5024 wrote to memory of 5968 5024 cmd.exe 128 PID 5024 wrote to memory of 5968 5024 cmd.exe 128 PID 5024 wrote to memory of 4008 5024 cmd.exe 129 PID 5024 wrote to memory of 4008 5024 cmd.exe 129 PID 5024 wrote to memory of 4008 5024 cmd.exe 129 PID 5024 wrote to memory of 4848 5024 cmd.exe 130 PID 5024 wrote to memory of 4848 5024 cmd.exe 130 PID 5024 wrote to memory of 4848 5024 cmd.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe"C:\Users\Admin\AppData\Local\Temp\0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\Update.exe"C:\Users\Admin\AppData\Roaming\Update.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\cmd.execmd.exe /B /c "C:\Users\Admin\AppData\Local\Temp\\monitor.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Update.exe"4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "Update.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3360
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 30 /nobreak4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5416
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Update.exe"4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "Update.exe"4⤵
- System Location Discovery: System Language Discovery
PID:692
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 30 /nobreak4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5012
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Update.exe"4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5808
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "Update.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 30 /nobreak4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3360
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Update.exe"4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "Update.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 30 /nobreak4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:208
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Update.exe"4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "Update.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 30 /nobreak4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\updated.ps13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\updated.ps14⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD574beabd4347b1ecc24fdc6cd9bb2ec64
SHA1b793909bd2bf91d40eafb71194cc3eeb0c057110
SHA25680d19c23e407ccffe9f5b43087c752b2157294a1e42d887705b9924ceb9e6af9
SHA512f36be6d71e6ae79ffa79e9bc8d57e79cc14ace932fcc2106ab4df8f4ba99506dac3c007d986dfe3bf8884977a411ba1faa713489dc27b25c23bec49d42abd802
-
Filesize
20KB
MD509eb36b2d63007098491e22c6ad0794e
SHA1fd53897fac4e2a8d0988f51090e88f2aa706dabc
SHA2565b28de0f443a4c9b73251a8d315c8acceaf734cb3b7ae25b6e00dde23bad4fdc
SHA5129a43add61b402493080871fa872ba751a9549ce9f613e25b56583aed6466ab8be983611039cd9120d535df07ea6a2bcca9756e53162187e3249c2cb7337f854d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
769B
MD54c78bd444198aee8dd650c726ed3e447
SHA1fd2179a144c227875fa2245b324760f1ed4aa455
SHA2562fee95571c2580a70ad950c5e5c5e7b36a1f6a183542d4002a8123974fef53f5
SHA51248a11502ed05a44e209d0474e5303062cffe2b6b8489489cf241da9ff01d1774b639d01293d82ebfe3017fbba158047b4bc39a5f66ea1265819d00c42268b82b
-
Filesize
151B
MD5aa0e1012d3b7c24fad1be4806756c2cf
SHA1fe0d130af9105d9044ff3d657d1abeaf0b750516
SHA256fc47e1fa89397c3139d9047dc667531a9153a339f8e29ac713e518d51a995897
SHA51215fae192951747a0c71059f608700f88548f3e60bb5c708b206bf793a7e3d059a278f2058d4ac86b86781b202037401a29602ee4d6c0cbaaff532cef311975f4
-
Filesize
2.1MB
MD507ac1439cee26e090be31ecc0eedc02b
SHA1d225d63ee5bd082525192320296063cfa3576263
SHA256d036bf5f6400177e078f4b8bab5f817430eb4dbdf79461c6f273bd73f7c312c7
SHA5120ebb6aad4df9352c913f44fe57b909c27fe7e8a404c1a8af883e3edcb566b11f74929515b615879599f3c1685a2c263129aa69869d7d7a2717932aae0233ab2e
-
Filesize
386KB
MD5fb325c945a08d06fe91681179bdccc66
SHA1f5d91b7d75d34e156066ab4099e0fd0df9227b32
SHA2560c2cc4513ec9101a28a7988c72a46175efd82f387bb3bcfb2612e808804282b5
SHA5122bb588ebe2fa35d03652aec4e5d51dabd3a24e996336a4d5ec9c762d6084862d5cd5f530f1da0b98d2887ba88f4e077697d128071ff497d2967f9f42adc2f533