Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    31/03/2025, 04:27

General

  • Target

    d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll

  • Size

    107KB

  • MD5

    3198b729513bf5a65e39be989298079b

  • SHA1

    a79a312a5c8884ec4b51aa4d776ba5793de09ffc

  • SHA256

    d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1

  • SHA512

    05c6431a07aad1f276431d99beb4f4dd8e247bde96084cbe5ae0bce01ca262827e96a9187aec4d3dd41c08afde594d1bb98217dfe09718bb4eb3907e0f2bde2e

  • SSDEEP

    3072:bw0WMZYV7iTQbXAukRJtps7Fo/3e6Uege/EYpVPVZ:bw0xGVQGXAu2iQV9

Score
10/10

Malware Config

Extracted

Family

valleyrat_s2

Version

1.0

C2

43.225.58.178:6666

43.225.58.178:8888

43.225.58.178:7777

Attributes
  • campaign_date

    2025. 3.30

Signatures

  • ValleyRat

    ValleyRat stage2 is a backdoor written in C++.

  • Valleyrat_s2 family
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll,#1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\system32\rundll32.exe
      rundll32.exe
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2592-2-0x0000000000060000-0x0000000000061000-memory.dmp

    Filesize

    4KB

  • memory/2592-0-0x0000000000060000-0x0000000000061000-memory.dmp

    Filesize

    4KB

  • memory/2592-4-0x00000000022F0000-0x0000000002371000-memory.dmp

    Filesize

    516KB

  • memory/2592-3-0x00000000002C0000-0x00000000002E9000-memory.dmp

    Filesize

    164KB

  • memory/2592-5-0x00000000002C0000-0x00000000002E9000-memory.dmp

    Filesize

    164KB

  • memory/2592-6-0x00000000002C0000-0x00000000002E9000-memory.dmp

    Filesize

    164KB

  • memory/2592-8-0x0000000002380000-0x00000000023C7000-memory.dmp

    Filesize

    284KB

  • memory/2592-7-0x00000000002C0000-0x00000000002E9000-memory.dmp

    Filesize

    164KB

  • memory/2592-9-0x0000000002470000-0x00000000024BE000-memory.dmp

    Filesize

    312KB

  • memory/2592-10-0x0000000002470000-0x00000000024BE000-memory.dmp

    Filesize

    312KB

  • memory/2592-11-0x0000000002470000-0x00000000024BE000-memory.dmp

    Filesize

    312KB

  • memory/2592-12-0x0000000002470000-0x00000000024BE000-memory.dmp

    Filesize

    312KB

  • memory/2592-13-0x0000000002470000-0x00000000024BE000-memory.dmp

    Filesize

    312KB

  • memory/2592-14-0x00000000002C0000-0x00000000002E9000-memory.dmp

    Filesize

    164KB

  • memory/2592-15-0x00000000002C0000-0x00000000002E9000-memory.dmp

    Filesize

    164KB

  • memory/2592-16-0x0000000002470000-0x00000000024BE000-memory.dmp

    Filesize

    312KB