Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31/03/2025, 04:23

General

  • Target

    d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll

  • Size

    107KB

  • MD5

    3198b729513bf5a65e39be989298079b

  • SHA1

    a79a312a5c8884ec4b51aa4d776ba5793de09ffc

  • SHA256

    d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1

  • SHA512

    05c6431a07aad1f276431d99beb4f4dd8e247bde96084cbe5ae0bce01ca262827e96a9187aec4d3dd41c08afde594d1bb98217dfe09718bb4eb3907e0f2bde2e

  • SSDEEP

    3072:bw0WMZYV7iTQbXAukRJtps7Fo/3e6Uege/EYpVPVZ:bw0xGVQGXAu2iQV9

Score
10/10

Malware Config

Extracted

Family

valleyrat_s2

Version

1.0

C2

43.225.58.178:6666

43.225.58.178:8888

43.225.58.178:7777

Attributes
  • campaign_date

    2025. 3.30

Signatures

  • ValleyRat

    ValleyRat stage2 is a backdoor written in C++.

  • Valleyrat_s2 family
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll,#1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\system32\rundll32.exe
      rundll32.exe
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2268-2-0x0000000000060000-0x0000000000061000-memory.dmp

    Filesize

    4KB

  • memory/2268-0-0x0000000000060000-0x0000000000061000-memory.dmp

    Filesize

    4KB

  • memory/2268-4-0x0000000001BA0000-0x0000000001C21000-memory.dmp

    Filesize

    516KB

  • memory/2268-3-0x0000000000440000-0x0000000000469000-memory.dmp

    Filesize

    164KB

  • memory/2268-6-0x0000000000440000-0x0000000000469000-memory.dmp

    Filesize

    164KB

  • memory/2268-5-0x0000000000440000-0x0000000000469000-memory.dmp

    Filesize

    164KB

  • memory/2268-8-0x0000000002310000-0x0000000002357000-memory.dmp

    Filesize

    284KB

  • memory/2268-7-0x0000000000440000-0x0000000000469000-memory.dmp

    Filesize

    164KB

  • memory/2268-10-0x00000000023E0000-0x000000000242E000-memory.dmp

    Filesize

    312KB

  • memory/2268-9-0x00000000023E0000-0x000000000242E000-memory.dmp

    Filesize

    312KB

  • memory/2268-11-0x00000000023E0000-0x000000000242E000-memory.dmp

    Filesize

    312KB

  • memory/2268-13-0x00000000023E0000-0x000000000242E000-memory.dmp

    Filesize

    312KB

  • memory/2268-12-0x00000000023E0000-0x000000000242E000-memory.dmp

    Filesize

    312KB

  • memory/2268-14-0x0000000000440000-0x0000000000469000-memory.dmp

    Filesize

    164KB

  • memory/2268-15-0x0000000000440000-0x0000000000469000-memory.dmp

    Filesize

    164KB

  • memory/2268-16-0x00000000023E0000-0x000000000242E000-memory.dmp

    Filesize

    312KB