Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll
Resource
win10v2004-20250314-en
General
-
Target
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll
-
Size
107KB
-
MD5
3198b729513bf5a65e39be989298079b
-
SHA1
a79a312a5c8884ec4b51aa4d776ba5793de09ffc
-
SHA256
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1
-
SHA512
05c6431a07aad1f276431d99beb4f4dd8e247bde96084cbe5ae0bce01ca262827e96a9187aec4d3dd41c08afde594d1bb98217dfe09718bb4eb3907e0f2bde2e
-
SSDEEP
3072:bw0WMZYV7iTQbXAukRJtps7Fo/3e6Uege/EYpVPVZ:bw0xGVQGXAu2iQV9
Malware Config
Extracted
valleyrat_s2
1.0
43.225.58.178:6666
43.225.58.178:8888
43.225.58.178:7777
-
campaign_date
2025. 3.30
Signatures
-
ValleyRat
ValleyRat stage2 is a backdoor written in C++.
-
Valleyrat_s2 family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 1 3676 rundll32.exe 29 3676 rundll32.exe 30 3676 rundll32.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\J: rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3200 set thread context of 3676 3200 rundll32.exe 87 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3676 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3200 wrote to memory of 3676 3200 rundll32.exe 87 PID 3200 wrote to memory of 3676 3200 rundll32.exe 87 PID 3200 wrote to memory of 3676 3200 rundll32.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\system32\rundll32.exerundll32.exe2⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3676
-