Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe
Resource
win10v2004-20250314-en
General
-
Target
2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe
-
Size
3.8MB
-
MD5
220aae5d05fd2cc172ddb78e3b5a79d8
-
SHA1
7f66e1d9d3bb81eb4df045ca7ece093ca166a595
-
SHA256
2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245
-
SHA512
3252348ade86c5913648c041ce58e438b7be7ca8b1554ba64f1024a4d9e126d19bb8a58536f5a4a1d0b2c93d472393f32336fac800c1b8b66a82bd274e0fc2c2
-
SSDEEP
49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPl:WRk85ulG4XywJxFTsmBm
Malware Config
Extracted
valleyrat_s2
1.0
154.219.97.191:6666
-
campaign_date
2025. 3.14
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
ValleyRat
ValleyRat stage2 is a backdoor written in C++.
-
Valleyrat_s2 family
-
Blocklisted process makes network request 64 IoCs
flow pid Process 26 5672 cmd.exe 27 2000 cmd.exe 28 428 cmd.exe 30 2000 cmd.exe 31 428 cmd.exe 32 5672 cmd.exe 33 2000 cmd.exe 34 5672 cmd.exe 35 428 cmd.exe 38 2000 cmd.exe 39 5672 cmd.exe 40 428 cmd.exe 43 2000 cmd.exe 45 5672 cmd.exe 46 428 cmd.exe 47 2000 cmd.exe 48 5672 cmd.exe 49 428 cmd.exe 50 5672 cmd.exe 51 2000 cmd.exe 52 428 cmd.exe 53 5672 cmd.exe 54 2000 cmd.exe 55 428 cmd.exe 56 5672 cmd.exe 57 2000 cmd.exe 58 428 cmd.exe 59 5672 cmd.exe 60 2000 cmd.exe 61 428 cmd.exe 62 5672 cmd.exe 63 2000 cmd.exe 64 428 cmd.exe 65 5672 cmd.exe 66 2000 cmd.exe 67 428 cmd.exe 68 5672 cmd.exe 69 2000 cmd.exe 70 428 cmd.exe 71 2000 cmd.exe 72 5672 cmd.exe 73 428 cmd.exe 74 5672 cmd.exe 75 2000 cmd.exe 76 428 cmd.exe 77 5672 cmd.exe 78 2000 cmd.exe 79 428 cmd.exe 80 2000 cmd.exe 81 5672 cmd.exe 82 428 cmd.exe 85 5672 cmd.exe 86 2000 cmd.exe 87 428 cmd.exe 94 5672 cmd.exe 95 2000 cmd.exe 98 428 cmd.exe 101 5672 cmd.exe 102 2000 cmd.exe 103 428 cmd.exe 104 5672 cmd.exe 105 2000 cmd.exe 106 428 cmd.exe 111 5672 cmd.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation qusdjcxzzsa.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neOTrcr.lnk 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe -
Executes dropped EXE 5 IoCs
pid Process 3548 qusdjcxzzsa.exe 1808 qusdjcxzzsa.exe 2024 asdccx.exe 5388 asdccx.exe 3248 asdccx.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1808 set thread context of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 set thread context of 428 1808 qusdjcxzzsa.exe 103 PID 1808 set thread context of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 set thread context of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 set thread context of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 set thread context of 3248 1808 qusdjcxzzsa.exe 108 -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 5828 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5000 212 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language subst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qusdjcxzzsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qusdjcxzzsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings mshta.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5636 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 1808 qusdjcxzzsa.exe 1808 qusdjcxzzsa.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 212 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 212 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 212 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 3548 qusdjcxzzsa.exe 3548 qusdjcxzzsa.exe 3548 qusdjcxzzsa.exe 1808 qusdjcxzzsa.exe 1808 qusdjcxzzsa.exe 1808 qusdjcxzzsa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 1208 212 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 87 PID 212 wrote to memory of 1208 212 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 87 PID 212 wrote to memory of 1208 212 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 87 PID 1208 wrote to memory of 3548 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 98 PID 1208 wrote to memory of 3548 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 98 PID 1208 wrote to memory of 3548 1208 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 98 PID 3548 wrote to memory of 1808 3548 qusdjcxzzsa.exe 100 PID 3548 wrote to memory of 1808 3548 qusdjcxzzsa.exe 100 PID 3548 wrote to memory of 1808 3548 qusdjcxzzsa.exe 100 PID 1808 wrote to memory of 5724 1808 qusdjcxzzsa.exe 101 PID 1808 wrote to memory of 5724 1808 qusdjcxzzsa.exe 101 PID 1808 wrote to memory of 5724 1808 qusdjcxzzsa.exe 101 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 5672 1808 qusdjcxzzsa.exe 102 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 428 1808 qusdjcxzzsa.exe 103 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2000 1808 qusdjcxzzsa.exe 105 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 2024 1808 qusdjcxzzsa.exe 106 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 5388 1808 qusdjcxzzsa.exe 107 PID 1808 wrote to memory of 3248 1808 qusdjcxzzsa.exe 108 PID 1808 wrote to memory of 3248 1808 qusdjcxzzsa.exe 108 PID 1808 wrote to memory of 3248 1808 qusdjcxzzsa.exe 108 PID 1808 wrote to memory of 3248 1808 qusdjcxzzsa.exe 108 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe"C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe"C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe" shouciyunxing2⤵
- UAC bypass
- Drops startup file
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1208 -
C:\Users\Public\oOZRFBy\qusdjcxzzsa.exeC:/Users/Public/oOZRFBy\qusdjcxzzsa.exe zhuruxitong3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Public\oOZRFBy\qusdjcxzzsa.exe"C:\Users\Public\oOZRFBy\qusdjcxzzsa.exe" Kdiaoni4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\oOZRFBy\62310.cmd5⤵
- System Location Discovery: System Language Discovery
PID:5724 -
C:\Windows\SysWOW64\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Public\oOZRFBy\62310.cmd","::","","runas",0)(window.close)6⤵
- Checks computer location settings
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Public\oOZRFBy\62310.cmd" ::7⤵
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Windows\SysWOW64\subst.exesubst o: /d8⤵
- System Location Discovery: System Language Discovery
PID:1272
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5636
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\DOS Devices" /v O: /f8⤵
- System Location Discovery: System Language Discovery
PID:64
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f8⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:1884
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Users\Public\oOZRFBy\asdccx.exeC:\Users\Public\oOZRFBy\asdccx.exe5⤵
- Executes dropped EXE
PID:2024
-
-
C:\Users\Public\oOZRFBy\asdccx.exeC:\Users\Public\oOZRFBy\asdccx.exe5⤵
- Executes dropped EXE
PID:5388
-
-
C:\Users\Public\oOZRFBy\asdccx.exeC:\Users\Public\oOZRFBy\asdccx.exe5⤵
- Executes dropped EXE
PID:3248
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 14122⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 212 -ip 2121⤵PID:116
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
527B
MD534ac662d5343e07bcb06d373e737252f
SHA1d304ebfd043c4eb09f7c193c3562f94590221211
SHA256777690549389083ce6807b077ee3bb5410cc1a6f0ee73e6afa7d424471ceb173
SHA51260e71ead901bd0fb8cc856ba6a09b2e8dda0eca583e40d44fee9ecb632872054d0b7571a315f990915b52b5fc399bce67e0f2b8468210faef3516f399a0ee80e
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
108KB
MD5d442c9efaf31a91319116ef17e0022e7
SHA12809f71775ac044c9e50cf24e2ce1ff3bd16e576
SHA2565662b6f42fcf97143d252c0f43b2d345a53866f0fe737115ecc99ccfc4370eeb
SHA5126ad96ab748b31109661357b9dfc0b5c53e6bab6d8c0ca90273d07c438933bf65a5d81b1257774f104c485ac22c50da4832e509f63b107da6055aa31a509f9eae