Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 12:17

General

  • Target

    2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe

  • Size

    3.8MB

  • MD5

    220aae5d05fd2cc172ddb78e3b5a79d8

  • SHA1

    7f66e1d9d3bb81eb4df045ca7ece093ca166a595

  • SHA256

    2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245

  • SHA512

    3252348ade86c5913648c041ce58e438b7be7ca8b1554ba64f1024a4d9e126d19bb8a58536f5a4a1d0b2c93d472393f32336fac800c1b8b66a82bd274e0fc2c2

  • SSDEEP

    49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPl:WRk85ulG4XywJxFTsmBm

Malware Config

Extracted

Family

valleyrat_s2

Version

1.0

C2

154.219.97.191:6666

Attributes
  • campaign_date

    2025. 3.14

Signatures

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • ValleyRat

    ValleyRat stage2 is a backdoor written in C++.

  • Valleyrat_s2 family
  • Blocklisted process makes network request 64 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe
    "C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe
      "C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe" shouciyunxing
      2⤵
      • UAC bypass
      • Drops startup file
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1208
      • C:\Users\Public\oOZRFBy\qusdjcxzzsa.exe
        C:/Users/Public/oOZRFBy\qusdjcxzzsa.exe zhuruxitong
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3548
        • C:\Users\Public\oOZRFBy\qusdjcxzzsa.exe
          "C:\Users\Public\oOZRFBy\qusdjcxzzsa.exe" Kdiaoni
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1808
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Public\oOZRFBy\62310.cmd
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5724
            • C:\Windows\SysWOW64\mshta.exe
              mshta vbscript:createobject("shell.application").shellexecute("C:\Users\Public\oOZRFBy\62310.cmd","::","","runas",0)(window.close)
              6⤵
              • Checks computer location settings
              • Access Token Manipulation: Create Process with Token
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:5828
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Public\oOZRFBy\62310.cmd" ::
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4276
                • C:\Windows\SysWOW64\subst.exe
                  subst o: /d
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1272
                • C:\Windows\SysWOW64\reg.exe
                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  8⤵
                  • UAC bypass
                  • System Location Discovery: System Language Discovery
                  • Modifies registry key
                  PID:5636
                • C:\Windows\SysWOW64\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\DOS Devices" /v O: /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:64
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                  8⤵
                  • Modifies Windows Defender DisableAntiSpyware settings
                  • System Location Discovery: System Language Discovery
                  PID:1884
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            PID:5672
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            PID:428
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            PID:2000
          • C:\Users\Public\oOZRFBy\asdccx.exe
            C:\Users\Public\oOZRFBy\asdccx.exe
            5⤵
            • Executes dropped EXE
            PID:2024
          • C:\Users\Public\oOZRFBy\asdccx.exe
            C:\Users\Public\oOZRFBy\asdccx.exe
            5⤵
            • Executes dropped EXE
            PID:5388
          • C:\Users\Public\oOZRFBy\asdccx.exe
            C:\Users\Public\oOZRFBy\asdccx.exe
            5⤵
            • Executes dropped EXE
            PID:3248
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 1412
      2⤵
      • Program crash
      PID:5000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 212 -ip 212
    1⤵
      PID:116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\oOZRFBy\62310.cmd

      Filesize

      527B

      MD5

      34ac662d5343e07bcb06d373e737252f

      SHA1

      d304ebfd043c4eb09f7c193c3562f94590221211

      SHA256

      777690549389083ce6807b077ee3bb5410cc1a6f0ee73e6afa7d424471ceb173

      SHA512

      60e71ead901bd0fb8cc856ba6a09b2e8dda0eca583e40d44fee9ecb632872054d0b7571a315f990915b52b5fc399bce67e0f2b8468210faef3516f399a0ee80e

    • C:\Users\Public\oOZRFBy\asdccx.exe

      Filesize

      231KB

      MD5

      d0fce3afa6aa1d58ce9fa336cc2b675b

      SHA1

      4048488de6ba4bfef9edf103755519f1f762668f

      SHA256

      4d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22

      SHA512

      80e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2

    • C:\Users\Public\oOZRFBy\asvv.txt

      Filesize

      108KB

      MD5

      d442c9efaf31a91319116ef17e0022e7

      SHA1

      2809f71775ac044c9e50cf24e2ce1ff3bd16e576

      SHA256

      5662b6f42fcf97143d252c0f43b2d345a53866f0fe737115ecc99ccfc4370eeb

      SHA512

      6ad96ab748b31109661357b9dfc0b5c53e6bab6d8c0ca90273d07c438933bf65a5d81b1257774f104c485ac22c50da4832e509f63b107da6055aa31a509f9eae

    • memory/428-91-0x0000000000420000-0x0000000000442000-memory.dmp

      Filesize

      136KB

    • memory/428-86-0x0000000000420000-0x0000000000442000-memory.dmp

      Filesize

      136KB

    • memory/428-79-0x0000000000420000-0x0000000000442000-memory.dmp

      Filesize

      136KB

    • memory/428-78-0x0000000000420000-0x0000000000442000-memory.dmp

      Filesize

      136KB

    • memory/428-37-0x0000000000420000-0x0000000000442000-memory.dmp

      Filesize

      136KB

    • memory/428-50-0x0000000000420000-0x0000000000442000-memory.dmp

      Filesize

      136KB

    • memory/428-51-0x0000000000420000-0x0000000000442000-memory.dmp

      Filesize

      136KB

    • memory/2000-48-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2000-82-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2000-87-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2000-88-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2000-75-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2000-74-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2000-49-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2024-53-0x0000000000900000-0x00000000009FC000-memory.dmp

      Filesize

      1008KB

    • memory/2024-56-0x0000000000900000-0x00000000009FC000-memory.dmp

      Filesize

      1008KB

    • memory/2024-55-0x0000000000900000-0x00000000009FC000-memory.dmp

      Filesize

      1008KB

    • memory/2024-54-0x0000000000900000-0x00000000009FC000-memory.dmp

      Filesize

      1008KB

    • memory/5672-77-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-76-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-27-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-22-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-23-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-21-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-84-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-24-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-30-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-41-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-89-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-90-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB

    • memory/5672-20-0x0000000000610000-0x0000000000632000-memory.dmp

      Filesize

      136KB