Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2025, 14:31

General

  • Target

    2025-04-03_220aae5d05fd2cc172ddb78e3b5a79d8_hijackloader_icedid.exe

  • Size

    3.8MB

  • MD5

    220aae5d05fd2cc172ddb78e3b5a79d8

  • SHA1

    7f66e1d9d3bb81eb4df045ca7ece093ca166a595

  • SHA256

    2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245

  • SHA512

    3252348ade86c5913648c041ce58e438b7be7ca8b1554ba64f1024a4d9e126d19bb8a58536f5a4a1d0b2c93d472393f32336fac800c1b8b66a82bd274e0fc2c2

  • SSDEEP

    49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPl:WRk85ulG4XywJxFTsmBm

Malware Config

Extracted

Family

valleyrat_s2

Version

1.0

C2

154.219.97.191:6666

Attributes
  • campaign_date

    2025. 3.14

Signatures

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • ValleyRat

    ValleyRat stage2 is a backdoor written in C++.

  • Valleyrat_s2 family
  • Blocklisted process makes network request 6 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 6 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-03_220aae5d05fd2cc172ddb78e3b5a79d8_hijackloader_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-03_220aae5d05fd2cc172ddb78e3b5a79d8_hijackloader_icedid.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\2025-04-03_220aae5d05fd2cc172ddb78e3b5a79d8_hijackloader_icedid.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-04-03_220aae5d05fd2cc172ddb78e3b5a79d8_hijackloader_icedid.exe" shouciyunxing
      2⤵
      • UAC bypass
      • Drops startup file
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:5988
      • C:\Users\Public\OQieGYp\qusdjcxzzsa.exe
        C:/Users/Public/OQieGYp\qusdjcxzzsa.exe zhuruxitong
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4184
        • C:\Users\Public\OQieGYp\qusdjcxzzsa.exe
          "C:\Users\Public\OQieGYp\qusdjcxzzsa.exe" Kdiaoni
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5856
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Public\OQieGYp\62310.cmd
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5276
            • C:\Windows\SysWOW64\mshta.exe
              mshta vbscript:createobject("shell.application").shellexecute("C:\Users\Public\OQieGYp\62310.cmd","::","","runas",0)(window.close)
              6⤵
              • Checks computer location settings
              • Access Token Manipulation: Create Process with Token
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:1776
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Public\OQieGYp\62310.cmd" ::
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3096
                • C:\Windows\SysWOW64\subst.exe
                  subst o: /d
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2156
                • C:\Windows\SysWOW64\reg.exe
                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  8⤵
                  • UAC bypass
                  • System Location Discovery: System Language Discovery
                  • Modifies registry key
                  PID:5228
                • C:\Windows\SysWOW64\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\DOS Devices" /v O: /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4092
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                  8⤵
                  • Modifies Windows Defender DisableAntiSpyware settings
                  • System Location Discovery: System Language Discovery
                  PID:2948
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • Enumerates connected drives
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2128
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • Enumerates connected drives
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:744
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • Enumerates connected drives
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1288
          • C:\Users\Public\OQieGYp\asdccx.exe
            C:\Users\Public\OQieGYp\asdccx.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:540
          • C:\Users\Public\OQieGYp\asdccx.exe
            C:\Users\Public\OQieGYp\asdccx.exe
            5⤵
            • Executes dropped EXE
            PID:1464
          • C:\Users\Public\OQieGYp\asdccx.exe
            C:\Users\Public\OQieGYp\asdccx.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 1412
      2⤵
      • Program crash
      PID:5108
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1020 -ip 1020
    1⤵
      PID:4924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\OQieGYp\62310.cmd

      Filesize

      527B

      MD5

      34ac662d5343e07bcb06d373e737252f

      SHA1

      d304ebfd043c4eb09f7c193c3562f94590221211

      SHA256

      777690549389083ce6807b077ee3bb5410cc1a6f0ee73e6afa7d424471ceb173

      SHA512

      60e71ead901bd0fb8cc856ba6a09b2e8dda0eca583e40d44fee9ecb632872054d0b7571a315f990915b52b5fc399bce67e0f2b8468210faef3516f399a0ee80e

    • C:\Users\Public\OQieGYp\asdccx.exe

      Filesize

      231KB

      MD5

      d0fce3afa6aa1d58ce9fa336cc2b675b

      SHA1

      4048488de6ba4bfef9edf103755519f1f762668f

      SHA256

      4d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22

      SHA512

      80e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2

    • C:\Users\Public\OQieGYp\asvv.txt

      Filesize

      108KB

      MD5

      d442c9efaf31a91319116ef17e0022e7

      SHA1

      2809f71775ac044c9e50cf24e2ce1ff3bd16e576

      SHA256

      5662b6f42fcf97143d252c0f43b2d345a53866f0fe737115ecc99ccfc4370eeb

      SHA512

      6ad96ab748b31109661357b9dfc0b5c53e6bab6d8c0ca90273d07c438933bf65a5d81b1257774f104c485ac22c50da4832e509f63b107da6055aa31a509f9eae

    • memory/540-63-0x0000000000400000-0x00000000004FC000-memory.dmp

      Filesize

      1008KB

    • memory/540-49-0x0000000000400000-0x00000000004FC000-memory.dmp

      Filesize

      1008KB

    • memory/540-50-0x0000000000400000-0x00000000004FC000-memory.dmp

      Filesize

      1008KB

    • memory/540-52-0x0000000000400000-0x00000000004FC000-memory.dmp

      Filesize

      1008KB

    • memory/540-51-0x0000000000400000-0x00000000004FC000-memory.dmp

      Filesize

      1008KB

    • memory/744-80-0x0000000002910000-0x0000000002948000-memory.dmp

      Filesize

      224KB

    • memory/744-89-0x0000000002910000-0x0000000002948000-memory.dmp

      Filesize

      224KB

    • memory/744-39-0x00000000001B0000-0x00000000001D2000-memory.dmp

      Filesize

      136KB

    • memory/744-79-0x00000000001B0000-0x00000000001D2000-memory.dmp

      Filesize

      136KB

    • memory/744-85-0x0000000002910000-0x0000000002948000-memory.dmp

      Filesize

      224KB

    • memory/744-38-0x00000000001B0000-0x00000000001D2000-memory.dmp

      Filesize

      136KB

    • memory/744-75-0x00000000001B0000-0x00000000001D2000-memory.dmp

      Filesize

      136KB

    • memory/744-33-0x00000000001B0000-0x00000000001D2000-memory.dmp

      Filesize

      136KB

    • memory/744-74-0x00000000001B0000-0x00000000001D2000-memory.dmp

      Filesize

      136KB

    • memory/744-88-0x0000000002910000-0x0000000002948000-memory.dmp

      Filesize

      224KB

    • memory/1288-81-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1288-86-0x0000000003480000-0x00000000034B8000-memory.dmp

      Filesize

      224KB

    • memory/1288-73-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1288-72-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1288-47-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1288-90-0x0000000003480000-0x00000000034B8000-memory.dmp

      Filesize

      224KB

    • memory/1288-46-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1288-82-0x0000000003480000-0x00000000034B8000-memory.dmp

      Filesize

      224KB

    • memory/1288-91-0x0000000003480000-0x00000000034B8000-memory.dmp

      Filesize

      224KB

    • memory/2128-32-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-24-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-76-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-83-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-84-0x0000000002C40000-0x0000000002C78000-memory.dmp

      Filesize

      224KB

    • memory/2128-77-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-20-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-87-0x0000000002C40000-0x0000000002C78000-memory.dmp

      Filesize

      224KB

    • memory/2128-21-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-22-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-37-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2128-23-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB