Analysis
-
max time kernel
163s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 22:10
Behavioral task
behavioral1
Sample
54b68742a9e0b9704dce48b77f4aef94.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
54b68742a9e0b9704dce48b77f4aef94.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
54b68742a9e0b9704dce48b77f4aef94.exe
-
Size
3.9MB
-
MD5
54b68742a9e0b9704dce48b77f4aef94
-
SHA1
fd8d4a50adf32ac1ea43c546ca298255937a8c30
-
SHA256
bf8f2a84e39dbb6ad8905bb8e6d8650c602c95231c3e6b592c2d27d00fa6dded
-
SHA512
10f374198f2071969f53f5ea14963ab309ac370ad2c19bdeead83e551696408dc6949ba624203e0c984d88212914813af4dc6bbcd42acaf8df1bea203928fb2b
-
SSDEEP
24576:VRVOLJ0yUiRvb5aeiuLqShpsbM2bYSO/trD28:VtEb4a+a
Score
10/10
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dark = "C:\\Windows\\krn2.exe" 54b68742a9e0b9704dce48b77f4aef94.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\code\ID 54b68742a9e0b9704dce48b77f4aef94.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3436 54b68742a9e0b9704dce48b77f4aef94.exe 3436 54b68742a9e0b9704dce48b77f4aef94.exe