Analysis

  • max time kernel
    1191s
  • max time network
    1195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • submitted
    27-06-2024 14:59

General

  • Target

    Form_Ver-16-46-33.js

  • Size

    572KB

  • MD5

    b1da07a445bfdf809306f5fe74e54d67

  • SHA1

    3cec038e474050c290bdf4e670a36f482032ed68

  • SHA256

    9003415cc22d4e8b3c444ffcf84bb3f1c3a294d40d1f66329733edfc8472a7d2

  • SHA512

    728b321b98f45fc6cd1395ee5a34c1ee06ca17800c35ec1ee7f19ac3219aa8fc805140e6d0ecc25a638f8c815db541380d0651df2ff448121477ed3445bd6637

  • SSDEEP

    6144:kMuyrXL4P/YsoZR3U52fYiGnh2xFpMp4/KJHaWTyFIXgBoEKnDmmzPvKYUNul8D7:kM/74PPitCt4XGlgJ5+Dk

Malware Config

Signatures

  • Brute Ratel C4

    A customized command and control framework for red teaming and adversary simulation.

  • Bruteratel family
  • Detect BruteRatel badger 3 IoCs
  • Blocklisted process makes network request 34 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Form_Ver-16-46-33.js
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:3772
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding FE00A794DF7D7220E55D9DF92803B4D4
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1948
    • C:\Windows\Installer\MSI771A.tmp
      "C:\Windows\Installer\MSI771A.tmp" C:/Windows/System32/rundll32.exe C:\Users\Admin\AppData\Roaming\capisp.dll, remi
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4616
  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\capisp.dll, remi
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\capisp.dll

    Filesize

    1.2MB

    MD5

    70b599f67e97cb878ca7be88e069a82d

    SHA1

    768f8a179fee1f13505c7b772e543b19b29b14c8

    SHA256

    9b7bdb4cb71e84c5cff0923928bf7777a41cb5e0691810ae948304c151c0c1c5

    SHA512

    163c8e0b2676a27f1781e9fdec3c9994ba828c0085b9fdff9df4dd0112da122a5d7f6ca597af396f99c2afadbe438e1ab967dfba34451ee4ba3c59cd244b4985

  • C:\Windows\Installer\MSI5FC3.tmp

    Filesize

    1.8MB

    MD5

    3645512add0c8cb24a88d2ffe3fe7620

    SHA1

    66dbfe6ffc1918f51b28af1abf55df0d1beaefe6

    SHA256

    d71bfab9cca5df6a28e12ba51fe5eaf0f9151514b3fd363264513347a8c5cf3a

    SHA512

    85151258ccb3b590716aed87c4a6a24ba74931aab0b378e279d9ab510fce94dfd26632d8ba44975e8136b1a9cc6c190e64c8b223f5f5e4f5b9cb3c6fb4a9429c

  • C:\Windows\Installer\MSI7485.tmp

    Filesize

    436KB

    MD5

    475d20c0ea477a35660e3f67ecf0a1df

    SHA1

    67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

    SHA256

    426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

    SHA512

    99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

  • C:\Windows\Installer\MSI771A.tmp

    Filesize

    389KB

    MD5

    b9545ed17695a32face8c3408a6a3553

    SHA1

    f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83

    SHA256

    1e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a

    SHA512

    f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04

  • memory/2256-47-0x000000033A710000-0x000000033A75A000-memory.dmp

    Filesize

    296KB

  • memory/2256-46-0x000000033A710000-0x000000033A75A000-memory.dmp

    Filesize

    296KB

  • memory/2256-48-0x000001F240E60000-0x000001F240EAC000-memory.dmp

    Filesize

    304KB

  • memory/2256-57-0x000000033A710000-0x000000033A75A000-memory.dmp

    Filesize

    296KB

  • memory/2256-64-0x000001F240E60000-0x000001F240EAC000-memory.dmp

    Filesize

    304KB

  • memory/2256-65-0x0000000180000000-0x000000018013A000-memory.dmp

    Filesize

    1.2MB