Analysis
-
max time kernel
273s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
mw_ArPotEx64.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mw_ArPotEx64.dll
Resource
win10v2004-20241007-en
General
-
Target
mw_ArPotEx64.dll
-
Size
724KB
-
MD5
12d56ac4ed9cadb4f6f54c7bd7fdfeb6
-
SHA1
c3439bcb0ee6d1bda33ef15a3d1d040c331e77d5
-
SHA256
c6c697d658dd221f27a8d58e79a478646877ac6afcf0cbe2ce919862f3889c6b
-
SHA512
1a6737f4977b2a0e94498edda635cb09d1ea63ee0072fedec16f1227d99d602298e60d091fd958494b4a6b7730f8c11c670c1164ac57a8c7e7aeb98deb3390b0
-
SSDEEP
12288:+h/M5nsxW5fFcrGn7Q21Svj07MGpmeSM6C4LWYv1AoMVPPynuJskZVjSKUCWnkoD:+rr+VPPnJs3KUCWkC3r
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
resource yara_rule behavioral2/memory/3996-1-0x000001B004E90000-0x000001B004ECE000-memory.dmp family_bruteratel -
Blocklisted process makes network request 10 IoCs
flow pid Process 26 3996 rundll32.exe 27 3996 rundll32.exe 48 3996 rundll32.exe 49 3996 rundll32.exe 79 3996 rundll32.exe 80 3996 rundll32.exe 92 3996 rundll32.exe 107 3996 rundll32.exe 108 3996 rundll32.exe 110 3996 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe 3996 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3996 2020 rundll32.exe 84 PID 2020 wrote to memory of 3996 2020 rundll32.exe 84
Processes
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\mw_ArPotEx64.dll,AXA1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\mw_ArPotEx64.dll,AXA2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3996
-