Analysis

  • max time kernel
    124s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 11:22

General

  • Target

    c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll

  • Size

    2.0MB

  • MD5

    933e9c63811494279963276486c600a4

  • SHA1

    c22863176e2d68ea9a27963e2ed8aa706910616a

  • SHA256

    c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02

  • SHA512

    de8990be0a11f2be95ffbdeb8388259e6becc79bc6c9371df3b6cb3348ae07c4827edcc762a18e32af1e5cfde1ebf98f8711827b544bb802c1b2d94a902c8cc8

  • SSDEEP

    49152:UnmL3YxQBxRpQrLESwW0eCPR+G54lC4iaoV0Z2HCv5:w5wYCV4iaoV0U

Score
10/10

Malware Config

Signatures

  • Brute Ratel C4

    A customized command and control framework for red teaming and adversary simulation.

  • Bruteratel family
  • Detect BruteRatel badger 1 IoCs
  • Blocklisted process makes network request 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-10-0x0000000001FC0000-0x0000000001FFE000-memory.dmp

    Filesize

    248KB

  • memory/2172-1-0x00000000020C0000-0x000000000210C000-memory.dmp

    Filesize

    304KB

  • memory/2172-0-0x0000000001FC0000-0x0000000001FFE000-memory.dmp

    Filesize

    248KB

  • memory/2172-36-0x00000000020C0000-0x000000000210C000-memory.dmp

    Filesize

    304KB