Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 12:21

General

  • Target

    c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll

  • Size

    2.0MB

  • MD5

    933e9c63811494279963276486c600a4

  • SHA1

    c22863176e2d68ea9a27963e2ed8aa706910616a

  • SHA256

    c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02

  • SHA512

    de8990be0a11f2be95ffbdeb8388259e6becc79bc6c9371df3b6cb3348ae07c4827edcc762a18e32af1e5cfde1ebf98f8711827b544bb802c1b2d94a902c8cc8

  • SSDEEP

    49152:UnmL3YxQBxRpQrLESwW0eCPR+G54lC4iaoV0Z2HCv5:w5wYCV4iaoV0U

Score
10/10

Malware Config

Signatures

  • Brute Ratel C4

    A customized command and control framework for red teaming and adversary simulation.

  • Bruteratel family
  • Detect BruteRatel badger 1 IoCs
  • Blocklisted process makes network request 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    PID:4112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4112-0-0x000001C5BD910000-0x000001C5BD94E000-memory.dmp

    Filesize

    248KB

  • memory/4112-3-0x000001C5BD950000-0x000001C5BD99C000-memory.dmp

    Filesize

    304KB

  • memory/4112-1-0x000001C5BD910000-0x000001C5BD94E000-memory.dmp

    Filesize

    248KB

  • memory/4112-29-0x000001C5BD950000-0x000001C5BD99C000-memory.dmp

    Filesize

    304KB