Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 07:20
Static task
static1
Behavioral task
behavioral1
Sample
a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe
Resource
win10v2004-20250217-en
General
-
Target
a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe
-
Size
1.9MB
-
MD5
38acf2870c7eef9d7b5177d176f502ea
-
SHA1
1bd99cb83780fbbd947d831306c786dc72ff9bd4
-
SHA256
a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d
-
SHA512
702ab4d06b24480bed839fd47095f8168219b78022c38e98e1b307432a2c085518c4faeceddb2ee82e632ca623b0f600eebccc2fad8cb79cd0906b18d17a0da3
-
SSDEEP
24576:aa2pDZgkLKpVoXnfW2oNR1EKYSwOQ0Ta7Ocidk9SvToh9YxBtkcD/BSLLyTOXR15:aNq2gDEPXe
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 3 IoCs
resource yara_rule behavioral2/memory/3436-0-0x0000000002B10000-0x0000000002B47000-memory.dmp family_bruteratel behavioral2/files/0x00060000000006d7-12.dat family_bruteratel behavioral2/memory/1112-14-0x0000024062890000-0x00000240628C7000-memory.dmp family_bruteratel -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.exe Process not Found File created C:\Users\administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.exe Windows10Updater.exe -
Executes dropped EXE 1 IoCs
pid Process 1112 Windows10Updater.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Windows10Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Windows10Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Windows10Updater.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1140 a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe 1140 a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe 1140 a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe 1140 a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe 3436 Process not Found 3436 Process not Found 1112 Windows10Updater.exe 1112 Windows10Updater.exe 3436 Process not Found 3436 Process not Found 1112 Windows10Updater.exe 1112 Windows10Updater.exe 3436 Process not Found 3436 Process not Found 1112 Windows10Updater.exe 1112 Windows10Updater.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1140 a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3436 Process not Found 3436 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe"C:\Users\Admin\AppData\Local\Temp\a32e691b7f3886db30fcd3b805a11cad92092528049c2324452fab44aad1db0d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1140
-
\??\c:\windows\temp\Windows10Updater.exec:\windows\temp\Windows10Updater.exe1⤵
- Drops startup file
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1112
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD54ae2bd344630ae9537b0bc063c46248f
SHA1d44e2fd12d44db7af300b3cfa9ffbf786162ac35
SHA256acd2d168da5b804ac14feefc220e36c505ab4388e99a7a10f155c075f6335da9
SHA512598adaa7e5149dd90533b2c027f4a0d70c3019e8ca17b601d163ef0d6f587bd8588cfc0429f404fe02d6ac0eb4629babf5531bcee6c92beb48262d59250f5438
-
Filesize
234KB
MD5025bbd36f13584c04d9aec3d44ad6ed0
SHA19576645ea1feb8cd26dadac0484c65b385ab4509
SHA2565cbd91189460e3a1a9c3dea20b3dd0dff40dfb6d07575eb044b0627503a27698
SHA51247e40b5f767543ef37f7fdb005e8b9df6b1f59dc2e264e3dd43c012045ef0fa8ff919becba4785e73de05b42b06d2a84687eadad696e52c6af02c1cee0d5f132