Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/09/2022, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
4b48773aca579ec261eec75a86292e0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b48773aca579ec261eec75a86292e0e.exe
Resource
win10v2004-20220901-en
General
-
Target
4b48773aca579ec261eec75a86292e0e.exe
-
Size
158KB
-
MD5
4b48773aca579ec261eec75a86292e0e
-
SHA1
efd054d02335da2bc2bf494ce8c0e8f67345d03b
-
SHA256
60fbfae93eb2f1aedf9f77ea6ee2d46b1f2b050ac3460219a525531c39890630
-
SHA512
c5c83d40024b808c619d4a0f0e44f5579a9cb87d9bc5559c7e64ed2faceccce2300b20c80edaa613fa870777311872557f712036f461516db7d84d43898cd664
-
SSDEEP
3072:/DLeUFzL1a1G4irMnO41dtHkU3yVIuCehX1eBALfC10M4RD/:S1uwnO41dKpLCkeBoC10ME
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1692 runtimebrokerok.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1464 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\de768b3dcc60e38e0333dbc9cad3fd59.exe runtimebrokerok.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\de768b3dcc60e38e0333dbc9cad3fd59.exe runtimebrokerok.exe -
Loads dropped DLL 1 IoCs
pid Process 1812 4b48773aca579ec261eec75a86292e0e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\de768b3dcc60e38e0333dbc9cad3fd59 = "\"C:\\Users\\Admin\\AppData\\Roaming\\runtimebrokerok.exe\" .." runtimebrokerok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\de768b3dcc60e38e0333dbc9cad3fd59 = "\"C:\\Users\\Admin\\AppData\\Roaming\\runtimebrokerok.exe\" .." runtimebrokerok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe Token: 33 1692 runtimebrokerok.exe Token: SeIncBasePriorityPrivilege 1692 runtimebrokerok.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1692 1812 4b48773aca579ec261eec75a86292e0e.exe 28 PID 1812 wrote to memory of 1692 1812 4b48773aca579ec261eec75a86292e0e.exe 28 PID 1812 wrote to memory of 1692 1812 4b48773aca579ec261eec75a86292e0e.exe 28 PID 1812 wrote to memory of 1692 1812 4b48773aca579ec261eec75a86292e0e.exe 28 PID 1692 wrote to memory of 1464 1692 runtimebrokerok.exe 29 PID 1692 wrote to memory of 1464 1692 runtimebrokerok.exe 29 PID 1692 wrote to memory of 1464 1692 runtimebrokerok.exe 29 PID 1692 wrote to memory of 1464 1692 runtimebrokerok.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b48773aca579ec261eec75a86292e0e.exe"C:\Users\Admin\AppData\Local\Temp\4b48773aca579ec261eec75a86292e0e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Roaming\runtimebrokerok.exe"C:\Users\Admin\AppData\Roaming\runtimebrokerok.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\runtimebrokerok.exe" "runtimebrokerok.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1464
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD54b48773aca579ec261eec75a86292e0e
SHA1efd054d02335da2bc2bf494ce8c0e8f67345d03b
SHA25660fbfae93eb2f1aedf9f77ea6ee2d46b1f2b050ac3460219a525531c39890630
SHA512c5c83d40024b808c619d4a0f0e44f5579a9cb87d9bc5559c7e64ed2faceccce2300b20c80edaa613fa870777311872557f712036f461516db7d84d43898cd664
-
Filesize
158KB
MD54b48773aca579ec261eec75a86292e0e
SHA1efd054d02335da2bc2bf494ce8c0e8f67345d03b
SHA25660fbfae93eb2f1aedf9f77ea6ee2d46b1f2b050ac3460219a525531c39890630
SHA512c5c83d40024b808c619d4a0f0e44f5579a9cb87d9bc5559c7e64ed2faceccce2300b20c80edaa613fa870777311872557f712036f461516db7d84d43898cd664
-
Filesize
158KB
MD54b48773aca579ec261eec75a86292e0e
SHA1efd054d02335da2bc2bf494ce8c0e8f67345d03b
SHA25660fbfae93eb2f1aedf9f77ea6ee2d46b1f2b050ac3460219a525531c39890630
SHA512c5c83d40024b808c619d4a0f0e44f5579a9cb87d9bc5559c7e64ed2faceccce2300b20c80edaa613fa870777311872557f712036f461516db7d84d43898cd664