Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-06-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe
Resource
win10v2004-20230220-en
General
-
Target
868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe
-
Size
180KB
-
MD5
4f333b5a74e464d8fd46fe49bedc760e
-
SHA1
110588bfa2559e700564af03db5cf851be5ac3d3
-
SHA256
868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d
-
SHA512
5ea9dbfae7dcf16f38aa0b064dd51cb7f6d398d5bb38b0877e9c7bf6b676151c01828c030d9d2f03707366651a66a3df39985aea43528baea55e79e83f784baf
-
SSDEEP
3072:AK3fycY2pTpIb42etB/RpH5pXZOaXqmmgDXnkUrsK0GEx4FvPA+LjpgKab8iPt9G:9r9GE7PH3XZ84kUuVxG7Hpg3f9dO+
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:5505
Runtime Broker.exe
-
reg_key
Runtime Broker.exe
-
splitter
|Ghost|
Signatures
-
Drops startup file 3 IoCs
Processes:
Runtime Broker.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe Runtime Broker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe Runtime Broker.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.url Runtime Broker.exe -
Executes dropped EXE 1 IoCs
Processes:
Runtime Broker.exepid process 1472 Runtime Broker.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Runtime Broker.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\Runtime Broker.exe = "\"C:\\ProgramData\\Runtime Broker.exe\" .." Runtime Broker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Runtime Broker.exe = "\"C:\\ProgramData\\Runtime Broker.exe\" .." Runtime Broker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 1 IoCs
Processes:
868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exedescription ioc process File created C:\windows\system32\vgga71.exe 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 4 IoCs
Processes:
TASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exepid process 1860 TASKKILL.exe 1396 TASKKILL.exe 316 TASKKILL.exe 900 TASKKILL.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exeRuntime Broker.exepid process 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe 1472 Runtime Broker.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exeTASKKILL.exeTASKKILL.exeRuntime Broker.exeTASKKILL.exeTASKKILL.exedescription pid process Token: SeDebugPrivilege 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe Token: SeDebugPrivilege 1860 TASKKILL.exe Token: SeDebugPrivilege 1396 TASKKILL.exe Token: SeDebugPrivilege 1472 Runtime Broker.exe Token: SeDebugPrivilege 316 TASKKILL.exe Token: SeDebugPrivilege 900 TASKKILL.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe Token: 33 1472 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1472 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exeRuntime Broker.execmd.exedescription pid process target process PID 1852 wrote to memory of 1860 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe TASKKILL.exe PID 1852 wrote to memory of 1860 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe TASKKILL.exe PID 1852 wrote to memory of 1860 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe TASKKILL.exe PID 1852 wrote to memory of 1396 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe TASKKILL.exe PID 1852 wrote to memory of 1396 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe TASKKILL.exe PID 1852 wrote to memory of 1396 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe TASKKILL.exe PID 1852 wrote to memory of 1472 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe Runtime Broker.exe PID 1852 wrote to memory of 1472 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe Runtime Broker.exe PID 1852 wrote to memory of 1472 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe Runtime Broker.exe PID 1852 wrote to memory of 1712 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe cmd.exe PID 1852 wrote to memory of 1712 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe cmd.exe PID 1852 wrote to memory of 1712 1852 868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe cmd.exe PID 1472 wrote to memory of 316 1472 Runtime Broker.exe TASKKILL.exe PID 1472 wrote to memory of 316 1472 Runtime Broker.exe TASKKILL.exe PID 1472 wrote to memory of 316 1472 Runtime Broker.exe TASKKILL.exe PID 1472 wrote to memory of 900 1472 Runtime Broker.exe TASKKILL.exe PID 1472 wrote to memory of 900 1472 Runtime Broker.exe TASKKILL.exe PID 1472 wrote to memory of 900 1472 Runtime Broker.exe TASKKILL.exe PID 1712 wrote to memory of 980 1712 cmd.exe choice.exe PID 1712 wrote to memory of 980 1712 cmd.exe choice.exe PID 1712 wrote to memory of 980 1712 cmd.exe choice.exe PID 1472 wrote to memory of 1672 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1672 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1672 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1524 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1524 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1524 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 796 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 796 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 796 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1592 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1592 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1592 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1584 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1584 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1584 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1796 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1796 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1796 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1300 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1300 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1300 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1860 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1860 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1860 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 2036 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 2036 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 2036 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1664 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1664 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1664 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1152 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1152 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1152 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1528 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1528 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1528 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1548 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1548 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1548 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 680 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 680 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 680 1472 Runtime Broker.exe attrib.exe PID 1472 wrote to memory of 1668 1472 Runtime Broker.exe attrib.exe -
Views/modifies file attributes 1 TTPs 20 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1672 attrib.exe 1152 attrib.exe 680 attrib.exe 1556 attrib.exe 1584 attrib.exe 1528 attrib.exe 1668 attrib.exe 1652 attrib.exe 888 attrib.exe 1796 attrib.exe 1300 attrib.exe 1860 attrib.exe 2036 attrib.exe 1524 attrib.exe 796 attrib.exe 1592 attrib.exe 1664 attrib.exe 1548 attrib.exe 1580 attrib.exe 1644 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe"C:\Users\Admin\AppData\Local\Temp\868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Runtime Broker.exe"C:\ProgramData\Runtime Broker.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\TASKKILL.exeTASKKILL /F /IM wscript.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\TASKKILL.exeTASKKILL /F /IM cmd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h "C:\ProgramData\Runtime Broker.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 53⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Runtime Broker.exeFilesize
180KB
MD54f333b5a74e464d8fd46fe49bedc760e
SHA1110588bfa2559e700564af03db5cf851be5ac3d3
SHA256868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d
SHA5125ea9dbfae7dcf16f38aa0b064dd51cb7f6d398d5bb38b0877e9c7bf6b676151c01828c030d9d2f03707366651a66a3df39985aea43528baea55e79e83f784baf
-
C:\ProgramData\Runtime Broker.exeFilesize
180KB
MD54f333b5a74e464d8fd46fe49bedc760e
SHA1110588bfa2559e700564af03db5cf851be5ac3d3
SHA256868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d
SHA5125ea9dbfae7dcf16f38aa0b064dd51cb7f6d398d5bb38b0877e9c7bf6b676151c01828c030d9d2f03707366651a66a3df39985aea43528baea55e79e83f784baf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exeFilesize
180KB
MD54f333b5a74e464d8fd46fe49bedc760e
SHA1110588bfa2559e700564af03db5cf851be5ac3d3
SHA256868448f6c06d672fd544f64ae73ca4b1fe8403af947b870edd99ff842c02c59d
SHA5125ea9dbfae7dcf16f38aa0b064dd51cb7f6d398d5bb38b0877e9c7bf6b676151c01828c030d9d2f03707366651a66a3df39985aea43528baea55e79e83f784baf
-
memory/1472-62-0x0000000000E80000-0x0000000000EB4000-memory.dmpFilesize
208KB
-
memory/1472-63-0x0000000000990000-0x0000000000A10000-memory.dmpFilesize
512KB
-
memory/1472-67-0x0000000000990000-0x0000000000A10000-memory.dmpFilesize
512KB
-
memory/1472-68-0x0000000000990000-0x0000000000A10000-memory.dmpFilesize
512KB
-
memory/1472-69-0x0000000000990000-0x0000000000A10000-memory.dmpFilesize
512KB
-
memory/1472-70-0x0000000000990000-0x0000000000A10000-memory.dmpFilesize
512KB
-
memory/1852-54-0x0000000000FF0000-0x0000000001024000-memory.dmpFilesize
208KB
-
memory/1852-55-0x00000000003F0000-0x0000000000406000-memory.dmpFilesize
88KB
-
memory/1852-56-0x0000000000DE0000-0x0000000000E60000-memory.dmpFilesize
512KB