Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 09:56

General

  • Target

    runtime broker.exe

  • Size

    56KB

  • MD5

    f6744e6fb182bb6f92d1ad14b88fd56b

  • SHA1

    5b6661b56ca77759c58a7ab9fde99fc655fc8510

  • SHA256

    545bf6e1ef2f4c4eeb8c789dbdc37c8d7e211c1712b83e9cdfcfccc160f4c4d9

  • SHA512

    52b20378ed3b890d6c2e91fdee19c91d498893c9cbd97bfb9f760d20313c79916b5a76884f148f5fe5c488c840718f6b63d5a5e5dc1144c0312097b041d6b0db

  • SSDEEP

    768:NfvdWST3xRbyApqHuDlOHTjXhDnyokke5dfED1ns7csFOTRZqTsc7v:pvdWSVRVDlOzjRzrksAOTRZS1v

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\runtime broker.exe
    "C:\Users\Admin\AppData\Local\Temp\runtime broker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HWAV4SQP9G.BAT" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Windows\SysWOW64\mode.com
        Mode con: cols=50 lines=25
        3⤵
          PID:3352
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4656
      • C:\Windows\System32\NOTEPAD.EXE
        "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\HWAV4SQP9G.BAT
        1⤵
        • Opens file in notepad (likely ransom note)
        PID:4832

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\HWAV4SQP9G.BAT

              Filesize

              2KB

              MD5

              327f891287cc8c37230420f4fd6a68d1

              SHA1

              0023b6f73b1f1ccdd55c163b37be4ff8fba7c155

              SHA256

              560d5b4f66622e97c0fbcbb179df05ba240ac0b2a730134b28749ec21c5f7128

              SHA512

              c8b3fe89920ac3abd7ad3d134d4292060b0d48bfbec712c90c51e6397ea7dea0652abd23deab7cc2943b908148d3bdd308fc4769f4c80fb2c07a5ae00fe6f15a