Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
runtime broker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
runtime broker.exe
Resource
win10v2004-20240226-en
General
-
Target
runtime broker.exe
-
Size
56KB
-
MD5
f6744e6fb182bb6f92d1ad14b88fd56b
-
SHA1
5b6661b56ca77759c58a7ab9fde99fc655fc8510
-
SHA256
545bf6e1ef2f4c4eeb8c789dbdc37c8d7e211c1712b83e9cdfcfccc160f4c4d9
-
SHA512
52b20378ed3b890d6c2e91fdee19c91d498893c9cbd97bfb9f760d20313c79916b5a76884f148f5fe5c488c840718f6b63d5a5e5dc1144c0312097b041d6b0db
-
SSDEEP
768:NfvdWST3xRbyApqHuDlOHTjXhDnyokke5dfED1ns7csFOTRZqTsc7v:pvdWSVRVDlOzjRzrksAOTRZS1v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation runtime broker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4832 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1148 1624 runtime broker.exe 89 PID 1624 wrote to memory of 1148 1624 runtime broker.exe 89 PID 1624 wrote to memory of 1148 1624 runtime broker.exe 89 PID 1148 wrote to memory of 3352 1148 cmd.exe 91 PID 1148 wrote to memory of 3352 1148 cmd.exe 91 PID 1148 wrote to memory of 3352 1148 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\runtime broker.exe"C:\Users\Admin\AppData\Local\Temp\runtime broker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HWAV4SQP9G.BAT" "2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\mode.comMode con: cols=50 lines=253⤵PID:3352
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4656
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\HWAV4SQP9G.BAT1⤵
- Opens file in notepad (likely ransom note)
PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5327f891287cc8c37230420f4fd6a68d1
SHA10023b6f73b1f1ccdd55c163b37be4ff8fba7c155
SHA256560d5b4f66622e97c0fbcbb179df05ba240ac0b2a730134b28749ec21c5f7128
SHA512c8b3fe89920ac3abd7ad3d134d4292060b0d48bfbec712c90c51e6397ea7dea0652abd23deab7cc2943b908148d3bdd308fc4769f4c80fb2c07a5ae00fe6f15a