Resubmissions

03-05-2024 13:10

240503-qeh1zsgb3x 7

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-05-2024 13:10

General

  • Target

    Runtime Broker.exe

  • Size

    131.9MB

  • MD5

    5bbeb87f22b3c312d6bed60a9b17bb1e

  • SHA1

    779d936cdf346cf673bc29026b6daf9057862b69

  • SHA256

    a0cd0974fd9231eb22220a00f55748455d3b9e34179a4d943cfa8a5550e0cc2c

  • SHA512

    87034545306083f46e32b70fe5f5e9c27a4f090363efad37fae284dce6a825af1dac24f5d847088c9a8a69ac0ad9bcdfef44656185ea90467b94d6f431ab6b6a

  • SSDEEP

    1572864:Q4sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVn:ll/BkVVPBDgmPKa5Wnu3X7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
    "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1392
      • C:\Windows\SysWOW64\chcp.com
        chcp
        3⤵
          PID:3112
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3408
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:1400
      • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
        "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\fxmiovhpbmuljziu" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1852,i,1222242479903705452,11465080732132879367,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
        2⤵
          PID:740
        • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
          "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\fxmiovhpbmuljziu" --mojo-platform-channel-handle=2068 --field-trial-handle=1852,i,1222242479903705452,11465080732132879367,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4280
        • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
          "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\fxmiovhpbmuljziu" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1852,i,1222242479903705452,11465080732132879367,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:384

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\98e6a87e-75b4-4d0d-a477-68664eef6453.tmp.node

        Filesize

        1.4MB

        MD5

        880b61ab7baea5ee94581584c45bfb64

        SHA1

        27f05814eb03367a7c56bd5e9b06563fb4ba300c

        SHA256

        36af162bb5c03aa1bbcb5b81f6b1b8a3d15efa0bf5c853830b78a5a36af87435

        SHA512

        660c7a0968e09129342ce0ecf39fafc86619c38cf4ca610f063149d89d61d702fce6d5455a96079015d24b9f52febab80ec0c91d8193c7334376a970747d439b

      • C:\Users\Admin\AppData\Local\Temp\9a6b95c3-36d5-46ca-b965-b75a382d84de.tmp.node

        Filesize

        83KB

        MD5

        c854c2822b905a84ec0b42f0aeee695f

        SHA1

        b3a9948c709fab279d482fcd570d0e3e1f33c1d5

        SHA256

        6555d1541c3c3840ebad7b2f48dea53423a0935ee1b262cabb76f8248488a21a

        SHA512

        0e8b4243dd49a920f591f431e0e118d7dd65c996279eec015421183779f4353e3ef3da22ba2dc84116115bb9bdb9f63d025b55761b36ce368a3b908367b8ca42

      • C:\Users\Admin\AppData\Local\Temp\9f930378-3367-4718-bed0-9cb04bfab4df.tmp.node

        Filesize

        121KB

        MD5

        aadcb6c6f19277e2bcf2cc0cbf459353

        SHA1

        7cbb424b28d3b8e3a403e6de5e7649ff7982456f

        SHA256

        dc6d806356e291965e6d4382a012cb7509e3795c582354b8285a8b10384645eb

        SHA512

        654530df2d35aeee6ba013e9480536427d4949dd27bbce59d0e88466a5fca6d3733a9438b75f5189d059354da7c859628bc232bf353a459512bf247552d53a06

      • memory/384-40-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-35-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-36-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-34-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-43-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-46-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-45-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-44-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-42-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB

      • memory/384-41-0x000000000E9E0000-0x000000000E9E1000-memory.dmp

        Filesize

        4KB