Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/07/2024, 12:16

General

  • Target

    Runtime Broker.exe

  • Size

    131.9MB

  • MD5

    bff65c95858e13e36588e3ff4db40784

  • SHA1

    12f97cf0ab8b9b99f492910fb78538dbde77c21a

  • SHA256

    376f74c9e2d2964f43ad1f1f2e627c563f72d868ec83df9cdccc5a9d49b2bcee

  • SHA512

    75f5912bc7e0eb30174b9f0e2e91552b4b67c781b5eee1b0a9adf33b2d6d9d4ab6fda01b4b6d480e173a3af699e246c333869966faab75da0ba338b76942371d

  • SSDEEP

    1572864:Q4sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVX:ll/BkVVPBDgmPKa5Wnu3X7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
    "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\SysWOW64\chcp.com
        chcp
        3⤵
          PID:68
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
        2⤵
          PID:4772
        • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
          "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\wtcysiftkispyelt" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1740,i,1344111475683998846,758644542348631035,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:4884
          • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
            "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\wtcysiftkispyelt" --mojo-platform-channel-handle=1288 --field-trial-handle=1740,i,1344111475683998846,758644542348631035,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2508
          • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
            "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --user-data-dir="C:\Users\Admin\AppData\Roaming\wtcysiftkispyelt" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1740,i,1344111475683998846,758644542348631035,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2652

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\1114978f-06cb-49e3-91d6-b94212734839.tmp.node

          Filesize

          121KB

          MD5

          f46fe538a709da6b7fa4ad1ff81ff21d

          SHA1

          a5d5faa88d196d4882fc59e06449106997dd1493

          SHA256

          0c242257696ee67083e6aff39945ee9b287b31a1d3907cf0c71a5be629e35d97

          SHA512

          9c3a627996f748255222d48d1fb9cefc56f161be46e357b5c9e75ad5dceeeb5ab04877ec76472969c0ab8890ae79f450027cd34c65e7138be2be7ca7586347c9

        • \Users\Admin\AppData\Local\Temp\75d02a64-fb26-4941-99ab-e6bc03a5179b.tmp.node

          Filesize

          1.4MB

          MD5

          d66c8072d89fbd0db96746255b069803

          SHA1

          730ee9ed085bd5f90712c74610c79664b0c1e581

          SHA256

          c691de7e9369ada175e0db89590f91f65e1b6cc4e591a0c7cf359036b208f764

          SHA512

          5d90d69d9b39e9641b86be9825fc437dba93c8ffafe5b3dbd8be68a6d85eed572ddccd74ed6cbaed8b0a6204cfc0feab07826983f37c773fc0c1b7acf4d969f8

        • \Users\Admin\AppData\Local\Temp\ad8cf070-7856-4d27-8973-186f943552af.tmp.node

          Filesize

          83KB

          MD5

          a15d6f4bef89a3e388e76e150467ac6d

          SHA1

          3de913f8b9cb1522c5d1b482cce95ce885df07db

          SHA256

          fd912308a71b4885f32bef19fab5a643b58a8992187917e3d8f1c392bfd622d0

          SHA512

          d48b9c99cb82c57cdd6cca123a80053fe88a7765640667d40ca09d49dcf215162b2864a4f0cb1042b12487c59145e09c1b74aedc3af88e207234cef1048162a0