Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/09/2024, 01:25
Static task
static1
1 signatures
General
-
Target
Runtime Broker.exe
-
Size
3.6MB
-
MD5
1484a688240ca48126a63402656a0ffb
-
SHA1
9e8cf89f2c660c3de642c77505df683fdbdecf81
-
SHA256
7dae384e0b67a443fce25a0e8b08e1ea8de09f8b25dd887f023667647db3f279
-
SHA512
453310785a5357fb22249dbdd7c806537b4dc56f059eb80efbeb3113c2327cc6e3882ab677aac866364a8f7f46eeea62729bd692f6e8f074f237cb5df68d5dfa
-
SSDEEP
98304:/ZjirkSkZ2z20nn4De0ybAwhEFRRF6dJx:/MUZ2S0nn4yg1fF+Jx
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/3320-4-0x00000297242D0000-0x00000297244E4000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Runtime Broker.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Runtime Broker.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Runtime Broker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Runtime Broker.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Runtime Broker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Runtime Broker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Runtime Broker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Runtime Broker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Runtime Broker.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe 3320 Runtime Broker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3320 Runtime Broker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4056 /prefetch:81⤵PID:2436