Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
RustAnticheat.exe
Resource
win7-20240903-en
General
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
MD5
84e9631aef9d0342cae8466ed841ca7f
-
SHA1
fed84e7f25bb9f337a99e820111e87be1de954aa
-
SHA256
b929ede4c76d1db2d2b1698d401d658fbce5e440fd54f4071701aae69ed791e9
-
SHA512
9fd3bf2966edb0ae54a9a46ded59fde75e6c7653078a5cac3563333a0f3ee1c197cfd622c2828855aacbc2023ff85f3d37a01dcb360a0b611aa1a43d59cdd36b
-
SSDEEP
24576:y1zV1C+mn91Bm1uyv43wswHTFZp/qg0GsO0iT7puGB:uh0I0yIYzFZ90Gstw
Malware Config
Extracted
xworm
web-amend.gl.at.ply.gg:59501
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Extracted
umbral
https://discord.com/api/webhooks/1291451585494515744/LKDGh0k0NWFEqtktblmpi9FMNE2PK1J-08hBfSDWZ6hts8lC3NILBGDzrEYeKRQMidcr
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016dbe-18.dat family_umbral behavioral1/memory/2172-19-0x0000000000B10000-0x0000000000B50000-memory.dmp family_umbral -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000016d9a-12.dat family_xworm behavioral1/memory/2796-15-0x0000000000960000-0x0000000000978000-memory.dmp family_xworm behavioral1/memory/644-58-0x00000000003E0000-0x00000000003F8000-memory.dmp family_xworm behavioral1/memory/2224-61-0x0000000000A50000-0x0000000000A68000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1500 powershell.exe 1164 powershell.exe 236 powershell.exe 1028 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnk RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnk RuntimeBroker.exe -
Executes dropped EXE 5 IoCs
pid Process 2812 Loader (1).exe 2796 RuntimeBroker.exe 2172 Umbral.exe 644 RuntimeBroker 2224 RuntimeBroker -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "C:\\Users\\Admin\\RuntimeBroker" RuntimeBroker.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader (1).exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1500 powershell.exe 1164 powershell.exe 236 powershell.exe 1028 powershell.exe 2796 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2796 RuntimeBroker.exe Token: SeDebugPrivilege 2172 Umbral.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeIncreaseQuotaPrivilege 1404 wmic.exe Token: SeSecurityPrivilege 1404 wmic.exe Token: SeTakeOwnershipPrivilege 1404 wmic.exe Token: SeLoadDriverPrivilege 1404 wmic.exe Token: SeSystemProfilePrivilege 1404 wmic.exe Token: SeSystemtimePrivilege 1404 wmic.exe Token: SeProfSingleProcessPrivilege 1404 wmic.exe Token: SeIncBasePriorityPrivilege 1404 wmic.exe Token: SeCreatePagefilePrivilege 1404 wmic.exe Token: SeBackupPrivilege 1404 wmic.exe Token: SeRestorePrivilege 1404 wmic.exe Token: SeShutdownPrivilege 1404 wmic.exe Token: SeDebugPrivilege 1404 wmic.exe Token: SeSystemEnvironmentPrivilege 1404 wmic.exe Token: SeRemoteShutdownPrivilege 1404 wmic.exe Token: SeUndockPrivilege 1404 wmic.exe Token: SeManageVolumePrivilege 1404 wmic.exe Token: 33 1404 wmic.exe Token: 34 1404 wmic.exe Token: 35 1404 wmic.exe Token: SeIncreaseQuotaPrivilege 1404 wmic.exe Token: SeSecurityPrivilege 1404 wmic.exe Token: SeTakeOwnershipPrivilege 1404 wmic.exe Token: SeLoadDriverPrivilege 1404 wmic.exe Token: SeSystemProfilePrivilege 1404 wmic.exe Token: SeSystemtimePrivilege 1404 wmic.exe Token: SeProfSingleProcessPrivilege 1404 wmic.exe Token: SeIncBasePriorityPrivilege 1404 wmic.exe Token: SeCreatePagefilePrivilege 1404 wmic.exe Token: SeBackupPrivilege 1404 wmic.exe Token: SeRestorePrivilege 1404 wmic.exe Token: SeShutdownPrivilege 1404 wmic.exe Token: SeDebugPrivilege 1404 wmic.exe Token: SeSystemEnvironmentPrivilege 1404 wmic.exe Token: SeRemoteShutdownPrivilege 1404 wmic.exe Token: SeUndockPrivilege 1404 wmic.exe Token: SeManageVolumePrivilege 1404 wmic.exe Token: 33 1404 wmic.exe Token: 34 1404 wmic.exe Token: 35 1404 wmic.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 236 powershell.exe Token: SeDebugPrivilege 1028 powershell.exe Token: SeDebugPrivilege 2796 RuntimeBroker.exe Token: SeDebugPrivilege 644 RuntimeBroker Token: SeDebugPrivilege 2224 RuntimeBroker -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2812 2224 RustAnticheat.exe 31 PID 2224 wrote to memory of 2812 2224 RustAnticheat.exe 31 PID 2224 wrote to memory of 2812 2224 RustAnticheat.exe 31 PID 2224 wrote to memory of 2812 2224 RustAnticheat.exe 31 PID 2224 wrote to memory of 2796 2224 RustAnticheat.exe 32 PID 2224 wrote to memory of 2796 2224 RustAnticheat.exe 32 PID 2224 wrote to memory of 2796 2224 RustAnticheat.exe 32 PID 2224 wrote to memory of 2172 2224 RustAnticheat.exe 33 PID 2224 wrote to memory of 2172 2224 RustAnticheat.exe 33 PID 2224 wrote to memory of 2172 2224 RustAnticheat.exe 33 PID 2796 wrote to memory of 1500 2796 RuntimeBroker.exe 35 PID 2796 wrote to memory of 1500 2796 RuntimeBroker.exe 35 PID 2796 wrote to memory of 1500 2796 RuntimeBroker.exe 35 PID 2172 wrote to memory of 1404 2172 Umbral.exe 37 PID 2172 wrote to memory of 1404 2172 Umbral.exe 37 PID 2172 wrote to memory of 1404 2172 Umbral.exe 37 PID 2796 wrote to memory of 1164 2796 RuntimeBroker.exe 40 PID 2796 wrote to memory of 1164 2796 RuntimeBroker.exe 40 PID 2796 wrote to memory of 1164 2796 RuntimeBroker.exe 40 PID 2796 wrote to memory of 236 2796 RuntimeBroker.exe 42 PID 2796 wrote to memory of 236 2796 RuntimeBroker.exe 42 PID 2796 wrote to memory of 236 2796 RuntimeBroker.exe 42 PID 2796 wrote to memory of 1028 2796 RuntimeBroker.exe 44 PID 2796 wrote to memory of 1028 2796 RuntimeBroker.exe 44 PID 2796 wrote to memory of 1028 2796 RuntimeBroker.exe 44 PID 2796 wrote to memory of 2036 2796 RuntimeBroker.exe 46 PID 2796 wrote to memory of 2036 2796 RuntimeBroker.exe 46 PID 2796 wrote to memory of 2036 2796 RuntimeBroker.exe 46 PID 1772 wrote to memory of 644 1772 taskeng.exe 49 PID 1772 wrote to memory of 644 1772 taskeng.exe 49 PID 1772 wrote to memory of 644 1772 taskeng.exe 49 PID 1772 wrote to memory of 2224 1772 taskeng.exe 51 PID 1772 wrote to memory of 2224 1772 taskeng.exe 51 PID 1772 wrote to memory of 2224 1772 taskeng.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RustAnticheat.exe"C:\Users\Admin\AppData\Local\Temp\RustAnticheat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\Loader (1).exe"C:\Users\Admin\AppData\Roaming\Loader (1).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\RuntimeBroker'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RuntimeBroker" /tr "C:\Users\Admin\RuntimeBroker"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
-
C:\Users\Admin\AppData\Roaming\Umbral.exe"C:\Users\Admin\AppData\Roaming\Umbral.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3EB29C32-5426-41AC-A116-B96E1B65AB00} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\RuntimeBrokerC:\Users\Admin\RuntimeBroker2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Users\Admin\RuntimeBrokerC:\Users\Admin\RuntimeBroker2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5eefb801774c5ccb44153268a9357f5f1
SHA1b1906b22e14edd142c52808ab3e5ba9346b85de5
SHA256677aeb1981c58cba41a5d53ccbbf5b471e62dc49dc326570767da940560d840d
SHA5121cf162fe6184d68dca514059d2de1123e80d0faac401765a54224aa5a987c9454bc92263fbec566835aa7b402f1f63ba59bb425ccc139e0a7391e66991f270b7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CD4XF7KM3L7W4BS3ADWY.temp
Filesize7KB
MD59503c355029f041c40bd8e0c31de3985
SHA1213903a9255a1320cd1ab799a5af40145e98a616
SHA2561b33072828b63575100a39e1750854569bf5498fc03cdae38327508401da4aed
SHA512aaa72142089e8e4cfc17b9e424c3b58e000734cc896a2364fd24011e552069efd295a4992b7a3d47606ef9885274327cf779736942a8e99034f77c9621c6e231
-
Filesize
73KB
MD596af510fc9c01219079834a9c95ddb55
SHA114f0c50ad5421350c8ca7f6eaeefd6ab5da38a09
SHA2563718589c2b1ee0e11197034c51383245fd5cee736a4187bc7d4bbc22daeee598
SHA5120c560efa6d436435bf1aaaa1c0a1d77d68655591368d8010267ca4b5a24e51204e4bdefce1f7adb6e93b6ecc9401c335e63f886dfd12cec93c759727df8d2da2
-
Filesize
229KB
MD5471fb39fc8ef1c26c8b6b332531d79c5
SHA1fba16c9c0de9ea00cebf4f90ab7095fd0e892ef3
SHA256c672509e54b49ee79d9a61f2e9deb18311427267799fb65523e71cf76e814830
SHA512a2cd9fc672ef6fc904a7f0a3b8affff554c5035363b074df48838a9a5c3e48e880cc97fc0e8cf4bfa68d430fd6b01c273fa7fef07d0f70403a15f47c7169f015