Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 10:01
Behavioral task
behavioral1
Sample
RuntimeBroker.exe
Resource
win7-20241023-en
General
-
Target
RuntimeBroker.exe
-
Size
45KB
-
MD5
b7c141189db621ece4b6935dd3795495
-
SHA1
159ebbf22f951ab07ec5794aa19ca9440cbd2837
-
SHA256
0e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164
-
SHA512
1257e345ac1f11bda207da7186a4919da59f10ebad919f6d2a98d62547b4a06eec8c061657fbef522012742b6cf1bfcbd6edee39e0cf4e2e0914fb6bd278d043
-
SSDEEP
768:ddhO/poiiUcjlJInIaH9Xqk5nWEZ5SbTDajuI7CPW5V:Tw+jjgnfH9XqcnW85SbT+uIt
Malware Config
Extracted
xenorat
anonam39-41248.portmap.io
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
41248
-
startup_name
RuntimeBroker
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2416-1-0x0000000000E20000-0x0000000000E32000-memory.dmp family_xenorat behavioral1/files/0x0007000000016d54-7.dat family_xenorat behavioral1/memory/2380-9-0x0000000000BE0000-0x0000000000BF2000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2380 RuntimeBroker.exe -
Loads dropped DLL 1 IoCs
pid Process 2416 RuntimeBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2380 2416 RuntimeBroker.exe 30 PID 2416 wrote to memory of 2380 2416 RuntimeBroker.exe 30 PID 2416 wrote to memory of 2380 2416 RuntimeBroker.exe 30 PID 2416 wrote to memory of 2380 2416 RuntimeBroker.exe 30 PID 2380 wrote to memory of 2992 2380 RuntimeBroker.exe 31 PID 2380 wrote to memory of 2992 2380 RuntimeBroker.exe 31 PID 2380 wrote to memory of 2992 2380 RuntimeBroker.exe 31 PID 2380 wrote to memory of 2992 2380 RuntimeBroker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "RuntimeBroker" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA7C4.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b7c141189db621ece4b6935dd3795495
SHA1159ebbf22f951ab07ec5794aa19ca9440cbd2837
SHA2560e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164
SHA5121257e345ac1f11bda207da7186a4919da59f10ebad919f6d2a98d62547b4a06eec8c061657fbef522012742b6cf1bfcbd6edee39e0cf4e2e0914fb6bd278d043
-
Filesize
1KB
MD59ffccad2fb12c509e1e22393a89749a2
SHA18f3adf6af32c1f9a62dca4217a8c2299d2171ad1
SHA2560bc1134a6453684d81b51f7c0f91e056fe8fc4efbf85ef57510f54e3e6b64c50
SHA512e67c1af1c2e4271e548b83c24830566a9f7b55c0ef4b70386d0dfe4c04356ae9aceba1ccbf9ec1e367d6b8f3241798ecf01a0561b1312e74175aead28b167641