Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 10:01
Behavioral task
behavioral1
Sample
RuntimeBroker.exe
Resource
win7-20241023-en
General
-
Target
RuntimeBroker.exe
-
Size
45KB
-
MD5
b7c141189db621ece4b6935dd3795495
-
SHA1
159ebbf22f951ab07ec5794aa19ca9440cbd2837
-
SHA256
0e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164
-
SHA512
1257e345ac1f11bda207da7186a4919da59f10ebad919f6d2a98d62547b4a06eec8c061657fbef522012742b6cf1bfcbd6edee39e0cf4e2e0914fb6bd278d043
-
SSDEEP
768:ddhO/poiiUcjlJInIaH9Xqk5nWEZ5SbTDajuI7CPW5V:Tw+jjgnfH9XqcnW85SbT+uIt
Malware Config
Extracted
xenorat
anonam39-41248.portmap.io
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
41248
-
startup_name
RuntimeBroker
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3304-1-0x0000000000A30000-0x0000000000A42000-memory.dmp family_xenorat behavioral2/files/0x0008000000023c71-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe -
Executes dropped EXE 1 IoCs
pid Process 4968 RuntimeBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2012 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4968 3304 RuntimeBroker.exe 85 PID 3304 wrote to memory of 4968 3304 RuntimeBroker.exe 85 PID 3304 wrote to memory of 4968 3304 RuntimeBroker.exe 85 PID 4968 wrote to memory of 2012 4968 RuntimeBroker.exe 87 PID 4968 wrote to memory of 2012 4968 RuntimeBroker.exe 87 PID 4968 wrote to memory of 2012 4968 RuntimeBroker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "RuntimeBroker" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9FDA.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b7c141189db621ece4b6935dd3795495
SHA1159ebbf22f951ab07ec5794aa19ca9440cbd2837
SHA2560e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164
SHA5121257e345ac1f11bda207da7186a4919da59f10ebad919f6d2a98d62547b4a06eec8c061657fbef522012742b6cf1bfcbd6edee39e0cf4e2e0914fb6bd278d043
-
Filesize
1KB
MD59ffccad2fb12c509e1e22393a89749a2
SHA18f3adf6af32c1f9a62dca4217a8c2299d2171ad1
SHA2560bc1134a6453684d81b51f7c0f91e056fe8fc4efbf85ef57510f54e3e6b64c50
SHA512e67c1af1c2e4271e548b83c24830566a9f7b55c0ef4b70386d0dfe4c04356ae9aceba1ccbf9ec1e367d6b8f3241798ecf01a0561b1312e74175aead28b167641