Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 18:15
Behavioral task
behavioral1
Sample
RuntimeBroker.exe
Resource
win7-20240903-en
General
-
Target
RuntimeBroker.exe
-
Size
48KB
-
MD5
f48dad5d1f222ffbad834e1735942077
-
SHA1
450940def40ae8cf9b48e7fed829f43802f9a984
-
SHA256
2039dfbccacc781852e958fd710d12dbd26586c379e97b192c82b0343ee25ae0
-
SHA512
a8bd8fd998c71cd5291243808f2bafe2fbf65f4d62646fbdf775f66b650f628e8f675fb6b5a7ea2b287efcc457a90e8c1403717e9f5b30bce9136bf78b83e06d
-
SSDEEP
768:Ru+01TQQEX1WUVt1Pmo2qjRx7u4vfW+0yD0b6nIkrTN4+djyP6a8T317oSkcDZ22:Ru+01TQfb2kv++0db6nXa8ySaYBbd2P+
Malware Config
Extracted
asyncrat
0.5.8
Default
impact-leeds.gl.at.ply.gg:44574
rSqd9NDbOdBy
-
delay
3
-
install
true
-
install_file
RuntimeBroker.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000012118-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3056 RuntimeBroker.exe -
Loads dropped DLL 1 IoCs
pid Process 2740 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2592 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2176 RuntimeBroker.exe 2176 RuntimeBroker.exe 2176 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2176 RuntimeBroker.exe Token: SeDebugPrivilege 3056 RuntimeBroker.exe Token: SeDebugPrivilege 3056 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2828 2176 RuntimeBroker.exe 31 PID 2176 wrote to memory of 2828 2176 RuntimeBroker.exe 31 PID 2176 wrote to memory of 2828 2176 RuntimeBroker.exe 31 PID 2176 wrote to memory of 2828 2176 RuntimeBroker.exe 31 PID 2176 wrote to memory of 2740 2176 RuntimeBroker.exe 33 PID 2176 wrote to memory of 2740 2176 RuntimeBroker.exe 33 PID 2176 wrote to memory of 2740 2176 RuntimeBroker.exe 33 PID 2176 wrote to memory of 2740 2176 RuntimeBroker.exe 33 PID 2828 wrote to memory of 2576 2828 cmd.exe 35 PID 2828 wrote to memory of 2576 2828 cmd.exe 35 PID 2828 wrote to memory of 2576 2828 cmd.exe 35 PID 2828 wrote to memory of 2576 2828 cmd.exe 35 PID 2740 wrote to memory of 2592 2740 cmd.exe 36 PID 2740 wrote to memory of 2592 2740 cmd.exe 36 PID 2740 wrote to memory of 2592 2740 cmd.exe 36 PID 2740 wrote to memory of 2592 2740 cmd.exe 36 PID 2740 wrote to memory of 3056 2740 cmd.exe 37 PID 2740 wrote to memory of 3056 2740 cmd.exe 37 PID 2740 wrote to memory of 3056 2740 cmd.exe 37 PID 2740 wrote to memory of 3056 2740 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RuntimeBroker" /tr '"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "RuntimeBroker" /tr '"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp51F7.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2592
-
-
C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5a76219a98eb5013971429aa14d10f259
SHA11aca0d3bbe530a9e233e0a8a88a27c367bb4aa3a
SHA256c7b0c83a99a8fdf7769bcd4770d192429a5df31579374c2e0ccf8c65c83f9fcb
SHA512bd680f2a079f298fea1f5b7b5a81feaebe1a3646a59e654c5809c5b9c96da61b4f9731b4ae8c940c48dbd2d27c09d9287acfd1f5952efce307307f1e41a80c1c
-
Filesize
48KB
MD5f48dad5d1f222ffbad834e1735942077
SHA1450940def40ae8cf9b48e7fed829f43802f9a984
SHA2562039dfbccacc781852e958fd710d12dbd26586c379e97b192c82b0343ee25ae0
SHA512a8bd8fd998c71cd5291243808f2bafe2fbf65f4d62646fbdf775f66b650f628e8f675fb6b5a7ea2b287efcc457a90e8c1403717e9f5b30bce9136bf78b83e06d