Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 21:20
Behavioral task
behavioral1
Sample
RuntimeBroker.exe
Resource
win7-20241023-en
General
-
Target
RuntimeBroker.exe
-
Size
45KB
-
MD5
7a984e3a8ef99e429ceef1f1ddc144f4
-
SHA1
581dd32af3c53b1dc7b8a95aa2805ee0e8f44190
-
SHA256
4d8c876b969caf2449f169f89ec257f5e1412e23b609ab4f7c7ee72cd4b0de60
-
SHA512
b078b827e49cddfd743dd55802c0a48dc5056ccb172cb83a65e484a26c62fa30e1fa6860621752d4adbad3e5d234d759c817a0c0b3532531a99f50f05622bf6a
-
SSDEEP
768:ruGr1TVhfPNWUtWuHmo2qzVh7N78wJuPIozjbNVgXKDi4Rj6nKBDZjx:ruGr1TVxx2GFN4iXo3bsXjCj6nUdjx
Malware Config
Extracted
asyncrat
0.5.8
Default
holefo2785-22820.portmap.host:22820
holefo2785-22820.portmap.host:6606
I674w9YbNo4n
-
delay
3
-
install
true
-
install_file
RuntimeBroker.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001202b-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2924 RuntimeBroker.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2480 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2200 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2600 RuntimeBroker.exe 2600 RuntimeBroker.exe 2600 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2600 RuntimeBroker.exe Token: SeDebugPrivilege 2924 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2004 2600 RuntimeBroker.exe 30 PID 2600 wrote to memory of 2004 2600 RuntimeBroker.exe 30 PID 2600 wrote to memory of 2004 2600 RuntimeBroker.exe 30 PID 2600 wrote to memory of 2004 2600 RuntimeBroker.exe 30 PID 2600 wrote to memory of 2136 2600 RuntimeBroker.exe 32 PID 2600 wrote to memory of 2136 2600 RuntimeBroker.exe 32 PID 2600 wrote to memory of 2136 2600 RuntimeBroker.exe 32 PID 2600 wrote to memory of 2136 2600 RuntimeBroker.exe 32 PID 2004 wrote to memory of 2200 2004 cmd.exe 34 PID 2004 wrote to memory of 2200 2004 cmd.exe 34 PID 2004 wrote to memory of 2200 2004 cmd.exe 34 PID 2004 wrote to memory of 2200 2004 cmd.exe 34 PID 2136 wrote to memory of 2480 2136 cmd.exe 35 PID 2136 wrote to memory of 2480 2136 cmd.exe 35 PID 2136 wrote to memory of 2480 2136 cmd.exe 35 PID 2136 wrote to memory of 2480 2136 cmd.exe 35 PID 2136 wrote to memory of 2924 2136 cmd.exe 36 PID 2136 wrote to memory of 2924 2136 cmd.exe 36 PID 2136 wrote to memory of 2924 2136 cmd.exe 36 PID 2136 wrote to memory of 2924 2136 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RuntimeBroker" /tr '"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "RuntimeBroker" /tr '"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA2B5.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2480
-
-
C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD51d34828c3838ccf3a64fe4394d178d1b
SHA16baacd29dd7d4f3507a37f62d78f17429bbfa048
SHA25633574b6882db55d30a44cb86f852c74a08fe6d500b6c7f65bb6f269c1d178b27
SHA51242d4c45915ac8316cc5025a541c5c53495165762e1946ca626ec9d6cb2aafc5db54d3a274e207ccff03565fd34ca97fb4545baa38c62413b7e447110e15fe9ea
-
Filesize
45KB
MD57a984e3a8ef99e429ceef1f1ddc144f4
SHA1581dd32af3c53b1dc7b8a95aa2805ee0e8f44190
SHA2564d8c876b969caf2449f169f89ec257f5e1412e23b609ab4f7c7ee72cd4b0de60
SHA512b078b827e49cddfd743dd55802c0a48dc5056ccb172cb83a65e484a26c62fa30e1fa6860621752d4adbad3e5d234d759c817a0c0b3532531a99f50f05622bf6a