Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 21:20
Behavioral task
behavioral1
Sample
RuntimeBroker.exe
Resource
win7-20241023-en
General
-
Target
RuntimeBroker.exe
-
Size
45KB
-
MD5
7a984e3a8ef99e429ceef1f1ddc144f4
-
SHA1
581dd32af3c53b1dc7b8a95aa2805ee0e8f44190
-
SHA256
4d8c876b969caf2449f169f89ec257f5e1412e23b609ab4f7c7ee72cd4b0de60
-
SHA512
b078b827e49cddfd743dd55802c0a48dc5056ccb172cb83a65e484a26c62fa30e1fa6860621752d4adbad3e5d234d759c817a0c0b3532531a99f50f05622bf6a
-
SSDEEP
768:ruGr1TVhfPNWUtWuHmo2qzVh7N78wJuPIozjbNVgXKDi4Rj6nKBDZjx:ruGr1TVxx2GFN4iXo3bsXjCj6nUdjx
Malware Config
Extracted
asyncrat
0.5.8
Default
holefo2785-22820.portmap.host:22820
holefo2785-22820.portmap.host:6606
I674w9YbNo4n
-
delay
3
-
install
true
-
install_file
RuntimeBroker.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000c00000002412d-9.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 RuntimeBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4652 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe 5552 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5552 RuntimeBroker.exe Token: SeDebugPrivilege 1188 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5552 wrote to memory of 4536 5552 RuntimeBroker.exe 90 PID 5552 wrote to memory of 4536 5552 RuntimeBroker.exe 90 PID 5552 wrote to memory of 4536 5552 RuntimeBroker.exe 90 PID 5552 wrote to memory of 4620 5552 RuntimeBroker.exe 92 PID 5552 wrote to memory of 4620 5552 RuntimeBroker.exe 92 PID 5552 wrote to memory of 4620 5552 RuntimeBroker.exe 92 PID 4620 wrote to memory of 4652 4620 cmd.exe 94 PID 4620 wrote to memory of 4652 4620 cmd.exe 94 PID 4620 wrote to memory of 4652 4620 cmd.exe 94 PID 4536 wrote to memory of 4912 4536 cmd.exe 95 PID 4536 wrote to memory of 4912 4536 cmd.exe 95 PID 4536 wrote to memory of 4912 4536 cmd.exe 95 PID 4620 wrote to memory of 1188 4620 cmd.exe 98 PID 4620 wrote to memory of 1188 4620 cmd.exe 98 PID 4620 wrote to memory of 1188 4620 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RuntimeBroker" /tr '"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "RuntimeBroker" /tr '"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9422.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4652
-
-
C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD5acc9090417037dfa2a55b46ed86e32b8
SHA153fa6fb25fb3e88c24d2027aca6ae492b2800a4d
SHA2562412679218bb0a7d05ceee32869bbb223619bde9966c4c460a68304a3367724b
SHA512d51f7085ec147c708f446b9fb6923cd2fb64596d354ed929e125b30ace57c8cb3217589447a36960e5d3aea87a4e48aaa82c7509eced6d6c2cecd71fcfe3697b
-
Filesize
157B
MD5d5bbe5e2955e0efea3f8dfcb9534c439
SHA1c717e9fe3939b21a8dd4e8ff72a35285b24cf9f7
SHA256bc47fce0a081dd42d79590054c00d467db49984e032cdbef23f4188509bd7fb9
SHA512337a3c38e6fff060a5de636db54f15905d35ab8bdb06b573fdf99a91b14d8b52fe2731a16df5158c5eac341531da54fd8b9490aeacab81e62acf6e6b6f7bf8e1
-
Filesize
45KB
MD57a984e3a8ef99e429ceef1f1ddc144f4
SHA1581dd32af3c53b1dc7b8a95aa2805ee0e8f44190
SHA2564d8c876b969caf2449f169f89ec257f5e1412e23b609ab4f7c7ee72cd4b0de60
SHA512b078b827e49cddfd743dd55802c0a48dc5056ccb172cb83a65e484a26c62fa30e1fa6860621752d4adbad3e5d234d759c817a0c0b3532531a99f50f05622bf6a