Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RuntimeBrooker.exe

Overview

General Information

Sample name:RuntimeBrooker.exe
Analysis ID:1431561
MD5:7d1082288a0d3f0467c1d57de7471036
SHA1:7561a197d02bb43c3868a6fc0bd81a4a34e1570b
SHA256:0870dabc1f1d62016d4b5c92565d86e1fe9b45ca26148fe98f0fb8cb811675d8
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Checks if the current process is being debugged
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • RuntimeBrooker.exe (PID: 7704 cmdline: "C:\Users\user\Desktop\RuntimeBrooker.exe" MD5: 7D1082288A0D3F0467C1D57DE7471036)
    • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RuntimeBrooker.exeJoe Sandbox ML: detected
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
Source: RuntimeBrooker.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: RuntimeBrooker.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
Source: RuntimeBrooker.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: RuntimeBrooker.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: RuntimeBrooker.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
Source: RuntimeBrooker.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: RuntimeBrooker.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: RuntimeBrooker.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.accv.es0
Source: RuntimeBrooker.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: RuntimeBrooker.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://policy.camerfirma.com0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://repository.swisssign.com/0
Source: RuntimeBrooker.exe, 00000000.00000002.1649363162.00000000004E9000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: RuntimeBrooker.exe, 00000000.00000002.1649363162.00000000004E9000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.accv.es00
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.chambersign.org1
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
Source: RuntimeBrooker.exe, 00000000.00000002.1649363162.00000000004E9000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://api.iproyal.com/https://api6.my-ip.io/ipidna:
Source: RuntimeBrooker.exeString found in binary or memory: https://enigmaprotector.com/taggant/spv.crl0
Source: RuntimeBrooker.exeString found in binary or memory: https://enigmaprotector.com/taggant/user.crl0
Source: RuntimeBrooker.exeString found in binary or memory: https://sectigo.com/CPS0
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.catcert.net/verarrel
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
Source: RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m

System Summary

barindex
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: Number of sections : 17 > 10
Source: RuntimeBrooker.exe, 00000000.00000002.1649830548.0000000000B73000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRuntimeBroker.exej% vs RuntimeBrooker.exe
Source: RuntimeBrooker.exeBinary or memory string: OriginalFilenameRuntimeBroker.exej% vs RuntimeBrooker.exe
Source: RuntimeBrooker.exeStatic PE information: Section: ZLIB complexity 0.9988533266129033
Source: RuntimeBrooker.exeStatic PE information: Section: ZLIB complexity 1.0003235716067864
Source: RuntimeBrooker.exeStatic PE information: Section: ZLIB complexity 1.0004044349747474
Source: RuntimeBrooker.exeStatic PE information: Section: ZLIB complexity 1.021484375
Source: RuntimeBrooker.exeStatic PE information: Section: ZLIB complexity 1.0003137303149607
Source: RuntimeBrooker.exeStatic PE information: Section: ZLIB complexity 1.0003164520711143
Source: RuntimeBrooker.exeStatic PE information: Section: ZLIB complexity 1.0003610321969696
Source: RuntimeBrooker.exeStatic PE information: Section: ZLIB complexity 0.9961219200721154
Source: classification engineClassification label: mal68.evad.winEXE@2/0@0/0
Source: C:\Users\user\Desktop\RuntimeBrooker.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: 2105161706--2021146733. Number: 0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
Source: C:\Users\user\Desktop\RuntimeBrooker.exeFile opened: C:\Windows\system32\bb8ef617cf723f158fa9ded0023a305f7f286c9b65fd242af5f74d0366b0f433AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeFile read: C:\Users\user\Desktop\RuntimeBrooker.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\RuntimeBrooker.exe "C:\Users\user\Desktop\RuntimeBrooker.exe"
Source: C:\Users\user\Desktop\RuntimeBrooker.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSection loaded: umpdc.dllJump to behavior
Source: RuntimeBrooker.exeStatic file information: File size 12024072 > 1048576
Source: RuntimeBrooker.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x11d200
Source: RuntimeBrooker.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x138600
Source: RuntimeBrooker.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x62e200

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\RuntimeBrooker.exeUnpacked PE file: 0.2.RuntimeBrooker.exe.1f0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;Unknown_Section5:EW;Unknown_Section6:EW;Unknown_Section7:EW;Unknown_Section8:EW;Unknown_Section9:EW;Unknown_Section10:EW;Unknown_Section11:EW;Unknown_Section12:EW;Unknown_Section13:EW;.rsrc:EW;Unknown_Section15:EW;Unknown_Section16:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;Unknown_Section5:R;Unknown_Section6:R;Unknown_Section7:R;Unknown_Section8:R;Unknown_Section9:R;Unknown_Section10:W;Unknown_Section11:R;Unknown_Section12:R;Unknown_Section13:R;.rsrc:EW;Unknown_Section15:EW;Unknown_Section16:EW;
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name:
Source: RuntimeBrooker.exeStatic PE information: section name: entropy: 7.998942135594241
Source: RuntimeBrooker.exeStatic PE information: section name: entropy: 7.999613497251071
Source: RuntimeBrooker.exeStatic PE information: section name: entropy: 7.9979503311609506
Source: RuntimeBrooker.exeStatic PE information: section name: entropy: 7.437622686334161
Source: RuntimeBrooker.exeStatic PE information: section name: entropy: 7.999837709460686
Source: RuntimeBrooker.exeStatic PE information: section name: entropy: 7.999732846830117
Source: RuntimeBrooker.exeStatic PE information: section name: entropy: 7.9990578242908725
Source: RuntimeBrooker.exeStatic PE information: section name: entropy: 7.995003929911863
Source: C:\Users\user\Desktop\RuntimeBrooker.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\RuntimeBrooker.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 2012 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: #Windows 10 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 2016 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: (Windows 2012 R2 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 6Windows 2012 R2 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 0Windows 8 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 6Windows 8.1 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vmware
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: "Windows 8 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Hyper-V (guest)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: /Windows 2012 R2 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: )Windows 8 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %Windows 2012 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: $Windows 8.1 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ,Windows 2012 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Windows 2012 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %Windows 2016 Microsoft Hyper-V Server
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Windows 2016 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: +Windows 8.1 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: :Windows 2012 R2 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 10 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Essential Server Solutions without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ,Windows 2016 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1652988015.000001EEE8030000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllss
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VBoxService.exe
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Virtual MachinesbiedllVBoxService.exe
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: *Windows 10 Server Standard without Hyper-V
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 1Windows 10 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VMWare
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8.1 Server Standard without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (full)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (core)
Source: RuntimeBrooker.exe, 00000000.00000002.1649844236.0000000000B74000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (full)
Source: C:\Users\user\Desktop\RuntimeBrooker.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\RuntimeBrooker.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeProcess queried: DebugPortJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\RuntimeBrooker.exeNtSetInformationThread: Indirect: 0xBACE3DJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeNtProtectVirtualMemory: Indirect: 0x27DDFAAJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeNtProtectVirtualMemory: Indirect: 0xBF513BJump to behavior
Source: C:\Users\user\Desktop\RuntimeBrooker.exeCode function: 0_2_00007FF44BD051F0 GetUserNameA,0_2_00007FF44BD051F0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping211
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
12
Software Packing
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Abuse Elevation Control Mechanism
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials2
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RuntimeBrooker.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://sectigo.com/CPS00%URL Reputationsafe
http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
http://ocsp.accv.es00%URL Reputationsafe
http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
http://www.chambersign.org10%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
https://www.catcert.net/verarrel0%URL Reputationsafe
https://www.catcert.net/verarrel0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
https://www.catcert.net/verarrel050%URL Reputationsafe
https://www.catcert.net/verarrel050%URL Reputationsafe
http://crl.certigna.fr/certignarootca.crl010%URL Reputationsafe
http://www.accv.es000%URL Reputationsafe
http://cps.chambersign.org/cps/chambersignroot.html00%URL Reputationsafe
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%Avira URL Cloudsafe
http://policy.camerfirma.com00%URL Reputationsafe
https://enigmaprotector.com/taggant/spv.crl00%Avira URL Cloudsafe
https://enigmaprotector.com/taggant/user.crl00%Avira URL Cloudsafe
https://api.iproyal.com/https://api6.my-ip.io/ipidna:0%Avira URL Cloudsafe
https://enigmaprotector.com/taggant/user.crl00%VirustotalBrowse
https://enigmaprotector.com/taggant/spv.crl01%VirustotalBrowse
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%VirustotalBrowse
https://api.iproyal.com/https://api6.my-ip.io/ipidna:0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://sectigo.com/CPS0RuntimeBrooker.exefalse
  • URL Reputation: safe
unknown
http://crl.chambersign.org/chambersroot.crl0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0RuntimeBrooker.exefalse
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0RuntimeBrooker.exefalse
  • URL Reputation: safe
unknown
http://schemas.xmlsoap.org/soap/encoding/RuntimeBrooker.exe, 00000000.00000002.1649363162.00000000004E9000.00000002.00000001.01000000.00000003.sdmpfalse
    high
    http://www.accv.es/legislacion_c.htm0URuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
      high
      https://wwww.certigna.fr/autorites/0mRuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
      • URL Reputation: safe
      unknown
      http://ocsp.accv.es0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
      • URL Reputation: safe
      unknown
      http://cps.chambersign.org/cps/chambersroot.html0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
      • URL Reputation: safe
      unknown
      http://crl.dhimyotis.com/certignarootca.crl0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/soap/envelope/RuntimeBrooker.exe, 00000000.00000002.1649363162.00000000004E9000.00000002.00000001.01000000.00000003.sdmpfalse
        high
        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#RuntimeBrooker.exefalse
        • URL Reputation: safe
        unknown
        http://www.chambersign.org1RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.firmaprofesional.com/cps0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
          high
          http://repository.swisssign.com/0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
            high
            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#RuntimeBrooker.exefalse
            • URL Reputation: safe
            unknown
            https://enigmaprotector.com/taggant/spv.crl0RuntimeBrooker.exefalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://crl.securetrust.com/SGCA.crl0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
            • URL Reputation: safe
            unknown
            https://api.iproyal.com/https://api6.my-ip.io/ipidna:RuntimeBrooker.exe, 00000000.00000002.1649363162.00000000004E9000.00000002.00000001.01000000.00000003.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://crl.securetrust.com/STCA.crl0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
            • URL Reputation: safe
            unknown
            https://enigmaprotector.com/taggant/user.crl0RuntimeBrooker.exefalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tRuntimeBrooker.exefalse
            • URL Reputation: safe
            unknown
            https://www.catcert.net/verarrelRuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yRuntimeBrooker.exefalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
              high
              http://www.quovadisglobal.com/cps0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                high
                http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                  high
                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#RuntimeBrooker.exefalse
                  • URL Reputation: safe
                  unknown
                  http://crl.chambersign.org/chambersignroot.crl0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.xrampsecurity.com/XGCA.crl0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.catcert.net/verarrel05RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://crl.certigna.fr/certignarootca.crl01RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.accv.es00RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.cert.fnmt.es/dpcs/0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                    high
                    http://cps.chambersign.org/cps/chambersignroot.html0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://policy.camerfirma.com0RuntimeBrooker.exe, 00000000.00000002.1649544788.00000000007C7000.00000004.00000001.01000000.00000003.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1431561
                    Start date and time:2024-04-25 13:05:32 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 27s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:2
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:RuntimeBrooker.exe
                    Detection:MAL
                    Classification:mal68.evad.winEXE@2/0@0/0
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 1
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Execution Graph export aborted for target RuntimeBrooker.exe, PID 7704 because there are no executed function
                    • Not all processes where analyzed, report is missing behavior information
                    No simulations
                    No context
                    No context
                    No context
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                    Entropy (8bit):7.996630319116559
                    TrID:
                    • Win64 Executable (generic) (12005/4) 74.95%
                    • Generic Win/DOS Executable (2004/3) 12.51%
                    • DOS Executable Generic (2002/1) 12.50%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                    File name:RuntimeBrooker.exe
                    File size:12'024'072 bytes
                    MD5:7d1082288a0d3f0467c1d57de7471036
                    SHA1:7561a197d02bb43c3868a6fc0bd81a4a34e1570b
                    SHA256:0870dabc1f1d62016d4b5c92565d86e1fe9b45ca26148fe98f0fb8cb811675d8
                    SHA512:dc6337013dc61b9971e5fa2a15b11ed05557c989cded240da8dc0d0a2fdd8102d41a0daa6bb84eb60e1bf09e7093e219d1091d2db95a973cf01615f163ccd433
                    SSDEEP:196608:/VtRsOyxKZXB9jJYt/Tr8verWaS/GiLbN2AsBHTbtlyxE11qU75u4CLNbmCJytzz:dDsOvL91Yt/TouQ/GUphs5btlyx4qU7d
                    TLSH:24C6331D754589E5E1A0D9364EED2D762422A10339C09A7943AC9CFE13AEEFFCD8344E
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d............"...."......t/...................@.....................................2.....`...@...... ........ ...... .....
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x30dbeec
                    Entrypoint Section:
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:1
                    File Version Major:6
                    File Version Minor:1
                    Subsystem Version Major:6
                    Subsystem Version Minor:1
                    Import Hash:9dc580b98fdc55e0bc3b6c6f01e8c0c2
                    Instruction
                    jmp 00007F422CEBC85Ah
                    add byte ptr [esp+edx*2+00h], ch
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    push eax
                    push ecx
                    push edx
                    push ebx
                    push ebp
                    push esi
                    push edi
                    inc ecx
                    push eax
                    inc ecx
                    push ecx
                    inc ecx
                    push edx
                    inc ecx
                    push ebx
                    inc ecx
                    push esp
                    inc ecx
                    push ebp
                    inc ecx
                    push esi
                    inc ecx
                    push edi
                    dec eax
                    pushfd
                    dec eax
                    sub esp, 00000008h
                    stmxcsr dword ptr [esp]
                    call 00007F422CEBC855h
                    pop ebp
                    dec eax
                    sub ebp, 00000033h
                    dec eax
                    sub ebp, 02CDBEECh
                    dec eax
                    sub esp, 00000020h
                    jmp 00007F422CEBC859h
                    or ch, byte ptr [eax]
                    cmc
                    ror dword ptr [eax-39h], 1
                    shr ah, FFFFFFBEh
                    int 02h
                    dec eax
                    add eax, ebp
                    dec eax
                    add eax, 00000084h
                    dec eax
                    mov ecx, 0000060Bh
                    dec eax
                    mov edx, BF922518h
                    xor byte ptr [eax], dl
                    dec eax
                    inc eax
                    dec eax
                    dec ecx
                    jne 00007F422CEBC848h
                    jmp 00007F422CEBC859h
                    das
                    insb
                    fild word ptr [edx]
                    push eax
                    xchg eax, ecx
                    int1
                    xchg eax, ebx
                    xchg eax, ecx
                    and al, 18h
                    sbb byte ptr [eax], bl
                    push eax
                    cdq
                    fst dword ptr [eax]
                    sbb dword ptr [eax], ebx
                    sbb byte ptr [eax+19h], dl
                    int1
                    push eax
                    fstp9 st(0)
                    pop ss
                    sbb byte ptr [eax], bl
                    sbb byte ptr [eax-21h], dl
                    fidiv dword ptr [eax]
                    sbb byte ptr [eax], bl
                    sbb byte ptr [eax-11h], dl
                    cli
                    push eax
                    sbb ecx, ebx
                    xchg eax, ebx
                    cdq
                    adc al, 18h
                    sbb byte ptr [eax], bl
                    push eax
                    sbb eax, esi
                    dec eax
                    dec eax
                    push eax
                    mov al, byte ptr [18799A24h]
                    sbb byte ptr [eax], bl
                    sbb byte ptr [eax], bl
                    push eax
                    mov eax, dword ptr [000024B5h]
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x26b50200xdcf
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x26b5df00x25c
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x9830000x954.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x26b63900x9d8c
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x26b50000xc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    0x10000x2f80000x11d200657a39c3008e678da7e4b414b0d0fb3eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x2f90000x2de0000x1386005a11825d3385096c17173373e336c61dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x5d70000xce0000x3a2007889260547349b38f37a16511fc5a786False0.9988533266129033data7.998942135594241IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x6a50000x10000x200eff181115962c3e0f82de970904edc34False0.693359375data5.613828153638671IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x6a60000x7e0000x7d40095aba7dd2e4d753be569d4802554503bFalse1.0003235716067864data7.999613497251071IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x7240000x190000x18c0013b51f1eaba8815a4250ab43d77c21dbFalse1.0004044349747474data7.9979503311609506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x73d0000x10000x200df5ba5055dcbd6b4561f7696bbd73055False1.021484375data7.437622686334161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x73e0000xef0000xee20052821cb348ec4cc533577704e2716d12False1.0003137303149607data7.999837709460686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x82d0000xab0000xaa800ac9ac48077237755bce2d7162e6cc5a5False1.0003164520711143executable (RISC System/6000 V3.1) or obj module7.999732846830117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x8d80000x2a0000x29400c54d86a450a26a95be8451c1083d13ffFalse1.0003610321969696data7.9990578242908725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x9020000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x9030000xe0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x9110000x710000x1a00086ac60fdab5a66a81012d7f36e54daa6False0.9961219200721154data7.995003929911863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x9820000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x9830000x10000xa009a556661f523a871e4d381e5e3485a11False0.400390625data4.551913019276211IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x9840000x1d2e0000x4400049f8f8c50112c394169e9c88003eccabunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x26b20000x62f0000x62e2000d8782e6e82f7016fd149500f9fc2d6bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x9830a00x3a4dataEnglishUnited States0.44742489270386265
                    RT_MANIFEST0x9834480x50bXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42989930286599537
                    DLLImport
                    kernel32.dllGetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA
                    user32.dllMessageBoxA
                    advapi32.dllRegCloseKey
                    oleaut32.dllSysFreeString
                    gdi32.dllCreateFontA
                    shell32.dllShellExecuteA
                    version.dllGetFileVersionInfoA
                    ole32.dllOleInitialize
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:13:06:18
                    Start date:25/04/2024
                    Path:C:\Users\user\Desktop\RuntimeBrooker.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\RuntimeBrooker.exe"
                    Imagebase:0x1f0000
                    File size:12'024'072 bytes
                    MD5 hash:7D1082288A0D3F0467C1D57DE7471036
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Go lang
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:13:06:18
                    Start date:25/04/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654138175.00007FF44BD00000.00000040.00001000.00020000.00000000.sdmp, Offset: 00007FF44BD00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff44bd00000_RuntimeBrooker.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 13b6cb95863020ae7ed8d6be28ed13175d6b1879af5edda7bca3cc6f0b70b91f
                      • Instruction ID: 48df4bfde3955bbaafe74bc964a11f930cb2546f1de918c8aa2a0e0a7bdef5d8
                      • Opcode Fuzzy Hash: 13b6cb95863020ae7ed8d6be28ed13175d6b1879af5edda7bca3cc6f0b70b91f
                      • Instruction Fuzzy Hash: FBD022C020EBC52FF34460380C897981BD6DB3A308F8800E5A40DCB0A3D80C88860328
                      Uniqueness

                      Uniqueness Score: -1.00%