Analysis
-
max time kernel
314s -
max time network
514s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-06-2022 13:03
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20220414-en
General
-
Target
Setup.exe
-
Size
465.0MB
-
MD5
89a1be272c94305709327aac60b27803
-
SHA1
c0e8c69784a196025c36bcdc640fabaf972ca989
-
SHA256
b1ff6ff829f5f94cc4efa59b9ac622f1c9ddcf80c9b238c4b0102f0d487d1766
-
SHA512
7168d00268160e845291dca9351fbc8c1cfc155931f911e3ab57cfd5e2d1c04aa022fc4623a9d67fd3b199f1492003019d2f1611a8919d1ad5e60bf76decb177
Malware Config
Extracted
recordbreaker
http://5.252.22.107/
http://77.91.102.115/
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Processes:
resource yara_rule behavioral2/memory/3924-130-0x0000000000AC0000-0x0000000001283000-memory.dmp themida behavioral2/memory/3924-131-0x0000000000AC0000-0x0000000001283000-memory.dmp themida behavioral2/memory/3924-132-0x0000000000AC0000-0x0000000001283000-memory.dmp themida behavioral2/memory/3924-134-0x0000000000AC0000-0x0000000001283000-memory.dmp themida behavioral2/memory/3924-135-0x0000000000AC0000-0x0000000001283000-memory.dmp themida behavioral2/memory/3924-137-0x0000000000AC0000-0x0000000001283000-memory.dmp themida -
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup.exepid process 3924 Setup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Setup.exepid process 3924 Setup.exe 3924 Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3924