Analysis

  • max time kernel
    39s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16/06/2022, 16:33

General

  • Target

    12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3.exe

  • Size

    7.0MB

  • MD5

    ada1cf2fb2812726f5de2f8172da8ded

  • SHA1

    4d04ec7384fb5c76ae17cff1280abedc4e8ebbbe

  • SHA256

    12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3

  • SHA512

    1806bcea0926addc3a73958c98309a3b455ad25667da42832819b4d3576321989dfc2a2ee8a52534a5e7c4a0e31204a7e34e2b3372c7dba12cfe9c293490730c

Malware Config

Signatures

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • suricata: ET MALWARE Generic Stealer Config Download Request

    suricata: ET MALWARE Generic Stealer Config Download Request

  • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3.exe
    "C:\Users\Admin\AppData\Local\Temp\12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/316-54-0x0000000000BC0000-0x00000000012CF000-memory.dmp

    Filesize

    7.1MB

  • memory/316-55-0x0000000076431000-0x0000000076433000-memory.dmp

    Filesize

    8KB

  • memory/316-56-0x0000000000BC0000-0x00000000012CF000-memory.dmp

    Filesize

    7.1MB

  • memory/316-57-0x0000000000BC0000-0x00000000012CF000-memory.dmp

    Filesize

    7.1MB