Analysis

  • max time kernel
    71s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18/06/2022, 14:44

General

  • Target

    3e2d0c1798a20041337629893cb2b2ea.exe

  • Size

    465.0MB

  • MD5

    d15cd2b908be614284c9f1ed91761313

  • SHA1

    35d1fc993d109c42393808c58d9c4222edc0991d

  • SHA256

    aab6ee6b868c8b96ef1e19a63d40b9f3bf4353866c970e2adf627151c6326fce

  • SHA512

    e1d65e205703c8b5185b162f49c4e5c2c72ecb3798a1e1143830cbe7e2ac991a3a269b0a2566483b67bba7252414f7595b48a2bcc69bdc64f4c8c8243bc6086c

Malware Config

Extracted

Family

recordbreaker

C2

http://146.19.247.52/

http://77.91.102.115/

Signatures

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e2d0c1798a20041337629893cb2b2ea.exe
    "C:\Users\Admin\AppData\Local\Temp\3e2d0c1798a20041337629893cb2b2ea.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2520-130-0x0000000000760000-0x0000000000EE7000-memory.dmp

    Filesize

    7.5MB

  • memory/2520-131-0x0000000000760000-0x0000000000EE7000-memory.dmp

    Filesize

    7.5MB

  • memory/2520-132-0x0000000000760000-0x0000000000EE7000-memory.dmp

    Filesize

    7.5MB

  • memory/2520-133-0x0000000077730000-0x00000000778D3000-memory.dmp

    Filesize

    1.6MB

  • memory/2520-134-0x0000000000760000-0x0000000000EE7000-memory.dmp

    Filesize

    7.5MB

  • memory/2520-135-0x0000000077730000-0x00000000778D3000-memory.dmp

    Filesize

    1.6MB

  • memory/2520-136-0x0000000077730000-0x00000000778D3000-memory.dmp

    Filesize

    1.6MB