Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    19-06-2022 17:07

General

  • Target

    63645a9e1f5e77ba3c75366f3a14ab87.exe

  • Size

    768KB

  • MD5

    63645a9e1f5e77ba3c75366f3a14ab87

  • SHA1

    ed1497c47dc283118bbc57d49cd9f354785cf73d

  • SHA256

    2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

  • SHA512

    4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

Malware Config

Extracted

Family

recordbreaker

C2

http://136.244.65.99/

http://140.82.52.55/

Signatures

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • suricata: ET MALWARE Generic Stealer Config Download Request

    suricata: ET MALWARE Generic Stealer Config Download Request

  • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63645a9e1f5e77ba3c75366f3a14ab87.exe
    "C:\Users\Admin\AppData\Local\Temp\63645a9e1f5e77ba3c75366f3a14ab87.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1500
    • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe
      "C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe"
      2⤵
      • Executes dropped EXE
      PID:3696
    • C:\Users\Admin\AppData\Local\Temp\63645a9e1f5e77ba3c75366f3a14ab87.exe
      C:\Users\Admin\AppData\Local\Temp\63645a9e1f5e77ba3c75366f3a14ab87.exe
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\5816E44T.exe
        "C:\Users\Admin\AppData\Local\Temp\5816E44T.exe"
        3⤵
        • Executes dropped EXE
        PID:4888
      • C:\Users\Admin\AppData\Local\Temp\QB92hYiQ.exe
        "C:\Users\Admin\AppData\Local\Temp\QB92hYiQ.exe"
        3⤵
          PID:4116
        • C:\Users\Admin\AppData\Local\Temp\HT9hPv5h.exe
          "C:\Users\Admin\AppData\Local\Temp\HT9hPv5h.exe"
          3⤵
            PID:3808
          • C:\Users\Admin\AppData\Local\Temp\0y1yl1cb.exe
            "C:\Users\Admin\AppData\Local\Temp\0y1yl1cb.exe"
            3⤵
              PID:1672

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\mozglue.dll

          Filesize

          612KB

          MD5

          f07d9977430e762b563eaadc2b94bbfa

          SHA1

          da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

          SHA256

          4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

          SHA512

          6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

        • C:\Users\Admin\AppData\LocalLow\nss3.dll

          Filesize

          1.9MB

          MD5

          f67d08e8c02574cbc2f1122c53bfb976

          SHA1

          6522992957e7e4d074947cad63189f308a80fcf2

          SHA256

          c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

          SHA512

          2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

        • C:\Users\Admin\AppData\LocalLow\sqlite3.dll

          Filesize

          1.0MB

          MD5

          dbf4f8dcefb8056dc6bae4b67ff810ce

          SHA1

          bbac1dd8a07c6069415c04b62747d794736d0689

          SHA256

          47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

          SHA512

          b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

        • C:\Users\Admin\AppData\Local\Temp\0y1yl1cb.exe

          Filesize

          985KB

          MD5

          0e5c23d14dc6448fff9ee7fe356cee81

          SHA1

          fae0a0acbf6e174b22d3fe0ff6cfe332a462b33b

          SHA256

          a1098873c94184cf24edd24c3883f4be52224575da34f0469ad4a525c852ef28

          SHA512

          6363c36750aa00e9f521d402f10f37745bd0f8a4ab2cfddbf342bce7743b8a853016e2afc58982f719d316d73fe255841276966a508eb3ccb7ce83733ff12b03

        • C:\Users\Admin\AppData\Local\Temp\0y1yl1cb.exe

          Filesize

          985KB

          MD5

          0e5c23d14dc6448fff9ee7fe356cee81

          SHA1

          fae0a0acbf6e174b22d3fe0ff6cfe332a462b33b

          SHA256

          a1098873c94184cf24edd24c3883f4be52224575da34f0469ad4a525c852ef28

          SHA512

          6363c36750aa00e9f521d402f10f37745bd0f8a4ab2cfddbf342bce7743b8a853016e2afc58982f719d316d73fe255841276966a508eb3ccb7ce83733ff12b03

        • C:\Users\Admin\AppData\Local\Temp\5816E44T.exe

          Filesize

          43KB

          MD5

          9c779aff9633f41e48fd1d61ad0fec74

          SHA1

          56ddac67f989e7368c343a8b3de66029e7190c73

          SHA256

          3c90fb39f5c4023f142b1b71d0172cd2a5caad6d469ea88f3ee7458cac81b064

          SHA512

          52f40833306f2cf4144a77007eda52570c90bdd9add9cd59a6c82b9eeb7b1fdd67e02446ed49079a3000fe6892194695c99da7bf87bda19456558c1e067655eb

        • C:\Users\Admin\AppData\Local\Temp\5816E44T.exe

          Filesize

          43KB

          MD5

          9c779aff9633f41e48fd1d61ad0fec74

          SHA1

          56ddac67f989e7368c343a8b3de66029e7190c73

          SHA256

          3c90fb39f5c4023f142b1b71d0172cd2a5caad6d469ea88f3ee7458cac81b064

          SHA512

          52f40833306f2cf4144a77007eda52570c90bdd9add9cd59a6c82b9eeb7b1fdd67e02446ed49079a3000fe6892194695c99da7bf87bda19456558c1e067655eb

        • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

          Filesize

          21KB

          MD5

          f35a031075f711d05262e547d028ae86

          SHA1

          9c9e3bdf907fcfa959910cd9c752e297765ccf80

          SHA256

          3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

          SHA512

          ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

        • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

          Filesize

          21KB

          MD5

          f35a031075f711d05262e547d028ae86

          SHA1

          9c9e3bdf907fcfa959910cd9c752e297765ccf80

          SHA256

          3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

          SHA512

          ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

        • C:\Users\Admin\AppData\Local\Temp\HT9hPv5h.exe

          Filesize

          736KB

          MD5

          6b30061dc516d9c8537abd504b0321a8

          SHA1

          8845f0ef36d4e72d107e6b2484dad4f71b9ed994

          SHA256

          5264fb4ba5dac27b8b5d0602963d7401b58f93509b10686302f345691c55797e

          SHA512

          7ddb3e9fd719073cd02da3327bbd484a3dd1b35ef527efaca919f313387308f4e0dfcbcdf32d71136f495040d2433fc7a6c8443873d957897d8263dda5bf3830

        • C:\Users\Admin\AppData\Local\Temp\HT9hPv5h.exe

          Filesize

          736KB

          MD5

          6b30061dc516d9c8537abd504b0321a8

          SHA1

          8845f0ef36d4e72d107e6b2484dad4f71b9ed994

          SHA256

          5264fb4ba5dac27b8b5d0602963d7401b58f93509b10686302f345691c55797e

          SHA512

          7ddb3e9fd719073cd02da3327bbd484a3dd1b35ef527efaca919f313387308f4e0dfcbcdf32d71136f495040d2433fc7a6c8443873d957897d8263dda5bf3830

        • C:\Users\Admin\AppData\Local\Temp\QB92hYiQ.exe

          Filesize

          1.2MB

          MD5

          ac01d8dba3b961adee1b7cfe37efcfb5

          SHA1

          b134eeeae442f6d449e6170527e2f21ce4f26499

          SHA256

          ad8707472a147dc440da2adbc80dbcd6269ae0d345b8a85081e390fa8d842947

          SHA512

          38a063fd01a1edc086da640e0b2ca0632445d113ff000a96b722ceca3ac0424c85b3a26782aa5146fb30a3e6852549811d2bf21157ef776e0f1812aa6caadc1e

        • C:\Users\Admin\AppData\Local\Temp\QB92hYiQ.exe

          Filesize

          1.2MB

          MD5

          ac01d8dba3b961adee1b7cfe37efcfb5

          SHA1

          b134eeeae442f6d449e6170527e2f21ce4f26499

          SHA256

          ad8707472a147dc440da2adbc80dbcd6269ae0d345b8a85081e390fa8d842947

          SHA512

          38a063fd01a1edc086da640e0b2ca0632445d113ff000a96b722ceca3ac0424c85b3a26782aa5146fb30a3e6852549811d2bf21157ef776e0f1812aa6caadc1e

        • memory/1500-143-0x0000000007EA0000-0x000000000851A000-memory.dmp

          Filesize

          6.5MB

        • memory/1500-152-0x0000000007DB0000-0x0000000007DB8000-memory.dmp

          Filesize

          32KB

        • memory/1500-145-0x0000000007AA0000-0x0000000007AD2000-memory.dmp

          Filesize

          200KB

        • memory/1500-146-0x000000006FFC0000-0x000000007000C000-memory.dmp

          Filesize

          304KB

        • memory/1500-147-0x0000000007A60000-0x0000000007A7E000-memory.dmp

          Filesize

          120KB

        • memory/1500-148-0x0000000007BB0000-0x0000000007BBA000-memory.dmp

          Filesize

          40KB

        • memory/1500-149-0x0000000007DF0000-0x0000000007E86000-memory.dmp

          Filesize

          600KB

        • memory/1500-150-0x0000000007D60000-0x0000000007D6E000-memory.dmp

          Filesize

          56KB

        • memory/1500-151-0x0000000007DD0000-0x0000000007DEA000-memory.dmp

          Filesize

          104KB

        • memory/1500-141-0x0000000006200000-0x0000000006266000-memory.dmp

          Filesize

          408KB

        • memory/1500-144-0x0000000006D20000-0x0000000006D3A000-memory.dmp

          Filesize

          104KB

        • memory/1500-136-0x0000000000000000-mapping.dmp

        • memory/1500-142-0x0000000006840000-0x000000000685E000-memory.dmp

          Filesize

          120KB

        • memory/1500-137-0x0000000005290000-0x00000000052C6000-memory.dmp

          Filesize

          216KB

        • memory/1500-138-0x0000000005900000-0x0000000005F28000-memory.dmp

          Filesize

          6.2MB

        • memory/1500-139-0x0000000005FC0000-0x0000000005FE2000-memory.dmp

          Filesize

          136KB

        • memory/1500-140-0x0000000006060000-0x00000000060C6000-memory.dmp

          Filesize

          408KB

        • memory/1672-183-0x0000000000590000-0x000000000068C000-memory.dmp

          Filesize

          1008KB

        • memory/1672-179-0x0000000000000000-mapping.dmp

        • memory/1688-161-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1688-160-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1688-158-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1688-157-0x0000000000000000-mapping.dmp

        • memory/1688-182-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3696-153-0x0000000000000000-mapping.dmp

        • memory/3696-156-0x00000000006C0000-0x00000000006CA000-memory.dmp

          Filesize

          40KB

        • memory/3808-174-0x0000000000000000-mapping.dmp

        • memory/3808-177-0x00000000009A0000-0x0000000000A5E000-memory.dmp

          Filesize

          760KB

        • memory/4116-172-0x0000000000FB0000-0x00000000010E0000-memory.dmp

          Filesize

          1.2MB

        • memory/4116-169-0x0000000000000000-mapping.dmp

        • memory/4116-173-0x0000000003BB0000-0x0000000003C26000-memory.dmp

          Filesize

          472KB

        • memory/4116-178-0x00007FFE18B60000-0x00007FFE19621000-memory.dmp

          Filesize

          10.8MB

        • memory/4552-134-0x0000000005C10000-0x0000000005C2E000-memory.dmp

          Filesize

          120KB

        • memory/4552-133-0x00000000014F0000-0x00000000015A2000-memory.dmp

          Filesize

          712KB

        • memory/4552-135-0x0000000005EC0000-0x0000000005F52000-memory.dmp

          Filesize

          584KB

        • memory/4552-132-0x0000000005C60000-0x0000000005CB0000-memory.dmp

          Filesize

          320KB

        • memory/4552-131-0x00000000057F0000-0x0000000005866000-memory.dmp

          Filesize

          472KB

        • memory/4552-130-0x0000000000E00000-0x0000000000EC6000-memory.dmp

          Filesize

          792KB

        • memory/4888-165-0x0000000000000000-mapping.dmp

        • memory/4888-168-0x00000000005F0000-0x0000000000600000-memory.dmp

          Filesize

          64KB