Analysis
-
max time kernel
507s -
max time network
515s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 13:00
Static task
static1
Behavioral task
behavioral1
Sample
setup/Pre-Activated-FullSetup.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
setup/Pre-Activated-FullSetup.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
setup/Setup-Crack.exe
Resource
win7-20220414-en
General
-
Target
setup/Pre-Activated-FullSetup.exe
-
Size
428.2MB
-
MD5
14027e925ba400d5d3c85269bfb85196
-
SHA1
73e374955b569a9aaa7a0cd37ffdd9b95740a2f0
-
SHA256
86d508d420ebd5516b7c9b0f339357a191340d7fd6ae47cd1fb43f3649d8a556
-
SHA512
8fbd8df47b0359694fa6d0956cc4e5fd75316313a5c7aaef5214e61c1662a0d7755ecc19a453cd43feddb3e53ea8fcfe346b5f19c2501590607d004002749fa8
Malware Config
Extracted
recordbreaker
http://45.150.67.175/
http://45.133.216.170/
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Pre-Activated-FullSetup.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Pre-Activated-FullSetup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Pre-Activated-FullSetup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Pre-Activated-FullSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Pre-Activated-FullSetup.exe -
Processes:
resource yara_rule behavioral2/memory/2572-130-0x0000000000E90000-0x00000000016F1000-memory.dmp themida behavioral2/memory/2572-131-0x0000000000E90000-0x00000000016F1000-memory.dmp themida behavioral2/memory/2572-132-0x0000000000E90000-0x00000000016F1000-memory.dmp themida behavioral2/memory/2572-134-0x0000000000E90000-0x00000000016F1000-memory.dmp themida behavioral2/memory/2572-135-0x0000000000E90000-0x00000000016F1000-memory.dmp themida -
Processes:
Pre-Activated-FullSetup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Pre-Activated-FullSetup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Pre-Activated-FullSetup.exepid Process 2572 Pre-Activated-FullSetup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Pre-Activated-FullSetup.exepid Process 2572 Pre-Activated-FullSetup.exe 2572 Pre-Activated-FullSetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup\Pre-Activated-FullSetup.exe"C:\Users\Admin\AppData\Local\Temp\setup\Pre-Activated-FullSetup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2572