Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 13:00
Static task
static1
Behavioral task
behavioral1
Sample
setup/Pre-Activated-FullSetup.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
setup/Pre-Activated-FullSetup.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
setup/Setup-Crack.exe
Resource
win7-20220414-en
General
-
Target
setup/Setup-Crack.exe
-
Size
428.2MB
-
MD5
49a39ad81be36f89ba9f49f69f943e17
-
SHA1
3e56f28082e2f2fb2d96406392e6c26304f1961d
-
SHA256
c6b12597fb67318044f589badb24859544cafc6b53bba4ae9ea9f80d856c8d15
-
SHA512
36ec98255a9b277740530728adb0a21aa55192565c4ba0dd8f44e8e09bc5c1a519f5108a006baed366cdc3504d81425a44aba266f8bf43f18353d278e31115eb
Malware Config
Extracted
recordbreaker
http://45.150.67.175/
http://45.133.216.170/
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup-Crack.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup-Crack.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup-Crack.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup-Crack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup-Crack.exe -
Processes:
resource yara_rule behavioral3/memory/872-55-0x0000000000180000-0x00000000009DD000-memory.dmp themida behavioral3/memory/872-56-0x0000000000180000-0x00000000009DD000-memory.dmp themida behavioral3/memory/872-57-0x0000000000180000-0x00000000009DD000-memory.dmp themida behavioral3/memory/872-58-0x0000000077880000-0x0000000077A00000-memory.dmp themida behavioral3/memory/872-59-0x0000000000180000-0x00000000009DD000-memory.dmp themida -
Processes:
Setup-Crack.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup-Crack.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup-Crack.exepid Process 872 Setup-Crack.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Setup-Crack.exepid Process 872 Setup-Crack.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup\Setup-Crack.exe"C:\Users\Admin\AppData\Local\Temp\setup\Setup-Crack.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:872