Analysis
-
max time kernel
310s -
max time network
323s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-06-2022 03:43
Behavioral task
behavioral1
Sample
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
Resource
win7-20220414-en
General
-
Target
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
-
Size
392.0MB
-
MD5
8a121fd92c5ccf804f7682de0aa4f685
-
SHA1
5723e27841445373e1816ef142aa80970ae1d469
-
SHA256
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437
-
SHA512
368aa322e2884a75d4afa16c4c092f1cbf989f1fa8193744be224bed474c7fa13acf0996944b3bab74e72cf7fb8b53e50a6ef3a454f12c4a4c7ecb0bc80503cd
Malware Config
Extracted
recordbreaker
http://violance-heck.site/
http://roll-rave.site/
Signatures
-
Raccoon ver2 4 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral2/memory/1752-158-0x00000000010E0000-0x0000000001AD5000-memory.dmp raccoon_v2 behavioral2/memory/1752-159-0x00000000010E0000-0x0000000001AD5000-memory.dmp raccoon_v2 behavioral2/memory/1752-181-0x00000000010E0000-0x0000000001AD5000-memory.dmp raccoon_v2 behavioral2/memory/1752-182-0x00000000010E0000-0x0000000001AD5000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
Processes:
resource yara_rule behavioral2/memory/1752-129-0x00000000010E0000-0x0000000001AD5000-memory.dmp vmprotect behavioral2/memory/1752-141-0x00000000010E0000-0x0000000001AD5000-memory.dmp vmprotect behavioral2/memory/1752-157-0x00000000010E0000-0x0000000001AD5000-memory.dmp vmprotect behavioral2/memory/1752-158-0x00000000010E0000-0x0000000001AD5000-memory.dmp vmprotect behavioral2/memory/1752-159-0x00000000010E0000-0x0000000001AD5000-memory.dmp vmprotect behavioral2/memory/1752-181-0x00000000010E0000-0x0000000001AD5000-memory.dmp vmprotect behavioral2/memory/1752-182-0x00000000010E0000-0x0000000001AD5000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
Processes:
resource yara_rule behavioral2/memory/1752-129-0x00000000010E0000-0x0000000001AD5000-memory.dmp themida behavioral2/memory/1752-141-0x00000000010E0000-0x0000000001AD5000-memory.dmp themida behavioral2/memory/1752-157-0x00000000010E0000-0x0000000001AD5000-memory.dmp themida behavioral2/memory/1752-158-0x00000000010E0000-0x0000000001AD5000-memory.dmp themida behavioral2/memory/1752-159-0x00000000010E0000-0x0000000001AD5000-memory.dmp themida behavioral2/memory/1752-181-0x00000000010E0000-0x0000000001AD5000-memory.dmp themida behavioral2/memory/1752-182-0x00000000010E0000-0x0000000001AD5000-memory.dmp themida -
Processes:
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exepid Process 1752 b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exepid Process 1752 b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe 1752 b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe"C:\Users\Admin\AppData\Local\Temp\b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1752