Analysis

  • max time kernel
    60s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21/06/2022, 03:03

General

  • Target

    9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe

  • Size

    407.2MB

  • MD5

    945240b56128fb9b334ca47726b0a87e

  • SHA1

    0a5bbfb80c04c7c832c29be1557818488a1a54d9

  • SHA256

    9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8

  • SHA512

    6fdf319e3fed59e23784b4961b2c5d15bd94c6176c41b7087d996afa95fd7f8397639efb389f267d46f436fe2fb0cf180ff512c34f5a86a7498724f6f7065cfd

Malware Config

Extracted

Family

recordbreaker

C2

http://45.140.146.169/

Signatures

  • Raccoon ver2 4 IoCs

    Raccoon ver2.

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe
    "C:\Users\Admin\AppData\Local\Temp\9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1812-54-0x0000000000FE0000-0x0000000001680000-memory.dmp

    Filesize

    6.6MB

  • memory/1812-55-0x00000000763C1000-0x00000000763C3000-memory.dmp

    Filesize

    8KB

  • memory/1812-56-0x0000000000FE0000-0x0000000001680000-memory.dmp

    Filesize

    6.6MB

  • memory/1812-57-0x0000000000FE0000-0x0000000001680000-memory.dmp

    Filesize

    6.6MB

  • memory/1812-58-0x0000000000FE0000-0x0000000001680000-memory.dmp

    Filesize

    6.6MB

  • memory/1812-59-0x0000000077690000-0x0000000077810000-memory.dmp

    Filesize

    1.5MB

  • memory/1812-60-0x0000000000FE0000-0x0000000001680000-memory.dmp

    Filesize

    6.6MB

  • memory/1812-61-0x0000000000FE0000-0x0000000001680000-memory.dmp

    Filesize

    6.6MB

  • memory/1812-62-0x0000000077690000-0x0000000077810000-memory.dmp

    Filesize

    1.5MB

  • memory/1812-63-0x0000000077690000-0x0000000077810000-memory.dmp

    Filesize

    1.5MB