Analysis
-
max time kernel
86s -
max time network
182s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-06-2022 03:03
Static task
static1
Behavioral task
behavioral1
Sample
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe
Resource
win10-20220414-en
General
-
Target
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe
-
Size
407.2MB
-
MD5
945240b56128fb9b334ca47726b0a87e
-
SHA1
0a5bbfb80c04c7c832c29be1557818488a1a54d9
-
SHA256
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8
-
SHA512
6fdf319e3fed59e23784b4961b2c5d15bd94c6176c41b7087d996afa95fd7f8397639efb389f267d46f436fe2fb0cf180ff512c34f5a86a7498724f6f7065cfd
Malware Config
Extracted
recordbreaker
http://45.140.146.169/
Signatures
-
Raccoon ver2 4 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral2/memory/2116-148-0x0000000000990000-0x0000000001030000-memory.dmp raccoon_v2 behavioral2/memory/2116-149-0x0000000000990000-0x0000000001030000-memory.dmp raccoon_v2 behavioral2/memory/2116-153-0x0000000000990000-0x0000000001030000-memory.dmp raccoon_v2 behavioral2/memory/2116-169-0x0000000000990000-0x0000000001030000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe -
Processes:
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exepid Process 2116 9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exepid Process 2116 9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe 2116 9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe"C:\Users\Admin\AppData\Local\Temp\9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2116