Analysis
-
max time kernel
165s -
max time network
186s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-06-2022 03:04
Static task
static1
Behavioral task
behavioral1
Sample
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe
Resource
win10-20220414-en
General
-
Target
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe
-
Size
4.5MB
-
MD5
66ceefa68617c0dcde346c1a47ad39d9
-
SHA1
ce567ad5355b684df7bb717d7908d210f2ea92c3
-
SHA256
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0
-
SHA512
cc867bd8c776b5274e2a1e3e83714ec10ee6e4b7e97c9038e37f22a09138d5509c7c12d76a9eb67ded6ec6ee9f9d136b1147bc0350581a192d9d20e9acd7dda4
Malware Config
Extracted
recordbreaker
http://45.153.230.183/
http://5.252.23.110/
Signatures
-
Raccoon ver2 4 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral2/memory/4696-156-0x0000000000F20000-0x000000000195D000-memory.dmp raccoon_v2 behavioral2/memory/4696-157-0x0000000000F20000-0x000000000195D000-memory.dmp raccoon_v2 behavioral2/memory/4696-176-0x0000000000F20000-0x000000000195D000-memory.dmp raccoon_v2 behavioral2/memory/4696-177-0x0000000000F20000-0x000000000195D000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe -
Processes:
resource yara_rule behavioral2/memory/4696-129-0x0000000000F20000-0x000000000195D000-memory.dmp themida behavioral2/memory/4696-139-0x0000000000F20000-0x000000000195D000-memory.dmp themida behavioral2/memory/4696-155-0x0000000000F20000-0x000000000195D000-memory.dmp themida behavioral2/memory/4696-156-0x0000000000F20000-0x000000000195D000-memory.dmp themida behavioral2/memory/4696-157-0x0000000000F20000-0x000000000195D000-memory.dmp themida behavioral2/memory/4696-176-0x0000000000F20000-0x000000000195D000-memory.dmp themida behavioral2/memory/4696-177-0x0000000000F20000-0x000000000195D000-memory.dmp themida -
Processes:
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exepid Process 4696 084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exepid Process 4696 084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe 4696 084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe"C:\Users\Admin\AppData\Local\Temp\084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4696