Analysis

  • max time kernel
    165s
  • max time network
    186s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    21-06-2022 03:04

General

  • Target

    084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe

  • Size

    4.5MB

  • MD5

    66ceefa68617c0dcde346c1a47ad39d9

  • SHA1

    ce567ad5355b684df7bb717d7908d210f2ea92c3

  • SHA256

    084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0

  • SHA512

    cc867bd8c776b5274e2a1e3e83714ec10ee6e4b7e97c9038e37f22a09138d5509c7c12d76a9eb67ded6ec6ee9f9d136b1147bc0350581a192d9d20e9acd7dda4

Malware Config

Extracted

Family

recordbreaker

C2

http://45.153.230.183/

http://5.252.23.110/

Signatures

  • Raccoon ver2 4 IoCs

    Raccoon ver2.

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe
    "C:\Users\Admin\AppData\Local\Temp\084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4696

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4696-117-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-118-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-119-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-120-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-121-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-122-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-123-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-124-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-125-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-126-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-127-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-129-0x0000000000F20000-0x000000000195D000-memory.dmp
    Filesize

    10.2MB

  • memory/4696-130-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-128-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-131-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-132-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-133-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-134-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-135-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-136-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-137-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-138-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-139-0x0000000000F20000-0x000000000195D000-memory.dmp
    Filesize

    10.2MB

  • memory/4696-144-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-145-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-146-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-147-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-148-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-149-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-150-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-151-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-152-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-153-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-154-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-155-0x0000000000F20000-0x000000000195D000-memory.dmp
    Filesize

    10.2MB

  • memory/4696-156-0x0000000000F20000-0x000000000195D000-memory.dmp
    Filesize

    10.2MB

  • memory/4696-157-0x0000000000F20000-0x000000000195D000-memory.dmp
    Filesize

    10.2MB

  • memory/4696-158-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-159-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-160-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-161-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-162-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-163-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-164-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-165-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-166-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-167-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-168-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-169-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-170-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-171-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-172-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-173-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-174-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-175-0x0000000077670000-0x00000000777FE000-memory.dmp
    Filesize

    1.6MB

  • memory/4696-176-0x0000000000F20000-0x000000000195D000-memory.dmp
    Filesize

    10.2MB

  • memory/4696-177-0x0000000000F20000-0x000000000195D000-memory.dmp
    Filesize

    10.2MB