Analysis
-
max time kernel
26s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 03:18
Static task
static1
Behavioral task
behavioral1
Sample
20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe
Resource
win10-20220414-en
General
-
Target
20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe
-
Size
300KB
-
MD5
5a7d42ef154a45a749d3ab174323f303
-
SHA1
51bbb8e59761636e26c985f230d22d8282917594
-
SHA256
20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161
-
SHA512
7a6c2fb849cf6886f6a93f57e00db0159cbe1a9f8a592ce928b8e6cb25c5415b63ec8d55c54da8c32363447587f50721b8fccceaa6c3d91c37c400d72f25b4c7
Malware Config
Extracted
recordbreaker
http://51.195.166.201/
Signatures
-
Raccoon ver2 5 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral1/memory/916-61-0x0000000000080000-0x0000000000092000-memory.dmp raccoon_v2 behavioral1/memory/916-62-0x0000000000080000-0x0000000000092000-memory.dmp raccoon_v2 behavioral1/memory/916-66-0x0000000000080000-0x0000000000092000-memory.dmp raccoon_v2 behavioral1/memory/916-69-0x0000000000080000-0x0000000000092000-memory.dmp raccoon_v2 behavioral1/memory/916-72-0x0000000000080000-0x0000000000092000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exedescription pid Process procid_target PID 1684 set thread context of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exedescription pid Process Token: SeDebugPrivilege 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exedescription pid Process procid_target PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28 PID 1684 wrote to memory of 916 1684 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe"C:\Users\Admin\AppData\Local\Temp\20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:916
-