Analysis

  • max time kernel
    26s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 03:18

General

  • Target

    20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe

  • Size

    300KB

  • MD5

    5a7d42ef154a45a749d3ab174323f303

  • SHA1

    51bbb8e59761636e26c985f230d22d8282917594

  • SHA256

    20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161

  • SHA512

    7a6c2fb849cf6886f6a93f57e00db0159cbe1a9f8a592ce928b8e6cb25c5415b63ec8d55c54da8c32363447587f50721b8fccceaa6c3d91c37c400d72f25b4c7

Malware Config

Extracted

Family

recordbreaker

C2

http://51.195.166.201/

Signatures

  • Raccoon ver2 5 IoCs

    Raccoon ver2.

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • suricata: ET MALWARE Generic Stealer Config Download Request

    suricata: ET MALWARE Generic Stealer Config Download Request

  • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe
    "C:\Users\Admin\AppData\Local\Temp\20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
        PID:916

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/916-56-0x0000000000080000-0x0000000000092000-memory.dmp

      Filesize

      72KB

    • memory/916-57-0x0000000000080000-0x0000000000092000-memory.dmp

      Filesize

      72KB

    • memory/916-59-0x0000000000080000-0x0000000000092000-memory.dmp

      Filesize

      72KB

    • memory/916-61-0x0000000000080000-0x0000000000092000-memory.dmp

      Filesize

      72KB

    • memory/916-62-0x0000000000080000-0x0000000000092000-memory.dmp

      Filesize

      72KB

    • memory/916-65-0x0000000000407486-mapping.dmp

    • memory/916-66-0x0000000000080000-0x0000000000092000-memory.dmp

      Filesize

      72KB

    • memory/916-69-0x0000000000080000-0x0000000000092000-memory.dmp

      Filesize

      72KB

    • memory/916-72-0x0000000000080000-0x0000000000092000-memory.dmp

      Filesize

      72KB

    • memory/1684-54-0x0000000000A40000-0x0000000000A90000-memory.dmp

      Filesize

      320KB

    • memory/1684-55-0x0000000075761000-0x0000000075763000-memory.dmp

      Filesize

      8KB