Analysis
-
max time kernel
102s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21/06/2022, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe
Resource
win10-20220414-en
General
-
Target
0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe
-
Size
1.4MB
-
MD5
3489c407c7328f4976d5b490aad8b145
-
SHA1
992a53af7a34ed38ebdac5517e067ac029a4bdb2
-
SHA256
0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262
-
SHA512
e3c479f3c46e5bb036129fe14e2eb42b0bfa4d0fd80af0617a953f7f86f1deb13af778272d07c4ec24785469681ca3d748f676ab8597c46e944f09bf8ad25e2f
Malware Config
Extracted
recordbreaker
http://51.195.166.184/
Signatures
-
Raccoon ver2 5 IoCs
Raccoon ver2.
resource yara_rule behavioral1/memory/1296-83-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 behavioral1/memory/1296-81-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 behavioral1/memory/1296-80-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 behavioral1/memory/1296-86-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 behavioral1/memory/1296-88-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 644 set thread context of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 1168 set thread context of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe Token: SeDebugPrivilege 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 644 wrote to memory of 2044 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 28 PID 644 wrote to memory of 2044 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 28 PID 644 wrote to memory of 2044 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 28 PID 644 wrote to memory of 2044 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 28 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 644 wrote to memory of 1168 644 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 29 PID 1168 wrote to memory of 672 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 30 PID 1168 wrote to memory of 672 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 30 PID 1168 wrote to memory of 672 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 30 PID 1168 wrote to memory of 672 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 30 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31 PID 1168 wrote to memory of 1296 1168 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"2⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"3⤵PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"3⤵PID:1296
-
-