Analysis
-
max time kernel
100s -
max time network
182s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21/06/2022, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe
Resource
win10-20220414-en
General
-
Target
0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe
-
Size
1.4MB
-
MD5
3489c407c7328f4976d5b490aad8b145
-
SHA1
992a53af7a34ed38ebdac5517e067ac029a4bdb2
-
SHA256
0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262
-
SHA512
e3c479f3c46e5bb036129fe14e2eb42b0bfa4d0fd80af0617a953f7f86f1deb13af778272d07c4ec24785469681ca3d748f676ab8597c46e944f09bf8ad25e2f
Malware Config
Extracted
recordbreaker
http://51.195.166.184/
Signatures
-
Raccoon ver2 1 IoCs
Raccoon ver2.
resource yara_rule behavioral2/memory/4284-320-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4780 set thread context of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4908 set thread context of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4780 wrote to memory of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4780 wrote to memory of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4780 wrote to memory of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4780 wrote to memory of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4780 wrote to memory of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4780 wrote to memory of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4780 wrote to memory of 4908 4780 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 69 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70 PID 4908 wrote to memory of 4284 4908 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"C:\Users\Admin\AppData\Local\Temp\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe"3⤵PID:4284
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262.exe.log
Filesize1KB
MD54c83e2909de0fa862b2a74822ccd412f
SHA1235284ce2282b0a6bfeebd608760711ab734e771
SHA256fc5fdf72d992f88bce9acc3bd7d74ca8cdede2e474b360f357d7de73c4d4ba10
SHA512bc38789043d623ff420dff0783e52ef60c2437d8417f0bb96bd311ef5338a00da43126b6dade832cb1f772746238a9aab0eacef6296e98dace12b33e229964d0