Analysis
-
max time kernel
65s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 03:25
Static task
static1
Behavioral task
behavioral1
Sample
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe
Resource
win10-20220414-en
General
-
Target
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe
-
Size
1.4MB
-
MD5
6a4fe454abe491c0c24c8cfd3c759900
-
SHA1
0df05c838d2d73f817f25a3441dfe4dc67e26f3d
-
SHA256
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11
-
SHA512
ec7af66871665f74c87129d2dbda8ceb2be8ecfe64143fd523bdbe97f62d6e37153d9131871c6e1fe7fbe8a71c9a10dfdc277360f1c38f51e08f61b5f8a54825
Malware Config
Extracted
recordbreaker
http://82.202.172.185/
Signatures
-
Raccoon ver2 3 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral1/memory/1576-61-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 behavioral1/memory/1576-64-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 behavioral1/memory/1576-66-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exedescription pid Process procid_target PID 1768 set thread context of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exepid Process 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exedescription pid Process procid_target PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26 PID 1768 wrote to memory of 1576 1768 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe"C:\Users\Admin\AppData\Local\Temp\f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:1576
-