Analysis
-
max time kernel
116s -
max time network
312s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21/06/2022, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe
Resource
win10-20220414-en
General
-
Target
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe
-
Size
1.4MB
-
MD5
6a4fe454abe491c0c24c8cfd3c759900
-
SHA1
0df05c838d2d73f817f25a3441dfe4dc67e26f3d
-
SHA256
f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11
-
SHA512
ec7af66871665f74c87129d2dbda8ceb2be8ecfe64143fd523bdbe97f62d6e37153d9131871c6e1fe7fbe8a71c9a10dfdc277360f1c38f51e08f61b5f8a54825
Malware Config
Extracted
recordbreaker
http://82.202.172.185/
Signatures
-
Raccoon ver2 2 IoCs
Raccoon ver2.
resource yara_rule behavioral2/memory/2548-178-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 behavioral2/memory/2548-227-0x0000000000400000-0x0000000000412000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4048 set thread context of 2548 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 68 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4048 wrote to memory of 2560 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 67 PID 4048 wrote to memory of 2560 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 67 PID 4048 wrote to memory of 2560 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 67 PID 4048 wrote to memory of 2548 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 68 PID 4048 wrote to memory of 2548 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 68 PID 4048 wrote to memory of 2548 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 68 PID 4048 wrote to memory of 2548 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 68 PID 4048 wrote to memory of 2548 4048 f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe"C:\Users\Admin\AppData\Local\Temp\f97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2548
-