Analysis
-
max time kernel
164s -
max time network
196s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-06-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe
Resource
win10-20220414-en
General
-
Target
567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe
-
Size
2.6MB
-
MD5
e3a845bd8c0bf6f44104f8e31216929a
-
SHA1
e94f44c5c4aee2987c1e912b1616ef5ab316a8da
-
SHA256
567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10
-
SHA512
2ecebc4bd993a8f2d2adee95128131b9de07827a6724af9324843e554126bd4764543d192074bcace88a033d6b0593adf3b5289623e7f6998566bcc77900718b
Malware Config
Extracted
recordbreaker
http://91.240.84.222/
Signatures
-
Raccoon ver2 3 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral2/memory/1496-153-0x0000000001190000-0x0000000001814000-memory.dmp raccoon_v2 behavioral2/memory/1496-154-0x0000000001190000-0x0000000001814000-memory.dmp raccoon_v2 behavioral2/memory/1496-173-0x0000000001190000-0x0000000001814000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe -
Processes:
resource yara_rule behavioral2/memory/1496-136-0x0000000001190000-0x0000000001814000-memory.dmp themida behavioral2/memory/1496-152-0x0000000001190000-0x0000000001814000-memory.dmp themida behavioral2/memory/1496-153-0x0000000001190000-0x0000000001814000-memory.dmp themida behavioral2/memory/1496-154-0x0000000001190000-0x0000000001814000-memory.dmp themida behavioral2/memory/1496-173-0x0000000001190000-0x0000000001814000-memory.dmp themida -
Processes:
567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exepid Process 1496 567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe"C:\Users\Admin\AppData\Local\Temp\567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1496