Analysis

  • max time kernel
    43s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 03:44

General

  • Target

    9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47.exe

  • Size

    4.6MB

  • MD5

    9c6bae680b7a5c3f7a71e7998c95c909

  • SHA1

    f9b3c0b39eb17d54954dc248aa21f681ae58efb4

  • SHA256

    9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47

  • SHA512

    059337aa5cbb1209df24e13be812778874eed9534f2064251118f4760760d237a74bbaca152d147cc6aad057f79d92d9d429d69a27ba5e6c102a1a7f0a910eac

Malware Config

Signatures

  • Raccoon ver2 2 IoCs

    Raccoon ver2.

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • suricata: ET MALWARE Generic Stealer Config Download Request

    suricata: ET MALWARE Generic Stealer Config Download Request

  • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47.exe
    "C:\Users\Admin\AppData\Local\Temp\9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2044-54-0x0000000075441000-0x0000000075443000-memory.dmp

    Filesize

    8KB

  • memory/2044-56-0x0000000077470000-0x00000000775F0000-memory.dmp

    Filesize

    1.5MB

  • memory/2044-55-0x00000000013C0000-0x0000000001856000-memory.dmp

    Filesize

    4.6MB

  • memory/2044-57-0x00000000013C0000-0x0000000001856000-memory.dmp

    Filesize

    4.6MB

  • memory/2044-58-0x0000000077470000-0x00000000775F0000-memory.dmp

    Filesize

    1.5MB