Analysis
-
max time kernel
39s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 13:48
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
Setup.exe
-
Size
387.1MB
-
MD5
563eb6fe83d4f1fe97d20fb20c672601
-
SHA1
83ef3ab94232bdbac57ca383fe2860fe67cbd00f
-
SHA256
e8fcd67a323af737214206338dc25679de1e4afa55c4a3ffe775f9b4a578413a
-
SHA512
ca054706ec64c6c322e2e5e038a5b3446f0932850d08cc18ae1c64754ba8122f551f54af77a1e9cc27d7713433500039477814f826efe403a9f02ad9f80a4324
Malware Config
Extracted
Family
recordbreaker
C2
http://45.133.216.249/
http://146.19.75.8/
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Processes:
resource yara_rule behavioral1/memory/912-55-0x00000000012B0000-0x0000000001F0C000-memory.dmp vmprotect behavioral1/memory/912-60-0x00000000012B0000-0x0000000001F0C000-memory.dmp vmprotect behavioral1/memory/912-61-0x00000000012B0000-0x0000000001F0C000-memory.dmp vmprotect behavioral1/memory/912-63-0x00000000012B0000-0x0000000001F0C000-memory.dmp vmprotect behavioral1/memory/912-64-0x00000000012B0000-0x0000000001F0C000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Processes:
resource yara_rule behavioral1/memory/912-55-0x00000000012B0000-0x0000000001F0C000-memory.dmp themida behavioral1/memory/912-60-0x00000000012B0000-0x0000000001F0C000-memory.dmp themida behavioral1/memory/912-61-0x00000000012B0000-0x0000000001F0C000-memory.dmp themida behavioral1/memory/912-63-0x00000000012B0000-0x0000000001F0C000-memory.dmp themida behavioral1/memory/912-64-0x00000000012B0000-0x0000000001F0C000-memory.dmp themida -
Processes:
Setup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup.exepid Process 912 Setup.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Setup.exepid Process 912 Setup.exe 912 Setup.exe 912 Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:912