Analysis

  • max time kernel
    144s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    26-06-2022 05:20

General

  • Target

    asdfg.exe

  • Size

    768KB

  • MD5

    63645a9e1f5e77ba3c75366f3a14ab87

  • SHA1

    ed1497c47dc283118bbc57d49cd9f354785cf73d

  • SHA256

    2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

  • SHA512

    4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

Score
10/10

Malware Config

Extracted

Family

recordbreaker

C2

http://136.244.65.99/

http://140.82.52.55/

Signatures

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\asdfg.exe
    "C:\Users\Admin\AppData\Local\Temp\asdfg.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2436
    • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe
      "C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe"
      2⤵
      • Executes dropped EXE
      PID:3112
    • C:\Users\Admin\AppData\Local\Temp\asdfg.exe
      C:\Users\Admin\AppData\Local\Temp\asdfg.exe
      2⤵
        PID:2528
      • C:\Users\Admin\AppData\Local\Temp\asdfg.exe
        C:\Users\Admin\AppData\Local\Temp\asdfg.exe
        2⤵
          PID:2476
        • C:\Users\Admin\AppData\Local\Temp\asdfg.exe
          C:\Users\Admin\AppData\Local\Temp\asdfg.exe
          2⤵
            PID:812

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

          Filesize

          21KB

          MD5

          f35a031075f711d05262e547d028ae86

          SHA1

          9c9e3bdf907fcfa959910cd9c752e297765ccf80

          SHA256

          3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

          SHA512

          ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

        • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

          Filesize

          21KB

          MD5

          f35a031075f711d05262e547d028ae86

          SHA1

          9c9e3bdf907fcfa959910cd9c752e297765ccf80

          SHA256

          3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

          SHA512

          ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

        • memory/812-163-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/812-162-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/812-160-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/812-159-0x0000000000000000-mapping.dmp

        • memory/2436-138-0x00000000051D0000-0x00000000057F8000-memory.dmp

          Filesize

          6.2MB

        • memory/2436-149-0x0000000007530000-0x00000000075C6000-memory.dmp

          Filesize

          600KB

        • memory/2436-136-0x0000000000000000-mapping.dmp

        • memory/2436-139-0x0000000005830000-0x0000000005852000-memory.dmp

          Filesize

          136KB

        • memory/2436-140-0x00000000058D0000-0x0000000005936000-memory.dmp

          Filesize

          408KB

        • memory/2436-141-0x00000000059B0000-0x0000000005A16000-memory.dmp

          Filesize

          408KB

        • memory/2436-142-0x0000000005FB0000-0x0000000005FCE000-memory.dmp

          Filesize

          120KB

        • memory/2436-143-0x0000000007630000-0x0000000007CAA000-memory.dmp

          Filesize

          6.5MB

        • memory/2436-144-0x0000000006490000-0x00000000064AA000-memory.dmp

          Filesize

          104KB

        • memory/2436-145-0x00000000071F0000-0x0000000007222000-memory.dmp

          Filesize

          200KB

        • memory/2436-146-0x00000000703F0000-0x000000007043C000-memory.dmp

          Filesize

          304KB

        • memory/2436-147-0x00000000071D0000-0x00000000071EE000-memory.dmp

          Filesize

          120KB

        • memory/2436-148-0x0000000007320000-0x000000000732A000-memory.dmp

          Filesize

          40KB

        • memory/2436-137-0x0000000002670000-0x00000000026A6000-memory.dmp

          Filesize

          216KB

        • memory/2436-150-0x00000000074D0000-0x00000000074DE000-memory.dmp

          Filesize

          56KB

        • memory/2436-151-0x00000000075F0000-0x000000000760A000-memory.dmp

          Filesize

          104KB

        • memory/2436-152-0x0000000007520000-0x0000000007528000-memory.dmp

          Filesize

          32KB

        • memory/2476-158-0x0000000000000000-mapping.dmp

        • memory/2528-157-0x0000000000000000-mapping.dmp

        • memory/3112-153-0x0000000000000000-mapping.dmp

        • memory/3112-156-0x00000000004E0000-0x00000000004EA000-memory.dmp

          Filesize

          40KB

        • memory/4260-130-0x0000000000640000-0x0000000000706000-memory.dmp

          Filesize

          792KB

        • memory/4260-135-0x0000000005700000-0x0000000005792000-memory.dmp

          Filesize

          584KB

        • memory/4260-134-0x0000000005440000-0x000000000545E000-memory.dmp

          Filesize

          120KB

        • memory/4260-133-0x0000000000F70000-0x0000000001022000-memory.dmp

          Filesize

          712KB

        • memory/4260-132-0x0000000005470000-0x00000000054C0000-memory.dmp

          Filesize

          320KB

        • memory/4260-131-0x0000000005080000-0x00000000050F6000-memory.dmp

          Filesize

          472KB