Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26-06-2022 06:21
Static task
static1
Behavioral task
behavioral1
Sample
zxcv.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
zxcv.exe
Resource
win10v2004-20220414-en
General
-
Target
zxcv.exe
-
Size
772KB
-
MD5
d946c183fd128b4acf88d83ee89d79d3
-
SHA1
6f35da72f339c7101e93a7adada27d24902db598
-
SHA256
529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474
-
SHA512
793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62
Malware Config
Extracted
recordbreaker
http://136.244.65.99/
http://140.82.52.55/
Extracted
arkei
Default
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
Executes dropped EXE 2 IoCs
Processes:
fcvtee.exefcvtee.exepid Process 1152 fcvtee.exe 3004 fcvtee.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
zxcv.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation zxcv.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
zxcv.exefcvtee.exedescription pid Process procid_target PID 1928 set thread context of 2916 1928 zxcv.exe 82 PID 1152 set thread context of 3004 1152 fcvtee.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
zxcv.exefcvtee.exepid Process 1928 zxcv.exe 1152 fcvtee.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
zxcv.exefcvtee.exepid Process 1928 zxcv.exe 1152 fcvtee.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
zxcv.exefcvtee.exedescription pid Process procid_target PID 1928 wrote to memory of 1152 1928 zxcv.exe 81 PID 1928 wrote to memory of 1152 1928 zxcv.exe 81 PID 1928 wrote to memory of 1152 1928 zxcv.exe 81 PID 1928 wrote to memory of 2916 1928 zxcv.exe 82 PID 1928 wrote to memory of 2916 1928 zxcv.exe 82 PID 1928 wrote to memory of 2916 1928 zxcv.exe 82 PID 1928 wrote to memory of 2916 1928 zxcv.exe 82 PID 1152 wrote to memory of 3004 1152 fcvtee.exe 83 PID 1152 wrote to memory of 3004 1152 fcvtee.exe 83 PID 1152 wrote to memory of 3004 1152 fcvtee.exe 83 PID 1152 wrote to memory of 3004 1152 fcvtee.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\zxcv.exe"C:\Users\Admin\AppData\Local\Temp\zxcv.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\fcvtee.exe"C:\Users\Admin\AppData\Roaming\fcvtee.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Roaming\fcvtee.exe"C:\Users\Admin\AppData\Roaming\fcvtee.exe"3⤵
- Executes dropped EXE
PID:3004
-
-
-
C:\Users\Admin\AppData\Local\Temp\zxcv.exe"C:\Users\Admin\AppData\Local\Temp\zxcv.exe"2⤵PID:2916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD532ab5685131d8bcfa172bf165adf9338
SHA15e3b167bc66a15c246a8f29f7b634cbe52731319
SHA2562a0dc11c02495205fadbbb4a5a5304a9e77fd079dcab58daa04804a59e4cc87e
SHA512c6a48a49427a260510f08e8fd93a626445e69659c6e60364308163c92866ed43f163fee3e3f44951466457331eb0804d6e97ba623cfab20b7ef52e74c5c3e437
-
Filesize
392KB
MD532ab5685131d8bcfa172bf165adf9338
SHA15e3b167bc66a15c246a8f29f7b634cbe52731319
SHA2562a0dc11c02495205fadbbb4a5a5304a9e77fd079dcab58daa04804a59e4cc87e
SHA512c6a48a49427a260510f08e8fd93a626445e69659c6e60364308163c92866ed43f163fee3e3f44951466457331eb0804d6e97ba623cfab20b7ef52e74c5c3e437
-
Filesize
392KB
MD532ab5685131d8bcfa172bf165adf9338
SHA15e3b167bc66a15c246a8f29f7b634cbe52731319
SHA2562a0dc11c02495205fadbbb4a5a5304a9e77fd079dcab58daa04804a59e4cc87e
SHA512c6a48a49427a260510f08e8fd93a626445e69659c6e60364308163c92866ed43f163fee3e3f44951466457331eb0804d6e97ba623cfab20b7ef52e74c5c3e437