Analysis
-
max time kernel
50s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-06-2022 14:01
Static task
static1
Behavioral task
behavioral1
Sample
b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe
Resource
win10v2004-20220414-en
General
-
Target
b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe
-
Size
991KB
-
MD5
dd7c0c58450314880d48eeece29c0fd4
-
SHA1
ea3c53e23a5ced8a6f01c96e7837597e62899bbb
-
SHA256
b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9
-
SHA512
e6322a123e1783ead529049ef3b888cd8750ed3815e7725ea1c249e3c5797f0944e37eb6055df867d43db8a85845177330ef9e4b9a085034f065347c6e2d5a4b
Malware Config
Extracted
recordbreaker
http://146.70.124.71
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 884 set thread context of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1776 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 powershell.exe 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 884 wrote to memory of 1988 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 27 PID 884 wrote to memory of 1988 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 27 PID 884 wrote to memory of 1988 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 27 PID 884 wrote to memory of 1988 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 27 PID 884 wrote to memory of 944 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 29 PID 884 wrote to memory of 944 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 29 PID 884 wrote to memory of 944 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 29 PID 884 wrote to memory of 944 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 29 PID 944 wrote to memory of 1776 944 cmd.exe 31 PID 944 wrote to memory of 1776 944 cmd.exe 31 PID 944 wrote to memory of 1776 944 cmd.exe 31 PID 944 wrote to memory of 1776 944 cmd.exe 31 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32 PID 884 wrote to memory of 1532 884 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe"C:\Users\Admin\AppData\Local\Temp\b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 10;Start-Sleep -Seconds 10;2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 152⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\timeout.exetimeout 153⤵
- Delays execution with timeout.exe
PID:1776
-
-
-
C:\Users\Admin\AppData\Local\Temp\b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exeC:\Users\Admin\AppData\Local\Temp\b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe2⤵PID:1532
-