Analysis
-
max time kernel
235s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-06-2022 14:01
Static task
static1
Behavioral task
behavioral1
Sample
b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe
Resource
win10v2004-20220414-en
General
-
Target
b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe
-
Size
991KB
-
MD5
dd7c0c58450314880d48eeece29c0fd4
-
SHA1
ea3c53e23a5ced8a6f01c96e7837597e62899bbb
-
SHA256
b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9
-
SHA512
e6322a123e1783ead529049ef3b888cd8750ed3815e7725ea1c249e3c5797f0944e37eb6055df867d43db8a85845177330ef9e4b9a085034f065347c6e2d5a4b
Malware Config
Extracted
recordbreaker
http://146.70.124.71
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3804 set thread context of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1500 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2272 powershell.exe 2272 powershell.exe 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2272 powershell.exe Token: SeDebugPrivilege 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3804 wrote to memory of 2272 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 77 PID 3804 wrote to memory of 2272 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 77 PID 3804 wrote to memory of 2272 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 77 PID 3804 wrote to memory of 2640 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 83 PID 3804 wrote to memory of 2640 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 83 PID 3804 wrote to memory of 2640 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 83 PID 2640 wrote to memory of 1500 2640 cmd.exe 85 PID 2640 wrote to memory of 1500 2640 cmd.exe 85 PID 2640 wrote to memory of 1500 2640 cmd.exe 85 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89 PID 3804 wrote to memory of 3352 3804 b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe"C:\Users\Admin\AppData\Local\Temp\b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 10;Start-Sleep -Seconds 10;2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 152⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\timeout.exetimeout 153⤵
- Delays execution with timeout.exe
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exeC:\Users\Admin\AppData\Local\Temp\b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe2⤵PID:3352
-