Analysis

  • max time kernel
    103s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    29/06/2022, 06:55 UTC

General

  • Target

    Setup.exe

  • Size

    398.7MB

  • MD5

    d2b043039a563c5afaf364cd56db06b6

  • SHA1

    ffebe93fff541050f8ed8e11c7ef09679ffac7f8

  • SHA256

    5eccc045f3cb0a80d82e02ff81fd20ac178c106d44a7751edeaac5d4625d8c0a

  • SHA512

    8899d80ec655967de1ca6b70f49df4f537a37357682fbe017a6f88bd146e7d9096e52d06d6463ea83069dea060f29572b4ea47d9f8526477e1c210790bf0c56e

Malware Config

Extracted

Family

recordbreaker

C2

http://45.133.216.200/

http://45.133.216.71/

Signatures

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1516
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x554
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:776
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1964

    Network

      No results found
    • 45.133.216.200:80
      Setup.exe
      152 B
      3
    • 45.133.216.200:80
      Setup.exe
      152 B
      3
    • 45.133.216.71:80
      Setup.exe
      152 B
      3
    • 45.133.216.71:80
      Setup.exe
      152 B
      3
    No results found

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1516-54-0x00000000755A1000-0x00000000755A3000-memory.dmp

      Filesize

      8KB

    • memory/1516-55-0x0000000000400000-0x0000000000BCD000-memory.dmp

      Filesize

      7.8MB

    • memory/1516-57-0x0000000000400000-0x0000000000BCD000-memory.dmp

      Filesize

      7.8MB

    • memory/1516-58-0x0000000000400000-0x0000000000BCD000-memory.dmp

      Filesize

      7.8MB

    • memory/1516-59-0x0000000000400000-0x0000000000BCD000-memory.dmp

      Filesize

      7.8MB

    • memory/1516-60-0x0000000000400000-0x0000000000BCD000-memory.dmp

      Filesize

      7.8MB

    • memory/1516-61-0x0000000077070000-0x00000000771F0000-memory.dmp

      Filesize

      1.5MB

    • memory/1516-62-0x0000000000400000-0x0000000000BCD000-memory.dmp

      Filesize

      7.8MB

    • memory/1516-63-0x0000000000400000-0x0000000000BCD000-memory.dmp

      Filesize

      7.8MB

    • memory/1516-65-0x0000000000400000-0x0000000000BCD000-memory.dmp

      Filesize

      7.8MB

    • memory/1516-66-0x0000000077070000-0x00000000771F0000-memory.dmp

      Filesize

      1.5MB

    • memory/1964-64-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmp

      Filesize

      8KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.