Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
29-06-2022 06:55
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
Setup.exe
-
Size
398.7MB
-
MD5
d2b043039a563c5afaf364cd56db06b6
-
SHA1
ffebe93fff541050f8ed8e11c7ef09679ffac7f8
-
SHA256
5eccc045f3cb0a80d82e02ff81fd20ac178c106d44a7751edeaac5d4625d8c0a
-
SHA512
8899d80ec655967de1ca6b70f49df4f537a37357682fbe017a6f88bd146e7d9096e52d06d6463ea83069dea060f29572b4ea47d9f8526477e1c210790bf0c56e
Score
10/10
Malware Config
Extracted
Family
recordbreaker
C2
http://45.133.216.200/
http://45.133.216.71/
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3676 Setup.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4244 vlc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3676 Setup.exe 3676 Setup.exe 3676 Setup.exe 3676 Setup.exe 3676 Setup.exe 3676 Setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4244 vlc.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe 4244 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4244 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\FormatStep.mpe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4244
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4308