Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-06-2022 15:39
Behavioral task
behavioral1
Sample
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
Resource
win7-20220414-en
General
-
Target
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
-
Size
392.0MB
-
MD5
8a121fd92c5ccf804f7682de0aa4f685
-
SHA1
5723e27841445373e1816ef142aa80970ae1d469
-
SHA256
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437
-
SHA512
368aa322e2884a75d4afa16c4c092f1cbf989f1fa8193744be224bed474c7fa13acf0996944b3bab74e72cf7fb8b53e50a6ef3a454f12c4a4c7ecb0bc80503cd
Malware Config
Extracted
recordbreaker
http://violance-heck.site/
http://roll-rave.site/
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
resource yara_rule behavioral1/memory/1648-54-0x00000000013C0000-0x0000000001DB5000-memory.dmp vmprotect behavioral1/memory/1648-60-0x00000000013C0000-0x0000000001DB5000-memory.dmp vmprotect behavioral1/memory/1648-61-0x00000000013C0000-0x0000000001DB5000-memory.dmp vmprotect behavioral1/memory/1648-62-0x00000000013C0000-0x0000000001DB5000-memory.dmp vmprotect behavioral1/memory/1648-64-0x00000000013C0000-0x0000000001DB5000-memory.dmp vmprotect behavioral1/memory/1648-63-0x0000000077480000-0x0000000077600000-memory.dmp vmprotect behavioral1/memory/1648-65-0x00000000013C0000-0x0000000001DB5000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
resource yara_rule behavioral1/memory/1648-54-0x00000000013C0000-0x0000000001DB5000-memory.dmp themida behavioral1/memory/1648-60-0x00000000013C0000-0x0000000001DB5000-memory.dmp themida behavioral1/memory/1648-61-0x00000000013C0000-0x0000000001DB5000-memory.dmp themida behavioral1/memory/1648-62-0x00000000013C0000-0x0000000001DB5000-memory.dmp themida behavioral1/memory/1648-64-0x00000000013C0000-0x0000000001DB5000-memory.dmp themida behavioral1/memory/1648-63-0x0000000077480000-0x0000000077600000-memory.dmp themida behavioral1/memory/1648-65-0x00000000013C0000-0x0000000001DB5000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1648 b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1648 b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe"C:\Users\Admin\AppData\Local\Temp\b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1648