Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
29-06-2022 15:39
Behavioral task
behavioral1
Sample
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
Resource
win7-20220414-en
General
-
Target
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
-
Size
392.0MB
-
MD5
8a121fd92c5ccf804f7682de0aa4f685
-
SHA1
5723e27841445373e1816ef142aa80970ae1d469
-
SHA256
b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437
-
SHA512
368aa322e2884a75d4afa16c4c092f1cbf989f1fa8193744be224bed474c7fa13acf0996944b3bab74e72cf7fb8b53e50a6ef3a454f12c4a4c7ecb0bc80503cd
Malware Config
Extracted
recordbreaker
http://violance-heck.site/
http://roll-rave.site/
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
resource yara_rule behavioral2/memory/2256-130-0x0000000000DD0000-0x00000000017C5000-memory.dmp vmprotect behavioral2/memory/2256-131-0x0000000000DD0000-0x00000000017C5000-memory.dmp vmprotect behavioral2/memory/2256-136-0x0000000000DD0000-0x00000000017C5000-memory.dmp vmprotect behavioral2/memory/2256-137-0x0000000000DD0000-0x00000000017C5000-memory.dmp vmprotect behavioral2/memory/2256-138-0x0000000000DD0000-0x00000000017C5000-memory.dmp vmprotect behavioral2/memory/2256-140-0x0000000000DD0000-0x00000000017C5000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
resource yara_rule behavioral2/memory/2256-130-0x0000000000DD0000-0x00000000017C5000-memory.dmp themida behavioral2/memory/2256-131-0x0000000000DD0000-0x00000000017C5000-memory.dmp themida behavioral2/memory/2256-136-0x0000000000DD0000-0x00000000017C5000-memory.dmp themida behavioral2/memory/2256-137-0x0000000000DD0000-0x00000000017C5000-memory.dmp themida behavioral2/memory/2256-138-0x0000000000DD0000-0x00000000017C5000-memory.dmp themida behavioral2/memory/2256-140-0x0000000000DD0000-0x00000000017C5000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2256 b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2256 b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe 2256 b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe"C:\Users\Admin\AppData\Local\Temp\b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2256