Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2023 13:51
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230703-en
General
-
Target
file.exe
-
Size
715KB
-
MD5
1ba71aaeba6e97e0b4101eae85cb6fd1
-
SHA1
800c305125444909bf5bd0f87aaa9bdf3948fecd
-
SHA256
659284e5615e553baeceb72ed2f226fda246e40ce0dd0e300514b9afee6d41ca
-
SHA512
b3e627f5a8cd3454b671300d6c0dfa94f9009abbcde1025c65ab15495180b01290159d02609afddcce166707eda48664afb320229f36ffce9c7636a515ceaf63
-
SSDEEP
6144:XA01NdzQ/xQWQvYYaE57i1bdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC28Wf7xLUnw+V:XdEJQWQG1bIShtdGxTC2M5JL
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/1760-136-0x0000000002830000-0x0000000002961000-memory.dmp family_fabookie behavioral2/memory/1760-146-0x0000000002830000-0x0000000002961000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{C7F5910A-5259-455F-8809-139487DACDF1}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵PID:1760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4236