Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2023 13:51

General

  • Target

    file.exe

  • Size

    715KB

  • MD5

    1ba71aaeba6e97e0b4101eae85cb6fd1

  • SHA1

    800c305125444909bf5bd0f87aaa9bdf3948fecd

  • SHA256

    659284e5615e553baeceb72ed2f226fda246e40ce0dd0e300514b9afee6d41ca

  • SHA512

    b3e627f5a8cd3454b671300d6c0dfa94f9009abbcde1025c65ab15495180b01290159d02609afddcce166707eda48664afb320229f36ffce9c7636a515ceaf63

  • SSDEEP

    6144:XA01NdzQ/xQWQvYYaE57i1bdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC28Wf7xLUnw+V:XdEJQWQG1bIShtdGxTC2M5JL

Malware Config

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
      PID:1760
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p
      1⤵
      • Drops file in System32 directory
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:4236

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1760-135-0x00000000026C0000-0x0000000002830000-memory.dmp

      Filesize

      1.4MB

    • memory/1760-136-0x0000000002830000-0x0000000002961000-memory.dmp

      Filesize

      1.2MB

    • memory/1760-146-0x0000000002830000-0x0000000002961000-memory.dmp

      Filesize

      1.2MB