Analysis
-
max time kernel
113s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 08:32
Static task
static1
General
-
Target
427d7fa7985c51a913c88ac92a5df795.exe
-
Size
610KB
-
MD5
427d7fa7985c51a913c88ac92a5df795
-
SHA1
712e154408f7c3c55b08120b1e729b8bedd29a34
-
SHA256
48f42120cc5b3683db52663963704e8f0a7d935a2a24e3911e83079fb4f25ff3
-
SHA512
274e10efd14eb26091b5a59151e47e5a0223add6034fec787057ee697487db3b8c48be405c246db2d6f00674cebea0fd9bd872b5a238466cac0ac84deef836d9
-
SSDEEP
12288:ERivuoAtJ0Ej5FH3I95Q++qz+oFDtOOafqFAwCCys6+fGvaNB7ZXy+j3jMJW:ERntJPb4fQFvSt6iPyT+fGv6Bd
Malware Config
Extracted
amadey
3.87
79.137.192.18/9bDc8sQ/index.php
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/2292-42-0x00000000035A0000-0x00000000036D1000-memory.dmp family_fabookie behavioral2/memory/2292-45-0x00000000035A0000-0x00000000036D1000-memory.dmp family_fabookie -
Executes dropped EXE 4 IoCs
pid Process 2292 aafg31.exe 1316 latestplayer.exe 1848 yiueea.exe 1040 yiueea.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{B2031D90-5C33-4644-914B-B97D1CDD0B79}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3884 schtasks.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4328 wrote to memory of 2292 4328 427d7fa7985c51a913c88ac92a5df795.exe 87 PID 4328 wrote to memory of 2292 4328 427d7fa7985c51a913c88ac92a5df795.exe 87 PID 4328 wrote to memory of 1316 4328 427d7fa7985c51a913c88ac92a5df795.exe 88 PID 4328 wrote to memory of 1316 4328 427d7fa7985c51a913c88ac92a5df795.exe 88 PID 4328 wrote to memory of 1316 4328 427d7fa7985c51a913c88ac92a5df795.exe 88 PID 1316 wrote to memory of 1848 1316 latestplayer.exe 89 PID 1316 wrote to memory of 1848 1316 latestplayer.exe 89 PID 1316 wrote to memory of 1848 1316 latestplayer.exe 89 PID 1848 wrote to memory of 3884 1848 yiueea.exe 91 PID 1848 wrote to memory of 3884 1848 yiueea.exe 91 PID 1848 wrote to memory of 3884 1848 yiueea.exe 91 PID 1848 wrote to memory of 4440 1848 yiueea.exe 92 PID 1848 wrote to memory of 4440 1848 yiueea.exe 92 PID 1848 wrote to memory of 4440 1848 yiueea.exe 92 PID 4440 wrote to memory of 116 4440 cmd.exe 96 PID 4440 wrote to memory of 116 4440 cmd.exe 96 PID 4440 wrote to memory of 116 4440 cmd.exe 96 PID 4440 wrote to memory of 3448 4440 cmd.exe 97 PID 4440 wrote to memory of 3448 4440 cmd.exe 97 PID 4440 wrote to memory of 3448 4440 cmd.exe 97 PID 4440 wrote to memory of 2992 4440 cmd.exe 98 PID 4440 wrote to memory of 2992 4440 cmd.exe 98 PID 4440 wrote to memory of 2992 4440 cmd.exe 98 PID 4440 wrote to memory of 5016 4440 cmd.exe 99 PID 4440 wrote to memory of 5016 4440 cmd.exe 99 PID 4440 wrote to memory of 5016 4440 cmd.exe 99 PID 4440 wrote to memory of 2764 4440 cmd.exe 100 PID 4440 wrote to memory of 2764 4440 cmd.exe 100 PID 4440 wrote to memory of 2764 4440 cmd.exe 100 PID 4440 wrote to memory of 3932 4440 cmd.exe 101 PID 4440 wrote to memory of 3932 4440 cmd.exe 101 PID 4440 wrote to memory of 3932 4440 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\427d7fa7985c51a913c88ac92a5df795.exe"C:\Users\Admin\AppData\Local\Temp\427d7fa7985c51a913c88ac92a5df795.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\latestplayer.exe"C:\Users\Admin\AppData\Local\Temp\latestplayer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F4⤵
- Creates scheduled task(s)
PID:3884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:N"5⤵PID:3448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:R" /E5⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:N"5⤵PID:2764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:R" /E5⤵PID:3932
-
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:316
-
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exeC:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe1⤵
- Executes dropped EXE
PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
298KB
MD5d3c9c4e6c7579dcfa35b755b3a0f5b63
SHA19f9c15fee705a799a7974e6169808083a883dca5
SHA256da348945c886c5d1e3694498c2358305a7410b635c14816f1b0feb12c61141f6
SHA512534e00e311da50f0d4ff6a4988356138c32e7632eda7c3cc8c2634e7c15f21fdc156a09ea2982c3da125554cf2064e7b219a44495584b69f959c119d3cfa09c5
-
Filesize
298KB
MD5d3c9c4e6c7579dcfa35b755b3a0f5b63
SHA19f9c15fee705a799a7974e6169808083a883dca5
SHA256da348945c886c5d1e3694498c2358305a7410b635c14816f1b0feb12c61141f6
SHA512534e00e311da50f0d4ff6a4988356138c32e7632eda7c3cc8c2634e7c15f21fdc156a09ea2982c3da125554cf2064e7b219a44495584b69f959c119d3cfa09c5
-
Filesize
298KB
MD5d3c9c4e6c7579dcfa35b755b3a0f5b63
SHA19f9c15fee705a799a7974e6169808083a883dca5
SHA256da348945c886c5d1e3694498c2358305a7410b635c14816f1b0feb12c61141f6
SHA512534e00e311da50f0d4ff6a4988356138c32e7632eda7c3cc8c2634e7c15f21fdc156a09ea2982c3da125554cf2064e7b219a44495584b69f959c119d3cfa09c5
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4