Analysis

  • max time kernel
    138s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2023 08:32

General

  • Target

    227b4cb6c4a4a6477dd18c6659c5f8ac.exe

  • Size

    397KB

  • MD5

    227b4cb6c4a4a6477dd18c6659c5f8ac

  • SHA1

    d5ab18af347dd39e3bfdb92ed7bc4d2d21be35ac

  • SHA256

    493ebf087d0a960507abe4cc4872f4a4e8a36a84799e3c9c3559e4295f9baf21

  • SHA512

    4c348e8b6a57fdcc32e2a8dcd3c79532fbeb54d1667a500978660337033782f3faf713570ad17478c4e1c16ecbae5a291d5bf94bc14343a5d5dfc276744ec2c5

  • SSDEEP

    1536:qyK9MV0CLSuOCWqeyGaOi2K+Sm6uCWqe+aOi2K+Sm6uuCuCWqeyGaOi2K+Sm6uC1:qX9M1uuNnAYy4AZ6TvcgJFW

Malware Config

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\227b4cb6c4a4a6477dd18c6659c5f8ac.exe
    "C:\Users\Admin\AppData\Local\Temp\227b4cb6c4a4a6477dd18c6659c5f8ac.exe"
    1⤵
      PID:4708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4708-0-0x00007FF7CB3E0000-0x00007FF7CB447000-memory.dmp

      Filesize

      412KB

    • memory/4708-10-0x0000000003D10000-0x0000000003E41000-memory.dmp

      Filesize

      1.2MB

    • memory/4708-9-0x0000000003B90000-0x0000000003D01000-memory.dmp

      Filesize

      1.4MB

    • memory/4708-13-0x0000000003D10000-0x0000000003E41000-memory.dmp

      Filesize

      1.2MB