Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31eexe_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.7ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31eexe_JC.exe
-
Size
416KB
-
MD5
83330cf6e88ad32365183f31b1fd3bda
-
SHA1
1c5b47be2b8713746de64b39390636a81626d264
-
SHA256
7ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31e
-
SHA512
e28a9c47f690b0b0f0dd3b946d9cd59c761803f3826a382208a5b92be1293067b37a39f1141ddda13247b96138a108ce2f85b83de0143d48d4acc94f69a11908
-
SSDEEP
6144:syUa7AQnwciHMc4oiT4MKBz3I8JKGxerEhgVIXFM:sf4wcAQVrKi65erLIX
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4148-10-0x0000000003690000-0x00000000037C1000-memory.dmp family_fabookie behavioral2/memory/4148-13-0x0000000003690000-0x00000000037C1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1004 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31eexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31eexe_JC.exe"1⤵PID:4148
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1004