Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 02:47
Static task
static1
Behavioral task
behavioral1
Sample
JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe
Resource
win7-20230831-en
General
-
Target
JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe
-
Size
728KB
-
MD5
5fe739d874ed8bfb3ff23ed8531bf28a
-
SHA1
06cd37f1159bd367a9f53a53e2b4456104d0f9f9
-
SHA256
6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4
-
SHA512
445aa02187c9e14584c948db3bcef2b9dc68cde3a10f7b2df4dc92dbbf071040aac9a78254bca2c537015a7529ecae44c38f625228174330a0b5f220b8a20fb9
-
SSDEEP
12288:Jh01jRiaQEcxlBlLYWmwKAVW+0IF13URl5mzLAHKOx0A3KOU1EqpFE:Jq1th81BhFVVhvcl/AA6J1EC
Malware Config
Extracted
amadey
3.87
http://79.137.192.18/9bDc8sQ/index.php
-
install_dir
577f58beff
-
install_file
yiueea.exe
-
strings_key
a5085075a537f09dec81cc154ec0af4d
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4344-35-0x0000000003750000-0x0000000003881000-memory.dmp family_fabookie behavioral2/memory/4344-38-0x0000000003750000-0x0000000003881000-memory.dmp family_fabookie -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation latestplayer.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation yiueea.exe -
Executes dropped EXE 6 IoCs
pid Process 4344 aafg31.exe 3956 latestplayer.exe 4376 yiueea.exe 728 yiueea.exe 1596 yiueea.exe 2488 yiueea.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2744 schtasks.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 928 wrote to memory of 4344 928 JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe 83 PID 928 wrote to memory of 4344 928 JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe 83 PID 928 wrote to memory of 3956 928 JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe 85 PID 928 wrote to memory of 3956 928 JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe 85 PID 928 wrote to memory of 3956 928 JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe 85 PID 3956 wrote to memory of 4376 3956 latestplayer.exe 86 PID 3956 wrote to memory of 4376 3956 latestplayer.exe 86 PID 3956 wrote to memory of 4376 3956 latestplayer.exe 86 PID 4376 wrote to memory of 2744 4376 yiueea.exe 87 PID 4376 wrote to memory of 2744 4376 yiueea.exe 87 PID 4376 wrote to memory of 2744 4376 yiueea.exe 87 PID 4376 wrote to memory of 3232 4376 yiueea.exe 89 PID 4376 wrote to memory of 3232 4376 yiueea.exe 89 PID 4376 wrote to memory of 3232 4376 yiueea.exe 89 PID 3232 wrote to memory of 2764 3232 cmd.exe 91 PID 3232 wrote to memory of 2764 3232 cmd.exe 91 PID 3232 wrote to memory of 2764 3232 cmd.exe 91 PID 3232 wrote to memory of 832 3232 cmd.exe 92 PID 3232 wrote to memory of 832 3232 cmd.exe 92 PID 3232 wrote to memory of 832 3232 cmd.exe 92 PID 3232 wrote to memory of 2232 3232 cmd.exe 93 PID 3232 wrote to memory of 2232 3232 cmd.exe 93 PID 3232 wrote to memory of 2232 3232 cmd.exe 93 PID 3232 wrote to memory of 1416 3232 cmd.exe 95 PID 3232 wrote to memory of 1416 3232 cmd.exe 95 PID 3232 wrote to memory of 1416 3232 cmd.exe 95 PID 3232 wrote to memory of 4356 3232 cmd.exe 94 PID 3232 wrote to memory of 4356 3232 cmd.exe 94 PID 3232 wrote to memory of 4356 3232 cmd.exe 94 PID 3232 wrote to memory of 3012 3232 cmd.exe 96 PID 3232 wrote to memory of 3012 3232 cmd.exe 96 PID 3232 wrote to memory of 3012 3232 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe"C:\Users\Admin\AppData\Local\Temp\JC_6936a56efd4d51f236841a94f58686ad099773e0adbef02561cda498347181f4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\latestplayer.exe"C:\Users\Admin\AppData\Local\Temp\latestplayer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F4⤵
- Creates scheduled task(s)
PID:2744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:N"5⤵PID:832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:R" /E5⤵PID:2232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:N"5⤵PID:4356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:R" /E5⤵PID:3012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exeC:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe1⤵
- Executes dropped EXE
PID:728
-
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exeC:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe1⤵
- Executes dropped EXE
PID:1596
-
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exeC:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe1⤵
- Executes dropped EXE
PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
416KB
MD519591c7f415b69694663ac1cd868df8a
SHA196dcc8bd716da5d7f4a7a04a64128eca20653935
SHA2562fb9d88e38570b217034813216dd3d0976b90e41c761ac40eb96c2944edd27eb
SHA5124518a1b5681e17b1c5c67d6b961f286a194f5fe021ce106f3cd7f8df9a5b331f1af8edb8b401d7eae8444d78ab1cdc5ee7097230b79db7e646e5bc1c6d3579e5
-
Filesize
416KB
MD519591c7f415b69694663ac1cd868df8a
SHA196dcc8bd716da5d7f4a7a04a64128eca20653935
SHA2562fb9d88e38570b217034813216dd3d0976b90e41c761ac40eb96c2944edd27eb
SHA5124518a1b5681e17b1c5c67d6b961f286a194f5fe021ce106f3cd7f8df9a5b331f1af8edb8b401d7eae8444d78ab1cdc5ee7097230b79db7e646e5bc1c6d3579e5
-
Filesize
416KB
MD519591c7f415b69694663ac1cd868df8a
SHA196dcc8bd716da5d7f4a7a04a64128eca20653935
SHA2562fb9d88e38570b217034813216dd3d0976b90e41c761ac40eb96c2944edd27eb
SHA5124518a1b5681e17b1c5c67d6b961f286a194f5fe021ce106f3cd7f8df9a5b331f1af8edb8b401d7eae8444d78ab1cdc5ee7097230b79db7e646e5bc1c6d3579e5
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4