Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 04:57
Static task
static1
Behavioral task
behavioral1
Sample
427d7fa7985c51a913c88ac92a5df795_JC.exe
Resource
win7-20230831-en
General
-
Target
427d7fa7985c51a913c88ac92a5df795_JC.exe
-
Size
610KB
-
MD5
427d7fa7985c51a913c88ac92a5df795
-
SHA1
712e154408f7c3c55b08120b1e729b8bedd29a34
-
SHA256
48f42120cc5b3683db52663963704e8f0a7d935a2a24e3911e83079fb4f25ff3
-
SHA512
274e10efd14eb26091b5a59151e47e5a0223add6034fec787057ee697487db3b8c48be405c246db2d6f00674cebea0fd9bd872b5a238466cac0ac84deef836d9
-
SSDEEP
12288:ERivuoAtJ0Ej5FH3I95Q++qz+oFDtOOafqFAwCCys6+fGvaNB7ZXy+j3jMJW:ERntJPb4fQFvSt6iPyT+fGv6Bd
Malware Config
Extracted
amadey
3.87
http://79.137.192.18/9bDc8sQ/index.php
-
install_dir
577f58beff
-
install_file
yiueea.exe
-
strings_key
a5085075a537f09dec81cc154ec0af4d
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4232-35-0x00000000035B0000-0x00000000036E1000-memory.dmp family_fabookie behavioral2/memory/4232-38-0x00000000035B0000-0x00000000036E1000-memory.dmp family_fabookie -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 427d7fa7985c51a913c88ac92a5df795_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation latestplayer.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation yiueea.exe -
Executes dropped EXE 4 IoCs
pid Process 4232 aafg31.exe 1920 latestplayer.exe 2056 yiueea.exe 4536 yiueea.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2504 schtasks.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4232 4904 427d7fa7985c51a913c88ac92a5df795_JC.exe 83 PID 4904 wrote to memory of 4232 4904 427d7fa7985c51a913c88ac92a5df795_JC.exe 83 PID 4904 wrote to memory of 1920 4904 427d7fa7985c51a913c88ac92a5df795_JC.exe 84 PID 4904 wrote to memory of 1920 4904 427d7fa7985c51a913c88ac92a5df795_JC.exe 84 PID 4904 wrote to memory of 1920 4904 427d7fa7985c51a913c88ac92a5df795_JC.exe 84 PID 1920 wrote to memory of 2056 1920 latestplayer.exe 85 PID 1920 wrote to memory of 2056 1920 latestplayer.exe 85 PID 1920 wrote to memory of 2056 1920 latestplayer.exe 85 PID 2056 wrote to memory of 2504 2056 yiueea.exe 86 PID 2056 wrote to memory of 2504 2056 yiueea.exe 86 PID 2056 wrote to memory of 2504 2056 yiueea.exe 86 PID 2056 wrote to memory of 3736 2056 yiueea.exe 89 PID 2056 wrote to memory of 3736 2056 yiueea.exe 89 PID 2056 wrote to memory of 3736 2056 yiueea.exe 89 PID 3736 wrote to memory of 440 3736 cmd.exe 91 PID 3736 wrote to memory of 440 3736 cmd.exe 91 PID 3736 wrote to memory of 440 3736 cmd.exe 91 PID 3736 wrote to memory of 3860 3736 cmd.exe 92 PID 3736 wrote to memory of 3860 3736 cmd.exe 92 PID 3736 wrote to memory of 3860 3736 cmd.exe 92 PID 3736 wrote to memory of 3916 3736 cmd.exe 93 PID 3736 wrote to memory of 3916 3736 cmd.exe 93 PID 3736 wrote to memory of 3916 3736 cmd.exe 93 PID 3736 wrote to memory of 3188 3736 cmd.exe 94 PID 3736 wrote to memory of 3188 3736 cmd.exe 94 PID 3736 wrote to memory of 3188 3736 cmd.exe 94 PID 3736 wrote to memory of 1940 3736 cmd.exe 95 PID 3736 wrote to memory of 1940 3736 cmd.exe 95 PID 3736 wrote to memory of 1940 3736 cmd.exe 95 PID 3736 wrote to memory of 3712 3736 cmd.exe 96 PID 3736 wrote to memory of 3712 3736 cmd.exe 96 PID 3736 wrote to memory of 3712 3736 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\427d7fa7985c51a913c88ac92a5df795_JC.exe"C:\Users\Admin\AppData\Local\Temp\427d7fa7985c51a913c88ac92a5df795_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\latestplayer.exe"C:\Users\Admin\AppData\Local\Temp\latestplayer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F4⤵
- Creates scheduled task(s)
PID:2504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:N"5⤵PID:3860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:R" /E5⤵PID:3916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:N"5⤵PID:1940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:R" /E5⤵PID:3712
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exeC:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe1⤵
- Executes dropped EXE
PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
298KB
MD5d3c9c4e6c7579dcfa35b755b3a0f5b63
SHA19f9c15fee705a799a7974e6169808083a883dca5
SHA256da348945c886c5d1e3694498c2358305a7410b635c14816f1b0feb12c61141f6
SHA512534e00e311da50f0d4ff6a4988356138c32e7632eda7c3cc8c2634e7c15f21fdc156a09ea2982c3da125554cf2064e7b219a44495584b69f959c119d3cfa09c5
-
Filesize
298KB
MD5d3c9c4e6c7579dcfa35b755b3a0f5b63
SHA19f9c15fee705a799a7974e6169808083a883dca5
SHA256da348945c886c5d1e3694498c2358305a7410b635c14816f1b0feb12c61141f6
SHA512534e00e311da50f0d4ff6a4988356138c32e7632eda7c3cc8c2634e7c15f21fdc156a09ea2982c3da125554cf2064e7b219a44495584b69f959c119d3cfa09c5
-
Filesize
298KB
MD5d3c9c4e6c7579dcfa35b755b3a0f5b63
SHA19f9c15fee705a799a7974e6169808083a883dca5
SHA256da348945c886c5d1e3694498c2358305a7410b635c14816f1b0feb12c61141f6
SHA512534e00e311da50f0d4ff6a4988356138c32e7632eda7c3cc8c2634e7c15f21fdc156a09ea2982c3da125554cf2064e7b219a44495584b69f959c119d3cfa09c5
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4