Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2024 03:44

General

  • Target

    34a7dbf9c978714dd0679079c5445a10.exe

  • Size

    396KB

  • MD5

    34a7dbf9c978714dd0679079c5445a10

  • SHA1

    476cebbf6d7a39ef3dd96e8d2d1d4684fb03faab

  • SHA256

    0c9093975346591d7fe991ed8bd448d21aaeb1d65b7c48122a19624e0775d583

  • SHA512

    9bea78ecc8ef389c3755626423cbc758357bca2345b2fc521d9113572a30c1bd84f85bf55693ba1c67ec3cac2aaef13d44641650c226629391612df27a43c1b0

  • SSDEEP

    1536:XyK9MKyCC4UuOCWqeyGaOi2K+Sm6uCWqe+aOi2K+Sm6uuCuCWqeyGaOi2K+Sm6u9:XX9MLxuBXnAYy4AZ6qevcgJFW

Malware Config

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\34a7dbf9c978714dd0679079c5445a10.exe
    "C:\Users\Admin\AppData\Local\Temp\34a7dbf9c978714dd0679079c5445a10.exe"
    1⤵
      PID:4904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4904-0-0x00007FF67D6D0000-0x00007FF67D736000-memory.dmp

      Filesize

      408KB

    • memory/4904-9-0x0000000003720000-0x000000000382D000-memory.dmp

      Filesize

      1.1MB

    • memory/4904-10-0x0000000003960000-0x0000000003A92000-memory.dmp

      Filesize

      1.2MB

    • memory/4904-13-0x0000000003960000-0x0000000003A92000-memory.dmp

      Filesize

      1.2MB