Analysis
-
max time kernel
44s -
max time network
39s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-09-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
fabric-installer-1.0.1.exe
Resource
win10-20240404-en
General
-
Target
fabric-installer-1.0.1.exe
-
Size
449KB
-
MD5
7f0502234a4af4bb9ee0b35ee38b8711
-
SHA1
e708d55f12586a153770bafa4b7fbfa8441b1409
-
SHA256
d90987a8f7a56cd9c09f69585de0ee6241c326f5b41399b2a8319d03fe6ce64e
-
SHA512
4dc60b1c4da89d3f40456ca54665c797816e42fa1e44e9b2873f799ccf2a4f834732b2854e3f8491e1ab1be562e7d7528fef19acb49d072a63a668e7e5468320
-
SSDEEP
6144:nI+0wPnAFavZtK9qEgsdjMpgmo6KlspZpP5OLhmsGpAiXx74syabpA+J:BPnAFSS36lKmPpemsGmiXxVfnJ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3080 javaw.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3164 icacls.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fabric-installer-1.0.1.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance javaw.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance javaw.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3080 javaw.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3080 javaw.exe 3080 javaw.exe 3080 javaw.exe 3080 javaw.exe 3080 javaw.exe 3080 javaw.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2536 wrote to memory of 688 2536 fabric-installer-1.0.1.exe 72 PID 2536 wrote to memory of 688 2536 fabric-installer-1.0.1.exe 72 PID 688 wrote to memory of 3164 688 javaw.exe 73 PID 688 wrote to memory of 3164 688 javaw.exe 73 PID 2536 wrote to memory of 3080 2536 fabric-installer-1.0.1.exe 75 PID 2536 wrote to memory of 3080 2536 fabric-installer-1.0.1.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\fabric-installer-1.0.1.exe"C:\Users\Admin\AppData\Local\Temp\fabric-installer-1.0.1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe"javaw.exe" "-version"2⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3164
-
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe"javaw.exe" "-jar" "C:\Users\Admin\AppData\Local\Temp\fabric-installer-1.0.1.exe" "-fabricInstallerBootstrap" "true"2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5408ce33d969acd3048386d12009bc5b9
SHA1c13dccf92e44d65f7912f9721a85f93dbebe617f
SHA256cd2b9ecff3c3826d23d3086a4d797707ca5076ee2fedfe471030d332514e1aae
SHA5126ed91cfab98c54f87ed4f335191697970ee871102c26602df15262cc140e045fb5e389a8bf6eeec51a125f671a4004970e6287933c3bbd5f740522c6875690fc
-
Filesize
9KB
MD52a4edd64e186969b56c571c6889b450b
SHA16dffeccb4f7f65d0fedc965bea8e1494375a3d9f
SHA25632a9cbd598dfd72ee53e60c79c195306afd19acc65c8fc1db6d33833d1550f25
SHA512e3ff5a86dccba08caff1ee17bdf9a33a1e0a43e0ab669a23e0eb8f9d8f85d1383ec959d7cde6ef6b40fe58ae02a795761fdd36769aaf202c0ff5d2eda1d1510a