Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 19:46
Behavioral task
behavioral1
Sample
653a7ba5f4c61283b8eb748d9e639200N.exe
Resource
win7-20240903-en
General
-
Target
653a7ba5f4c61283b8eb748d9e639200N.exe
-
Size
4.3MB
-
MD5
653a7ba5f4c61283b8eb748d9e639200
-
SHA1
18571ca1a9c55c260d6c2c9ef9bc834ad5123ee6
-
SHA256
0fbba8e91172cb9771907b9d98495f9c11fb83c15844e3fda228ce153a827dc1
-
SHA512
f269430db07a5e6a0c69d19c3169cc698af6dd0537a8422f81f24e38b44791788df562cbd23aa4d0ab1c23b641804a7850d23e3fc460a6c4c6f211d42fe2b692
-
SSDEEP
98304:GlN6KKKJHnmbOdqTJxrb9316Lnp8XUHKwOkmo4yOg:GlN6b8Gb3JFbh16LJOk
Malware Config
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral1/memory/2524-0-0x0000000000400000-0x0000000000B4C000-memory.dmp family_fabookie -
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/836-17-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral1/memory/2976-70-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Executes dropped EXE 2 IoCs
pid Process 836 jfiag3g_gg.exe 2976 jfiag3g_gg.exe -
Loads dropped DLL 4 IoCs
pid Process 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 2524 653a7ba5f4c61283b8eb748d9e639200N.exe -
resource yara_rule behavioral1/files/0x0009000000015cdd-8.dat upx behavioral1/memory/836-15-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/836-17-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0008000000004ed7-57.dat upx behavioral1/memory/2524-59-0x0000000000F50000-0x0000000000F72000-memory.dmp upx behavioral1/memory/2976-70-0x0000000000400000-0x0000000000422000-memory.dmp upx -
resource yara_rule behavioral1/memory/2524-0-0x0000000000400000-0x0000000000B4C000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" 653a7ba5f4c61283b8eb748d9e639200N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfiag3g_gg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 653a7ba5f4c61283b8eb748d9e639200N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfiag3g_gg.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 jfiag3g_gg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2524 wrote to memory of 836 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 31 PID 2524 wrote to memory of 836 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 31 PID 2524 wrote to memory of 836 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 31 PID 2524 wrote to memory of 836 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 31 PID 2524 wrote to memory of 2976 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 32 PID 2524 wrote to memory of 2976 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 32 PID 2524 wrote to memory of 2976 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 32 PID 2524 wrote to memory of 2976 2524 653a7ba5f4c61283b8eb748d9e639200N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\653a7ba5f4c61283b8eb748d9e639200N.exe"C:\Users\Admin\AppData\Local\Temp\653a7ba5f4c61283b8eb748d9e639200N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
31B
MD5b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
Filesize
61KB
MD5a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
Filesize
184KB
MD57fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4