Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 19:46
Behavioral task
behavioral1
Sample
653a7ba5f4c61283b8eb748d9e639200N.exe
Resource
win7-20240903-en
General
-
Target
653a7ba5f4c61283b8eb748d9e639200N.exe
-
Size
4.3MB
-
MD5
653a7ba5f4c61283b8eb748d9e639200
-
SHA1
18571ca1a9c55c260d6c2c9ef9bc834ad5123ee6
-
SHA256
0fbba8e91172cb9771907b9d98495f9c11fb83c15844e3fda228ce153a827dc1
-
SHA512
f269430db07a5e6a0c69d19c3169cc698af6dd0537a8422f81f24e38b44791788df562cbd23aa4d0ab1c23b641804a7850d23e3fc460a6c4c6f211d42fe2b692
-
SSDEEP
98304:GlN6KKKJHnmbOdqTJxrb9316Lnp8XUHKwOkmo4yOg:GlN6b8Gb3JFbh16LJOk
Malware Config
Signatures
-
Detect Fabookie payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3728-0-0x0000000000400000-0x0000000000B4C000-memory.dmp family_fabookie -
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral2/memory/4772-11-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/3064-22-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Executes dropped EXE 2 IoCs
Processes:
jfiag3g_gg.exejfiag3g_gg.exepid Process 4772 jfiag3g_gg.exe 3064 jfiag3g_gg.exe -
Processes:
resource yara_rule behavioral2/files/0x0002000000022d14-7.dat upx behavioral2/memory/4772-8-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4772-11-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/files/0x0003000000022d14-15.dat upx behavioral2/memory/3064-16-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3064-22-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Processes:
resource yara_rule behavioral2/memory/3728-0-0x0000000000400000-0x0000000000B4C000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
653a7ba5f4c61283b8eb748d9e639200N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" 653a7ba5f4c61283b8eb748d9e639200N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
jfiag3g_gg.exejfiag3g_gg.exe653a7ba5f4c61283b8eb748d9e639200N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfiag3g_gg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfiag3g_gg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 653a7ba5f4c61283b8eb748d9e639200N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jfiag3g_gg.exepid Process 3064 jfiag3g_gg.exe 3064 jfiag3g_gg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
653a7ba5f4c61283b8eb748d9e639200N.exedescription pid Process procid_target PID 3728 wrote to memory of 4772 3728 653a7ba5f4c61283b8eb748d9e639200N.exe 89 PID 3728 wrote to memory of 4772 3728 653a7ba5f4c61283b8eb748d9e639200N.exe 89 PID 3728 wrote to memory of 4772 3728 653a7ba5f4c61283b8eb748d9e639200N.exe 89 PID 3728 wrote to memory of 3064 3728 653a7ba5f4c61283b8eb748d9e639200N.exe 92 PID 3728 wrote to memory of 3064 3728 653a7ba5f4c61283b8eb748d9e639200N.exe 92 PID 3728 wrote to memory of 3064 3728 653a7ba5f4c61283b8eb748d9e639200N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\653a7ba5f4c61283b8eb748d9e639200N.exe"C:\Users\Admin\AppData\Local\Temp\653a7ba5f4c61283b8eb748d9e639200N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31B
MD5b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
Filesize
1KB
MD57201b9775c75e8762026541793f303b9
SHA1890065cdba045a1034772ac1f3e37cb5b3cd693e
SHA256dc84bea2cf452427a6d930d368ba6f5dd4d5f5f1d68a3b674a7a0c764548a468
SHA51224de444e38c0e2ce99b7a39e1287510dae6e00cc21692090bc75a37e5162c5d7392ad481f8bc5263b2dcb8ac12e9d61d6cda3b5632611ffffe12e80fec94e55a
-
Filesize
184KB
MD57fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
Filesize
61KB
MD5a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c