Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe
Resource
win7-20240903-en
General
-
Target
0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe
-
Size
7.8MB
-
MD5
bdb200d8273ed24b82d573c6a03390d0
-
SHA1
38c899c550dc2ed7419d68019068a3c5000862db
-
SHA256
0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8b
-
SHA512
abf46241aa2470761bc9da8abdc9c4f9409da8baa14e41886a0b8ca6bc2c1ee79af2662dd9f97bc8519a47b2c482ecae40be2468ddb468e3c4733f8e500becba
-
SSDEEP
196608:4V1FEWiFroH6UWwuSSbUhMu95+AkWDJVMAXuPV+D3jk:0Ko6bU624ApFCAeoDjk
Malware Config
Signatures
-
Detect Fabookie payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1476-100-0x0000000000400000-0x00000000004B1000-memory.dmp family_fabookie behavioral1/memory/1476-107-0x0000000000400000-0x00000000004B1000-memory.dmp family_fabookie behavioral1/memory/1476-111-0x0000000000400000-0x00000000004B1000-memory.dmp family_fabookie -
Detected Nirsoft tools 5 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral1/memory/2952-81-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral1/files/0x000500000001947e-92.dat Nirsoft behavioral1/memory/1476-100-0x0000000000400000-0x00000000004B1000-memory.dmp Nirsoft behavioral1/memory/1476-107-0x0000000000400000-0x00000000004B1000-memory.dmp Nirsoft behavioral1/memory/1476-111-0x0000000000400000-0x00000000004B1000-memory.dmp Nirsoft -
Executes dropped EXE 5 IoCs
Processes:
Data.exeid6.exehjjgaa.exejfiag_gg.exejfiag_gg.exepid Process 2760 Data.exe 1968 id6.exe 1476 hjjgaa.exe 2952 jfiag_gg.exe 636 jfiag_gg.exe -
Loads dropped DLL 14 IoCs
Processes:
0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exeData.exehjjgaa.exepid Process 1728 0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe 1728 0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe 1728 0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe 2760 Data.exe 2760 Data.exe 2760 Data.exe 2760 Data.exe 2760 Data.exe 2760 Data.exe 2760 Data.exe 1476 hjjgaa.exe 1476 hjjgaa.exe 1476 hjjgaa.exe 1476 hjjgaa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2760-67-0x0000000003770000-0x0000000003821000-memory.dmp upx behavioral1/files/0x000700000001752f-65.dat upx behavioral1/memory/2760-59-0x0000000003770000-0x0000000003821000-memory.dmp upx behavioral1/memory/2952-81-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x000500000001947e-78.dat upx behavioral1/memory/1476-73-0x0000000001FC0000-0x000000000201B000-memory.dmp upx behavioral1/memory/2760-98-0x0000000003770000-0x0000000003821000-memory.dmp upx behavioral1/memory/1476-100-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/1476-101-0x0000000001FC0000-0x000000000201B000-memory.dmp upx behavioral1/memory/1476-107-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/1476-111-0x0000000000400000-0x00000000004B1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
hjjgaa.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kissq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kissq.exe" hjjgaa.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exeData.exeid6.exehjjgaa.exejfiag_gg.exejfiag_gg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Data.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language id6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjjgaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfiag_gg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfiag_gg.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
jfiag_gg.exepid Process 636 jfiag_gg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
id6.exepid Process 1968 id6.exe 1968 id6.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exeData.exehjjgaa.exedescription pid Process procid_target PID 1728 wrote to memory of 2760 1728 0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe 30 PID 1728 wrote to memory of 2760 1728 0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe 30 PID 1728 wrote to memory of 2760 1728 0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe 30 PID 1728 wrote to memory of 2760 1728 0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe 30 PID 2760 wrote to memory of 1968 2760 Data.exe 31 PID 2760 wrote to memory of 1968 2760 Data.exe 31 PID 2760 wrote to memory of 1968 2760 Data.exe 31 PID 2760 wrote to memory of 1968 2760 Data.exe 31 PID 2760 wrote to memory of 1476 2760 Data.exe 32 PID 2760 wrote to memory of 1476 2760 Data.exe 32 PID 2760 wrote to memory of 1476 2760 Data.exe 32 PID 2760 wrote to memory of 1476 2760 Data.exe 32 PID 1476 wrote to memory of 2952 1476 hjjgaa.exe 33 PID 1476 wrote to memory of 2952 1476 hjjgaa.exe 33 PID 1476 wrote to memory of 2952 1476 hjjgaa.exe 33 PID 1476 wrote to memory of 2952 1476 hjjgaa.exe 33 PID 1476 wrote to memory of 636 1476 hjjgaa.exe 34 PID 1476 wrote to memory of 636 1476 hjjgaa.exe 34 PID 1476 wrote to memory of 636 1476 hjjgaa.exe 34 PID 1476 wrote to memory of 636 1476 hjjgaa.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe"C:\Users\Admin\AppData\Local\Temp\0584f6800c4533fed15172dc1e632f763f109996cbd547322bda14b177b1fe8bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\id6.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\id6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\hjjgaa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD57e130016c5a924647f72dc510751e1e8
SHA159254a9a739e9e9458df96d39b95261093b4786e
SHA25634fe9813cb9937132ecc906bcb6ef9fe0263f19cafba64e3eed8b625a93d0e00
SHA512983727fb44e85cb89d47a80694edd34b081006d26ea4fffcf46ebfc7037267472dd7f23cd21f6b60111e30761a02cd1f259c13dfb0abbfe2653f3843f534e564
-
Filesize
31B
MD5b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
Filesize
184KB
MD57fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
Filesize
103KB
MD54d4c98eca32b14aeb074db34cd0881e4
SHA192f213d609bba05d41d6941652a88c44936663a4
SHA2564182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f
SHA512959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf
-
Filesize
7.8MB
MD510c097ea175ce929349cbdbc16906a40
SHA1b9abe2164f2c737e0c4f491587db74408186c898
SHA2560d07dc0d524325af5cfb3d03bc1391b4bd531a58f08e5f42e2d22bb62fa30c8b
SHA512a52450da6bf5ec7f58656f8f3e94fe2e81d24b5777c3c6de9a10b807b01192cbaed61c303941619fb6cc980e9dec7a7f091d3250afd25c012d4f1fbe94a2a03c
-
Filesize
374KB
MD5f1943f33a9c218533c3a5ee74221addd
SHA1951627588bbd1692886ac90fe1e590324e4e75b5
SHA2561ce13a8b453a7fb0d5de876c155de43c43ca6cc2ddf1b905709e8f4cd71839cd
SHA512219b50f7f968cbe02773f5d5a0903436e6093d1058457cbfc228074d7a45c14e2be93598f47c37041e6038017b86a63cf91624660f2ea751c5d262c8469e4b4b