Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 12:03

General

  • Target

    25jZMPTiQqNIVH0Cs2hi6z9r.exe

  • Size

    1.7MB

  • MD5

    6753c0fadc839415e31b170b5df98fc7

  • SHA1

    7adbd92546bc0516013c0f6832ea272cf0606c60

  • SHA256

    01550ee84ac5a220197177182fd2f3f9c9e845b416d06a384384e3cd62ecb569

  • SHA512

    92c0264046f1293b02ccccbb3cb5b80510d2d3a1d1caff23815adb4c715d0aced08e57682c6dcb76fdca70eb46bc819db2a763f050f74de27fbb3946dca504ab

  • SSDEEP

    49152:pAI+r+g7ELp4UtaupKvwS9IBfgUtckcL1YsNP:pAI+CvK88wScgUAL1Ys5

Malware Config

Signatures

  • Detect Fabookie payload 1 IoCs
  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • Ffdroider family
  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25jZMPTiQqNIVH0Cs2hi6z9r.exe
    "C:\Users\Admin\AppData\Local\Temp\25jZMPTiQqNIVH0Cs2hi6z9r.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Program Files (x86)\Company\NewProduct\customer3.exe
      "C:\Program Files (x86)\Company\NewProduct\customer3.exe"
      2⤵
      • Executes dropped EXE
      PID:1188
    • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
      "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2364
    • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
      "C:\Program Files (x86)\Company\NewProduct\jooyu.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3108
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Company\NewProduct\customer3.exe

    Filesize

    244KB

    MD5

    1daac0c9a48a79976539b0722f9c3d3b

    SHA1

    843218f70a6a7fd676121e447b5b74acb0d87100

    SHA256

    e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf

    SHA512

    2259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc

  • C:\Program Files (x86)\Company\NewProduct\d.jfm

    Filesize

    16KB

    MD5

    bdda0fe64070a231b1081e515f47fb7a

    SHA1

    d1c86c08342c74e5517d2e0101ae9b04b6718ca9

    SHA256

    2bb9d9cbae130757a38b0c915604a9b2f4af0dd2f78c28808d980c500599c756

    SHA512

    ff752a6164d24eabd630e4456913cba5afa674428f5ec2baa583b4d1294ae89ab8ffd87504bf8ae76370abc8e028e1ed60d2434f1ad94222a7b134bbf72466c7

  • C:\Program Files (x86)\Company\NewProduct\d.jfm

    Filesize

    16KB

    MD5

    49f452f681613a72c675dda9a652ab71

    SHA1

    57379c2da4ae66c4dfc34160b2b8fcc42c09b4a6

    SHA256

    edd9721c7ecbd9289497a2693f4a73b951fd616569ca38dd0ab84a3c01f79edd

    SHA512

    b651cd7e762ada1598daee0f603968402467f2633abc81f0111b0c1a973951e8c072b3183f1da5b5b4677715fb10b814782a802938b4c3cc2b0acde02e326ee1

  • C:\Program Files (x86)\Company\NewProduct\d.jfm

    Filesize

    16KB

    MD5

    0a5de274563df3dab4897409e1f2563e

    SHA1

    bf063cb26265985734d0727dcbd6737c7887b178

    SHA256

    8085aa2dc1ff41c2dcc65e33d073778b31e8505a7a8c808af44257bdde386282

    SHA512

    f0923bf7e40671187c77732e8e58cdedede6a63476d0e742ce7cc8657a605fa5ffc7e5c8236a5aa1db6537271d8f46ee0810d222168a86bd591f56c4ad700414

  • C:\Program Files (x86)\Company\NewProduct\d.jfm

    Filesize

    16KB

    MD5

    1c21259b1a8b550261c18c52925a7d18

    SHA1

    15188460c7b5d2051dfac7ac195cb24be8f35360

    SHA256

    7dcba99d247bff8f977eb97c6309544ced469cb8603e74cf6458cd92c4a768aa

    SHA512

    eadbcc9a18153dc0ffa3473be30fdfa9daca26633b733b4288f672bca3bdcb0285abed72ea26a2246230448b04c0d9bcbbd994aaada6077a60b1ac2e683dc8ba

  • C:\Program Files (x86)\Company\NewProduct\d.jfm

    Filesize

    16KB

    MD5

    785337cf01af6351f8fcb17076f9ed9b

    SHA1

    e3bb5ae6d04a35ddd9b353981f4b9d049af8e920

    SHA256

    7f17342feb6c82ba2a71e1b7f4e67545082dc27125fb188877ef68fe852b1191

    SHA512

    b5f08dbc52b83adde97383ac70daf82d6f850d7b5f2ea3ce1d085b45ea10d7026294831371cdfda1d0701b429aa12c2f4289017481bd1c9160525f44b98291e0

  • C:\Program Files (x86)\Company\NewProduct\d.jfm

    Filesize

    16KB

    MD5

    26101534cdddf3008f3390973ea879ac

    SHA1

    9cc9f5dd3dcd7eacce8808cbc60df2ae56bf76aa

    SHA256

    e5ee9fba2b0746a4b2729ae33319d7bfbf92175a3d9f5ff803c5d3969944986f

    SHA512

    3a38c93bb3a688e7ea48734223cd47a0f065f0549971de770a918bf5f210941f4d5e0a46b61e572c2602e1e1575ba7680eea0673c4477c359875ed719ebc12d2

  • C:\Program Files (x86)\Company\NewProduct\d.jfm

    Filesize

    16KB

    MD5

    dc6296782a09857b171cf45e0facb447

    SHA1

    902414f6e63db91960c6cb3b9e0ff0f5275a6bf8

    SHA256

    968c1a3d35aa81d978f716bb7dd86317690e79850017f5ee438234fead365d85

    SHA512

    2d1d7b0d04a5e3517893d57816f383e59b158d71958c661d295d34cd622c27f65d6d35e1d7715501efadc2432dbc7cfbc95ef94d9cdfd9d52bac9ebf36afb1e7

  • C:\Program Files (x86)\Company\NewProduct\d.jfm

    Filesize

    16KB

    MD5

    1cda14d0c8d176de2c10d23f5ba3ee1d

    SHA1

    9b89d50609c722141ac8b5cf31fd01cd2e7f9276

    SHA256

    9fa84362ba29f46f790394cdba89f5fe63061dc1704d890d4f344851596278ac

    SHA512

    6a4db90229bfbef1a52656ac482bb2b674eafa8440683ee911b8a0c03b5bc3c735431ad54cf385152e91d2341a0ac080884e64fd502c8fae70a08da1ced3a2f1

  • C:\Program Files (x86)\Company\NewProduct\jooyu.exe

    Filesize

    971KB

    MD5

    aed57d50123897b0012c35ef5dec4184

    SHA1

    568571b12ca44a585df589dc810bf53adf5e8050

    SHA256

    096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e

    SHA512

    ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c

  • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe

    Filesize

    829KB

    MD5

    ce11de1000560d312bf6ab0b5327e87b

    SHA1

    557f3f780cb0f694887ada330a87ba976cdb168f

    SHA256

    126daa976d1eaec1bd68eb53748caa325fc537f865051dd0d5f09d599175861a

    SHA512

    655b45bcf75a79c174caf6fae84560980511d068f67a89883f70b264e88983f729c604b3484fdcb8d8f8a83105e43d740fe70e7a006806136bc423453d769655

  • C:\Users\Admin\AppData\Local\Temp\ecvA095.tmp

    Filesize

    14.0MB

    MD5

    6f6f7f15ea023dce8934c16b90fc095b

    SHA1

    39673c16cd036ae37639c665e5ad08ac4a345c00

    SHA256

    95fe750a641227db786024d9147efc435408d4c39fc4a19dd3b65de7a5d90e9e

    SHA512

    d2cd130f4067b3d9ad6e6eca03934905eb4e63efe6fb47de2b3e49428dddd8f070ee700175c0d6fa1032b3dc8888f6f4cb8ecc2c6e216fe6da7d8e018693aa0a

  • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

    Filesize

    1KB

    MD5

    c878d8c696efd352808a14e9343fd776

    SHA1

    8054f081d6fde78d80e637a73b763b95166d6426

    SHA256

    f27db90a59f03fc7c71f73766102b48e54fd04b4d6011a75931f159ec583a2b4

    SHA512

    4e60ccfe5b7e05a19f373a86a02c850faf5c758b0a8b013ccb49a6f8fbc29b5fdb4fa61c020fb5610ee32dbe31e51f3cedf8139a3005b574022eb0e19de5cb9e

  • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

    Filesize

    31B

    MD5

    b7161c0845a64ff6d7345b67ff97f3b0

    SHA1

    d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

    SHA256

    fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

    SHA512

    98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

    Filesize

    61KB

    MD5

    a6279ec92ff948760ce53bba817d6a77

    SHA1

    5345505e12f9e4c6d569a226d50e71b5a572dce2

    SHA256

    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

    SHA512

    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

    Filesize

    184KB

    MD5

    7fee8223d6e4f82d6cd115a28f0b6d58

    SHA1

    1b89c25f25253df23426bd9ff6c9208f1202f58b

    SHA256

    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

    SHA512

    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

  • memory/1828-91-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1828-84-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2000-48-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2364-94-0x00000000048C0000-0x00000000048C8000-memory.dmp

    Filesize

    32KB

  • memory/2364-60-0x0000000003800000-0x0000000003810000-memory.dmp

    Filesize

    64KB

  • memory/2364-92-0x0000000004B50000-0x0000000004B58000-memory.dmp

    Filesize

    32KB

  • memory/2364-93-0x0000000004A50000-0x0000000004A58000-memory.dmp

    Filesize

    32KB

  • memory/2364-79-0x0000000004610000-0x0000000004618000-memory.dmp

    Filesize

    32KB

  • memory/2364-76-0x00000000044C0000-0x00000000044C8000-memory.dmp

    Filesize

    32KB

  • memory/2364-107-0x0000000004420000-0x0000000004428000-memory.dmp

    Filesize

    32KB

  • memory/2364-115-0x00000000048C0000-0x00000000048C8000-memory.dmp

    Filesize

    32KB

  • memory/2364-130-0x0000000004420000-0x0000000004428000-memory.dmp

    Filesize

    32KB

  • memory/2364-74-0x0000000004420000-0x0000000004428000-memory.dmp

    Filesize

    32KB

  • memory/2364-73-0x0000000004400000-0x0000000004408000-memory.dmp

    Filesize

    32KB

  • memory/2364-138-0x00000000049F0000-0x00000000049F8000-memory.dmp

    Filesize

    32KB

  • memory/2364-66-0x0000000003960000-0x0000000003970000-memory.dmp

    Filesize

    64KB

  • memory/2364-117-0x00000000049F0000-0x00000000049F8000-memory.dmp

    Filesize

    32KB

  • memory/2364-140-0x00000000048C0000-0x00000000048C8000-memory.dmp

    Filesize

    32KB

  • memory/2364-80-0x00000000048B0000-0x00000000048B8000-memory.dmp

    Filesize

    32KB

  • memory/2364-179-0x00000000042E0000-0x00000000042E8000-memory.dmp

    Filesize

    32KB

  • memory/2364-180-0x0000000004300000-0x0000000004308000-memory.dmp

    Filesize

    32KB

  • memory/2364-188-0x00000000043A0000-0x00000000043A8000-memory.dmp

    Filesize

    32KB

  • memory/2364-192-0x0000000004520000-0x0000000004528000-memory.dmp

    Filesize

    32KB

  • memory/2364-191-0x00000000043A0000-0x00000000043A8000-memory.dmp

    Filesize

    32KB

  • memory/2364-193-0x00000000045D0000-0x00000000045D8000-memory.dmp

    Filesize

    32KB

  • memory/2364-194-0x00000000045E0000-0x00000000045E8000-memory.dmp

    Filesize

    32KB

  • memory/2364-195-0x0000000004540000-0x0000000004548000-memory.dmp

    Filesize

    32KB

  • memory/2364-43-0x00000000001C0000-0x00000000001C3000-memory.dmp

    Filesize

    12KB

  • memory/2364-208-0x0000000004300000-0x0000000004308000-memory.dmp

    Filesize

    32KB

  • memory/2364-216-0x0000000004540000-0x0000000004548000-memory.dmp

    Filesize

    32KB

  • memory/2364-218-0x0000000004570000-0x0000000004578000-memory.dmp

    Filesize

    32KB

  • memory/2364-42-0x0000000000400000-0x0000000000644000-memory.dmp

    Filesize

    2.3MB

  • memory/3108-54-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3108-57-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB