Analysis
-
max time kernel
13s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-03-2021 10:36
Static task
static1
Behavioral task
behavioral1
Sample
B7D90C9D14D124A163F5B3476160E1CF.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
B7D90C9D14D124A163F5B3476160E1CF.exe
Resource
win10v20201028
General
-
Target
B7D90C9D14D124A163F5B3476160E1CF.exe
-
Size
278KB
-
MD5
b7d90c9d14d124a163f5b3476160e1cf
-
SHA1
684e0fc52a883091957f65c0d2ff59fe1499bae4
-
SHA256
10192ceb4aa066216989c2b83dd3b460f0264d6672f64d1dff2addbe07fb1a5a
-
SHA512
05be8f906ae6f33ec541a951f3230e0ffcd1f17b9da4bf6e60158bc2ac1c915d5bf2050039672f5cb8479d01e7e7948466e711b574915f35fe109915e8c65ad7
Malware Config
Extracted
fickerstealer
deniedfight.com:80
Signatures
-
fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
B7D90C9D14D124A163F5B3476160E1CF.exedescription pid Process procid_target PID 540 set thread context of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
B7D90C9D14D124A163F5B3476160E1CF.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B7D90C9D14D124A163F5B3476160E1CF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B7D90C9D14D124A163F5B3476160E1CF.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
B7D90C9D14D124A163F5B3476160E1CF.exepid Process 2688 B7D90C9D14D124A163F5B3476160E1CF.exe 2688 B7D90C9D14D124A163F5B3476160E1CF.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
B7D90C9D14D124A163F5B3476160E1CF.exedescription pid Process procid_target PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75 PID 540 wrote to memory of 2688 540 B7D90C9D14D124A163F5B3476160E1CF.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\B7D90C9D14D124A163F5B3476160E1CF.exe"C:\Users\Admin\AppData\Local\Temp\B7D90C9D14D124A163F5B3476160E1CF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\B7D90C9D14D124A163F5B3476160E1CF.exe"C:\Users\Admin\AppData\Local\Temp\B7D90C9D14D124A163F5B3476160E1CF.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2688
-