Analysis
-
max time kernel
53s -
max time network
163s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-07-2021 15:08
Static task
static1
Behavioral task
behavioral1
Sample
123.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
123.dll
Resource
win10v20210408
General
-
Target
123.dll
-
Size
244KB
-
MD5
24190cd699631d16521dfb588b2571a3
-
SHA1
546a86929e82babd0ee6f970d7729e3bf6a14698
-
SHA256
99c4b9083ed613bc38904eec3e37d24d3ca092067ee54e373cc3c8d6339857a6
-
SHA512
fd3123ababc536c2530785d52b3323c1250da0d41e18574ee2877013c6ac033f08157e1221cb3b01d971a3e214eba19bbcc4d29b3ea482cc52b433ecb6eacb21
Malware Config
Extracted
hancitor
1907_hjfsd
http://thervidolown.com/8/forum.php
http://wiltuslads.ru/8/forum.php
http://anithedtatione.ru/8/forum.php
Extracted
fickerstealer
pospvisis.com:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 6 1100 rundll32.exe 8 1100 rundll32.exe 10 1100 rundll32.exe -
Downloads MZ/PE file
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1100 set thread context of 864 1100 rundll32.exe svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exesvchost.exepid process 1100 rundll32.exe 864 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1180 wrote to memory of 1100 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1100 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1100 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1100 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1100 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1100 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1100 1180 rundll32.exe rundll32.exe PID 1100 wrote to memory of 864 1100 rundll32.exe svchost.exe PID 1100 wrote to memory of 864 1100 rundll32.exe svchost.exe PID 1100 wrote to memory of 864 1100 rundll32.exe svchost.exe PID 1100 wrote to memory of 864 1100 rundll32.exe svchost.exe PID 1100 wrote to memory of 864 1100 rundll32.exe svchost.exe PID 1100 wrote to memory of 864 1100 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\123.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\123.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-