Analysis
-
max time kernel
77s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 15:08
Static task
static1
Behavioral task
behavioral1
Sample
123.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
123.dll
Resource
win10v20210408
General
-
Target
123.dll
-
Size
244KB
-
MD5
24190cd699631d16521dfb588b2571a3
-
SHA1
546a86929e82babd0ee6f970d7729e3bf6a14698
-
SHA256
99c4b9083ed613bc38904eec3e37d24d3ca092067ee54e373cc3c8d6339857a6
-
SHA512
fd3123ababc536c2530785d52b3323c1250da0d41e18574ee2877013c6ac033f08157e1221cb3b01d971a3e214eba19bbcc4d29b3ea482cc52b433ecb6eacb21
Malware Config
Extracted
hancitor
1907_hjfsd
http://thervidolown.com/8/forum.php
http://wiltuslads.ru/8/forum.php
http://anithedtatione.ru/8/forum.php
Extracted
fickerstealer
pospvisis.com:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 15 2168 rundll32.exe 17 2168 rundll32.exe 19 2168 rundll32.exe -
Downloads MZ/PE file
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2168 set thread context of 2328 2168 rundll32.exe svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exesvchost.exepid process 2168 rundll32.exe 2168 rundll32.exe 2328 svchost.exe 2328 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 664 wrote to memory of 2168 664 rundll32.exe rundll32.exe PID 664 wrote to memory of 2168 664 rundll32.exe rundll32.exe PID 664 wrote to memory of 2168 664 rundll32.exe rundll32.exe PID 2168 wrote to memory of 2328 2168 rundll32.exe svchost.exe PID 2168 wrote to memory of 2328 2168 rundll32.exe svchost.exe PID 2168 wrote to memory of 2328 2168 rundll32.exe svchost.exe PID 2168 wrote to memory of 2328 2168 rundll32.exe svchost.exe PID 2168 wrote to memory of 2328 2168 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\123.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\123.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2168-114-0x0000000000000000-mapping.dmp
-
memory/2168-115-0x00000000047E0000-0x00000000048B0000-memory.dmpFilesize
832KB
-
memory/2168-116-0x0000000002BF0000-0x0000000002BF1000-memory.dmpFilesize
4KB
-
memory/2168-117-0x00000000047E0000-0x00000000047EA000-memory.dmpFilesize
40KB
-
memory/2168-118-0x00000000047E1000-0x0000000004802000-memory.dmpFilesize
132KB
-
memory/2328-119-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/2328-120-0x0000000000401480-mapping.dmp
-
memory/2328-123-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB