Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 18:06
Static task
static1
Behavioral task
behavioral1
Sample
52241b7a6707a79755e1386a26bce09c.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
52241b7a6707a79755e1386a26bce09c.exe
Resource
win10-en-20211014
General
-
Target
52241b7a6707a79755e1386a26bce09c.exe
-
Size
502KB
-
MD5
52241b7a6707a79755e1386a26bce09c
-
SHA1
bd2f102d6f10cde689835418f213db6b0713c2cd
-
SHA256
0e01d2215e00c2a03a93b72a13476c588fbd383d4367e3d85265969e65dff388
-
SHA512
b4f781a8344d9db9ba3ee6d54c9a2c614a3b0699c05f527b1cfd22775613c8f902eb95553b7f3a56b8a1b5b6b7715b0491159d8bcc9dc712129512551d65ea05
Malware Config
Extracted
fickerstealer
game2030.site:80
Extracted
arkei
Default
http://gurums.online/ggate.php
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
suricata: ET MALWARE Win32/Ficker Stealer Activity M3
suricata: ET MALWARE Win32/Ficker Stealer Activity M3
-
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1634890895832.exe family_arkei C:\Users\Admin\AppData\Local\Temp\1634890895832.exe family_arkei -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
1634890895769.exe1634890895832.exehvytube.exehvytube.exehvytube.exepid process 4392 1634890895769.exe 428 1634890895832.exe 1432 hvytube.exe 2360 hvytube.exe 3928 hvytube.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
hvytube.exe1634890895769.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\HVYtube3 = "C:\\Users\\Admin\\AppData\\Roaming\\HVYtube3\\hvytube.exe" hvytube.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\HVYtube = "C:\\Users\\Admin\\AppData\\Roaming\\HVYtube\\hvytube.exe" 1634890895769.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
52241b7a6707a79755e1386a26bce09c.exedescription pid process target process PID 4152 set thread context of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 592 428 WerFault.exe 1634890895832.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
52241b7a6707a79755e1386a26bce09c.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 52241b7a6707a79755e1386a26bce09c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 52241b7a6707a79755e1386a26bce09c.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
52241b7a6707a79755e1386a26bce09c.exeWerFault.exepid process 4412 52241b7a6707a79755e1386a26bce09c.exe 4412 52241b7a6707a79755e1386a26bce09c.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
WerFault.exehvytube.exehvytube.exedescription pid process Token: SeRestorePrivilege 592 WerFault.exe Token: SeBackupPrivilege 592 WerFault.exe Token: SeDebugPrivilege 592 WerFault.exe Token: SeDebugPrivilege 1432 hvytube.exe Token: SeDebugPrivilege 3928 hvytube.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
52241b7a6707a79755e1386a26bce09c.exe52241b7a6707a79755e1386a26bce09c.exe1634890895769.exehvytube.exehvytube.exedescription pid process target process PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4152 wrote to memory of 4412 4152 52241b7a6707a79755e1386a26bce09c.exe 52241b7a6707a79755e1386a26bce09c.exe PID 4412 wrote to memory of 4392 4412 52241b7a6707a79755e1386a26bce09c.exe 1634890895769.exe PID 4412 wrote to memory of 4392 4412 52241b7a6707a79755e1386a26bce09c.exe 1634890895769.exe PID 4412 wrote to memory of 4392 4412 52241b7a6707a79755e1386a26bce09c.exe 1634890895769.exe PID 4412 wrote to memory of 428 4412 52241b7a6707a79755e1386a26bce09c.exe 1634890895832.exe PID 4412 wrote to memory of 428 4412 52241b7a6707a79755e1386a26bce09c.exe 1634890895832.exe PID 4412 wrote to memory of 428 4412 52241b7a6707a79755e1386a26bce09c.exe 1634890895832.exe PID 4392 wrote to memory of 1432 4392 1634890895769.exe hvytube.exe PID 4392 wrote to memory of 1432 4392 1634890895769.exe hvytube.exe PID 4392 wrote to memory of 1432 4392 1634890895769.exe hvytube.exe PID 1432 wrote to memory of 2360 1432 hvytube.exe hvytube.exe PID 1432 wrote to memory of 2360 1432 hvytube.exe hvytube.exe PID 1432 wrote to memory of 2360 1432 hvytube.exe hvytube.exe PID 2360 wrote to memory of 3928 2360 hvytube.exe hvytube.exe PID 2360 wrote to memory of 3928 2360 hvytube.exe hvytube.exe PID 2360 wrote to memory of 3928 2360 hvytube.exe hvytube.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52241b7a6707a79755e1386a26bce09c.exe"C:\Users\Admin\AppData\Local\Temp\52241b7a6707a79755e1386a26bce09c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\52241b7a6707a79755e1386a26bce09c.exe"C:\Users\Admin\AppData\Local\Temp\52241b7a6707a79755e1386a26bce09c.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1634890895769.exe"C:\Users\Admin\AppData\Local\Temp\1634890895769.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\HVYtube\hvytube.exe"C:\Users\Admin\AppData\Roaming\HVYtube\hvytube.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\hvytube.exe"C:\Users\Admin\AppData\Local\Temp\hvytube.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\HVYtube3\hvytube.exe"C:\Users\Admin\AppData\Roaming\HVYtube3\hvytube.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1634890895832.exe"C:\Users\Admin\AppData\Local\Temp\1634890895832.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 12484⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hvytube.exe.logMD5
957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
C:\Users\Admin\AppData\Local\Temp\1634890895769.exeMD5
07c4277b0278cafddb023934c154cc56
SHA18fc547689272aa2f26e5721264d4260caae499c0
SHA2569d8a5319cffb73b9a8fd90118e60a6e3cf632c44bf754566c00cd02123efadd8
SHA51221276a78dfe0316fa7212791110d42971d3a9c6981be2ab33ac078d40782c0c2584d9695c0280617884922f99cb9a13b6106b9d78f0e61cd84627e04c0c10678
-
C:\Users\Admin\AppData\Local\Temp\1634890895769.exeMD5
07c4277b0278cafddb023934c154cc56
SHA18fc547689272aa2f26e5721264d4260caae499c0
SHA2569d8a5319cffb73b9a8fd90118e60a6e3cf632c44bf754566c00cd02123efadd8
SHA51221276a78dfe0316fa7212791110d42971d3a9c6981be2ab33ac078d40782c0c2584d9695c0280617884922f99cb9a13b6106b9d78f0e61cd84627e04c0c10678
-
C:\Users\Admin\AppData\Local\Temp\1634890895832.exeMD5
4bb65548f890bed129c141c3c04fc8c4
SHA139257aa791e39dd40a79d1c33c35c30010a98e0d
SHA256681dd3210d7550268f684628dd7946349ac3a97a6331c5567241a4caf4d7987c
SHA51248cf64f34f25fb2bff641c54cc1a777c64f13890f0d4bb812758479ff876ae8a9d1edc6eb7da5ed0a1e5a22166bfe4366367d329bb65150d0430458447467587
-
C:\Users\Admin\AppData\Local\Temp\1634890895832.exeMD5
4bb65548f890bed129c141c3c04fc8c4
SHA139257aa791e39dd40a79d1c33c35c30010a98e0d
SHA256681dd3210d7550268f684628dd7946349ac3a97a6331c5567241a4caf4d7987c
SHA51248cf64f34f25fb2bff641c54cc1a777c64f13890f0d4bb812758479ff876ae8a9d1edc6eb7da5ed0a1e5a22166bfe4366367d329bb65150d0430458447467587
-
C:\Users\Admin\AppData\Local\Temp\hvytube.exeMD5
c7f0ff4bc816f92f0f421e380f453968
SHA1e7fe567f76c95176068be75ad9f671142af23962
SHA256e75d1bfadd17d005eda82ec93adbdaa6b63000bb78accc01b8d33f7f7e1b1f10
SHA512d7bb10b49d2153562d6b218fb2efd93133a90e39174b5b6ba20fa9109a2af9ba8fe6d348a20cd44304517ff43745c6745264cac71ddf559770074e191ad9a04f
-
C:\Users\Admin\AppData\Local\Temp\hvytube.exeMD5
c7f0ff4bc816f92f0f421e380f453968
SHA1e7fe567f76c95176068be75ad9f671142af23962
SHA256e75d1bfadd17d005eda82ec93adbdaa6b63000bb78accc01b8d33f7f7e1b1f10
SHA512d7bb10b49d2153562d6b218fb2efd93133a90e39174b5b6ba20fa9109a2af9ba8fe6d348a20cd44304517ff43745c6745264cac71ddf559770074e191ad9a04f
-
C:\Users\Admin\AppData\Roaming\HVYtube3\hvytube.exeMD5
c7f0ff4bc816f92f0f421e380f453968
SHA1e7fe567f76c95176068be75ad9f671142af23962
SHA256e75d1bfadd17d005eda82ec93adbdaa6b63000bb78accc01b8d33f7f7e1b1f10
SHA512d7bb10b49d2153562d6b218fb2efd93133a90e39174b5b6ba20fa9109a2af9ba8fe6d348a20cd44304517ff43745c6745264cac71ddf559770074e191ad9a04f
-
C:\Users\Admin\AppData\Roaming\HVYtube3\hvytube.exeMD5
c7f0ff4bc816f92f0f421e380f453968
SHA1e7fe567f76c95176068be75ad9f671142af23962
SHA256e75d1bfadd17d005eda82ec93adbdaa6b63000bb78accc01b8d33f7f7e1b1f10
SHA512d7bb10b49d2153562d6b218fb2efd93133a90e39174b5b6ba20fa9109a2af9ba8fe6d348a20cd44304517ff43745c6745264cac71ddf559770074e191ad9a04f
-
C:\Users\Admin\AppData\Roaming\HVYtube\hvytube.exeMD5
07c4277b0278cafddb023934c154cc56
SHA18fc547689272aa2f26e5721264d4260caae499c0
SHA2569d8a5319cffb73b9a8fd90118e60a6e3cf632c44bf754566c00cd02123efadd8
SHA51221276a78dfe0316fa7212791110d42971d3a9c6981be2ab33ac078d40782c0c2584d9695c0280617884922f99cb9a13b6106b9d78f0e61cd84627e04c0c10678
-
C:\Users\Admin\AppData\Roaming\HVYtube\hvytube.exeMD5
07c4277b0278cafddb023934c154cc56
SHA18fc547689272aa2f26e5721264d4260caae499c0
SHA2569d8a5319cffb73b9a8fd90118e60a6e3cf632c44bf754566c00cd02123efadd8
SHA51221276a78dfe0316fa7212791110d42971d3a9c6981be2ab33ac078d40782c0c2584d9695c0280617884922f99cb9a13b6106b9d78f0e61cd84627e04c0c10678
-
memory/428-122-0x0000000000000000-mapping.dmp
-
memory/1432-136-0x0000000005E60000-0x0000000005F1A000-memory.dmpFilesize
744KB
-
memory/1432-150-0x0000000006600000-0x00000000066A0000-memory.dmpFilesize
640KB
-
memory/1432-152-0x0000000006A40000-0x0000000006A41000-memory.dmpFilesize
4KB
-
memory/1432-133-0x00000000054F0000-0x00000000054F6000-memory.dmpFilesize
24KB
-
memory/1432-134-0x0000000005500000-0x00000000055D7000-memory.dmpFilesize
860KB
-
memory/1432-135-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/1432-151-0x0000000006A10000-0x0000000006A11000-memory.dmpFilesize
4KB
-
memory/1432-137-0x00000000052F0000-0x00000000052F5000-memory.dmpFilesize
20KB
-
memory/1432-138-0x0000000005320000-0x0000000005326000-memory.dmpFilesize
24KB
-
memory/1432-128-0x0000000000000000-mapping.dmp
-
memory/1432-149-0x0000000005CD0000-0x0000000005CD1000-memory.dmpFilesize
4KB
-
memory/1432-141-0x0000000005F50000-0x0000000005F51000-memory.dmpFilesize
4KB
-
memory/1432-148-0x0000000005CE0000-0x0000000005CE1000-memory.dmpFilesize
4KB
-
memory/1432-147-0x0000000005CB0000-0x0000000005CB1000-memory.dmpFilesize
4KB
-
memory/1432-144-0x0000000005F90000-0x0000000005F91000-memory.dmpFilesize
4KB
-
memory/1432-146-0x0000000005BE0000-0x0000000005C6F000-memory.dmpFilesize
572KB
-
memory/2360-143-0x00000000008F0000-0x00000000008F1000-memory.dmpFilesize
4KB
-
memory/2360-139-0x0000000000000000-mapping.dmp
-
memory/3928-153-0x0000000000000000-mapping.dmp
-
memory/3928-161-0x00000000052F0000-0x00000000052F1000-memory.dmpFilesize
4KB
-
memory/4152-115-0x0000000003269000-0x0000000003291000-memory.dmpFilesize
160KB
-
memory/4152-118-0x00000000031E0000-0x0000000003227000-memory.dmpFilesize
284KB
-
memory/4392-120-0x0000000000000000-mapping.dmp
-
memory/4392-126-0x0000000000C90000-0x0000000000C91000-memory.dmpFilesize
4KB
-
memory/4412-119-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/4412-117-0x0000000000401480-mapping.dmp
-
memory/4412-116-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB