Analysis
-
max time kernel
153s -
max time network
212s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-05-2022 03:35
Static task
static1
Behavioral task
behavioral1
Sample
02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe
Resource
win10v2004-20220414-en
General
-
Target
02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe
-
Size
286KB
-
MD5
b80869baf5276044cf97ed3170871e65
-
SHA1
31438e0c5b6d93ecc48a7c8c8bcae8d0b883da00
-
SHA256
02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf
-
SHA512
4c71f791a6640700e822d60fcc9d3b224c2ced41cd762aec97177916e7f77481910918ab5637f2e59592d28babd4b64ed7ed91e0945b7395b8965185bc48cf12
Malware Config
Extracted
fickerstealer
lukkeze.space:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exedescription pid Process procid_target PID 1700 set thread context of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exedescription pid Process procid_target PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28 PID 1700 wrote to memory of 1780 1700 02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe"C:\Users\Admin\AppData\Local\Temp\02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe"C:\Users\Admin\AppData\Local\Temp\02a07e2a25d19de8006fced52daaf0a5d179a46468755609b3a2254095342faf.exe"2⤵PID:1780
-