Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 16:16
Static task
static1
Behavioral task
behavioral1
Sample
974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe
Resource
win10v2004-20220414-en
General
-
Target
974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe
-
Size
322KB
-
MD5
82cd72fb70faf6f7e0e840e71988b053
-
SHA1
d93913f7080e0603f058fabc76fb1f95da3ac1fe
-
SHA256
974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264
-
SHA512
acf512b9c5cfecf627491d56ae4ef7b2a358ce4a58e167efb1456e5390e78be44b1a72a17914dbc1625da1b57fac723ff7d700ccdfe07a00913b877f42352435
Malware Config
Extracted
fickerstealer
93.114.128.19:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
resource yara_rule behavioral2/memory/2004-138-0x0000000000400000-0x00000000043EA000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80 PID 2004 wrote to memory of 4336 2004 974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe"C:\Users\Admin\AppData\Local\Temp\974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe"C:\Users\Admin\AppData\Local\Temp\974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264.exe"2⤵PID:4336
-