Analysis
-
max time kernel
158s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2022 02:08
Static task
static1
Behavioral task
behavioral1
Sample
e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c.exe
Resource
win10v2004-20220812-en
General
-
Target
e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c.exe
-
Size
2.6MB
-
MD5
5596e6b3cac3574bd957b86c8250773a
-
SHA1
298016941cfa7095a19fc274137dc0f7dbed2a7a
-
SHA256
e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c
-
SHA512
78dfdc615f3239e655d63e310f6778831a5b384eb28e67099d12aa5a433b79a9a75754cca38f4a1838126b64a8d4aa2af0d482d34ea0b2b89cad91e2f0290870
-
SSDEEP
49152:5vJeIiv6Lcj0hB/8qyTO4LMJDdhK27BYV:5vJ5ivIS0hBDyK4LMJrbY
Malware Config
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Executes dropped EXE 4 IoCs
pid Process 2112 1666498212308.exe 2496 unohostclr.exe 3608 unohostclr.exe 3412 unohostclr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 1666498212308.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 2364 1660 WerFault.exe 79 332 1660 WerFault.exe 79 1796 1660 WerFault.exe 79 1144 1660 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2452 schtasks.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2112 1660 e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c.exe 87 PID 1660 wrote to memory of 2112 1660 e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c.exe 87 PID 1660 wrote to memory of 2112 1660 e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c.exe 87 PID 2112 wrote to memory of 2452 2112 1666498212308.exe 92 PID 2112 wrote to memory of 2452 2112 1666498212308.exe 92 PID 2112 wrote to memory of 2452 2112 1666498212308.exe 92 PID 2112 wrote to memory of 2496 2112 1666498212308.exe 94 PID 2112 wrote to memory of 2496 2112 1666498212308.exe 94 PID 2112 wrote to memory of 2496 2112 1666498212308.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c.exe"C:\Users\Admin\AppData\Local\Temp\e94bfd09dc3b73fa96c284fd08d351197b2e6a7b4f2a4d051c76d7f77539639c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 10642⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 11082⤵
- Program crash
PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\1666498212308.exe"C:\Users\Admin\AppData\Local\Temp\1666498212308.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN UnoHostCLR /F /TR "C:\Users\Admin\AppData\Roaming\UnoHost\unohostclr.exe" /st 00:00 /du 23:59 /sc daily /ri 13⤵
- Creates scheduled task(s)
PID:2452
-
-
C:\Users\Admin\AppData\Roaming\UnoHost\unohostclr.exe"C:\Users\Admin\AppData\Roaming\UnoHost\unohostclr.exe" C:\Users\Admin\AppData\Local\Temp\1666498212308.exe3⤵
- Executes dropped EXE
PID:2496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 10842⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 1402⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1660 -ip 16601⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1660 -ip 16601⤵PID:208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1660 -ip 16601⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1660 -ip 16601⤵PID:4340
-
C:\Users\Admin\AppData\Roaming\UnoHost\unohostclr.exeC:\Users\Admin\AppData\Roaming\UnoHost\unohostclr.exe1⤵
- Executes dropped EXE
PID:3608
-
C:\Users\Admin\AppData\Roaming\UnoHost\unohostclr.exeC:\Users\Admin\AppData\Roaming\UnoHost\unohostclr.exe1⤵
- Executes dropped EXE
PID:3412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD583ad610d5f50751a7ae466869169389e
SHA11d2f894b0ca610cf6c88ccb2eabdd4e0d639447f
SHA25607bbeb90b6cb4bac7f08ea5332d65f4063de53121d1b7e16a95fd42d0e67d35c
SHA512c7d0e6aa81f05d660be1a09fbe17953d577915eb7f4decfb9b9c84946ca8b6ab5926dda3afa1429eb7938d4337463d0d002c610c872a3e27a7a11bfffc3b9529
-
Filesize
2.0MB
MD583ad610d5f50751a7ae466869169389e
SHA11d2f894b0ca610cf6c88ccb2eabdd4e0d639447f
SHA25607bbeb90b6cb4bac7f08ea5332d65f4063de53121d1b7e16a95fd42d0e67d35c
SHA512c7d0e6aa81f05d660be1a09fbe17953d577915eb7f4decfb9b9c84946ca8b6ab5926dda3afa1429eb7938d4337463d0d002c610c872a3e27a7a11bfffc3b9529
-
Filesize
2.0MB
MD583ad610d5f50751a7ae466869169389e
SHA11d2f894b0ca610cf6c88ccb2eabdd4e0d639447f
SHA25607bbeb90b6cb4bac7f08ea5332d65f4063de53121d1b7e16a95fd42d0e67d35c
SHA512c7d0e6aa81f05d660be1a09fbe17953d577915eb7f4decfb9b9c84946ca8b6ab5926dda3afa1429eb7938d4337463d0d002c610c872a3e27a7a11bfffc3b9529
-
Filesize
2.0MB
MD583ad610d5f50751a7ae466869169389e
SHA11d2f894b0ca610cf6c88ccb2eabdd4e0d639447f
SHA25607bbeb90b6cb4bac7f08ea5332d65f4063de53121d1b7e16a95fd42d0e67d35c
SHA512c7d0e6aa81f05d660be1a09fbe17953d577915eb7f4decfb9b9c84946ca8b6ab5926dda3afa1429eb7938d4337463d0d002c610c872a3e27a7a11bfffc3b9529
-
Filesize
2.0MB
MD583ad610d5f50751a7ae466869169389e
SHA11d2f894b0ca610cf6c88ccb2eabdd4e0d639447f
SHA25607bbeb90b6cb4bac7f08ea5332d65f4063de53121d1b7e16a95fd42d0e67d35c
SHA512c7d0e6aa81f05d660be1a09fbe17953d577915eb7f4decfb9b9c84946ca8b6ab5926dda3afa1429eb7938d4337463d0d002c610c872a3e27a7a11bfffc3b9529
-
Filesize
2.0MB
MD583ad610d5f50751a7ae466869169389e
SHA11d2f894b0ca610cf6c88ccb2eabdd4e0d639447f
SHA25607bbeb90b6cb4bac7f08ea5332d65f4063de53121d1b7e16a95fd42d0e67d35c
SHA512c7d0e6aa81f05d660be1a09fbe17953d577915eb7f4decfb9b9c84946ca8b6ab5926dda3afa1429eb7938d4337463d0d002c610c872a3e27a7a11bfffc3b9529