Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 06:58
Static task
static1
Behavioral task
behavioral1
Sample
59a6c1ed3330380a2e3c7671029777e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59a6c1ed3330380a2e3c7671029777e5.exe
Resource
win10v2004-20220812-en
General
-
Target
59a6c1ed3330380a2e3c7671029777e5.exe
-
Size
375KB
-
MD5
59a6c1ed3330380a2e3c7671029777e5
-
SHA1
71cc876b0003c55b548f9de7fde38c14a33e7a74
-
SHA256
3b9208447ad1e6a191918e6e2b71d26566ec3dd62ed3e2c1145c7bbdc786da3d
-
SHA512
2a7412bd5fdefb11852dba39db00491f9ee97a896b58e810691509782cc065d2e08564036e28b0b9fcda9410feb3c753364b3aad61026d2c3fcffad0069a1c8f
-
SSDEEP
6144:ztcTLgoQG1PuXv5OAikSItDFXF4SOsCXxMlgEi:ztkkoQG1uf5OALtlF0JXxMGEi
Malware Config
Extracted
fickerstealer
kefkfkf.link:8080
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
59a6c1ed3330380a2e3c7671029777e5.exedescription pid Process procid_target PID 1368 set thread context of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
59a6c1ed3330380a2e3c7671029777e5.exedescription pid Process procid_target PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27 PID 1368 wrote to memory of 980 1368 59a6c1ed3330380a2e3c7671029777e5.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\59a6c1ed3330380a2e3c7671029777e5.exe"C:\Users\Admin\AppData\Local\Temp\59a6c1ed3330380a2e3c7671029777e5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\59a6c1ed3330380a2e3c7671029777e5.exe"C:\Users\Admin\AppData\Local\Temp\59a6c1ed3330380a2e3c7671029777e5.exe"2⤵PID:980
-