Analysis
-
max time kernel
43s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe
Resource
win10v2004-20220812-en
General
-
Target
9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe
-
Size
536KB
-
MD5
0fd7de5367376231a788872005d7ed4f
-
SHA1
658e4d5efb8b14661967be2183cc60e3e561b2b6
-
SHA256
9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd
-
SHA512
522d5be2803fbce0d12c325cc2ef1e3a92cec03aeba7d1164530093ad58caecd827dd557ca3c182a66c6667150e731de37bb552d19425f96cc78fe3423e1a863
-
SSDEEP
12288:eKmlz464jAfhe5pUC1jAXBoFACBfz6JMW0rwrsu:oz4d/5iCj0BoNBb6Jh3
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exedescription pid Process procid_target PID 1800 set thread context of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exedescription pid Process procid_target PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28 PID 1800 wrote to memory of 1572 1800 9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe"C:\Users\Admin\AppData\Local\Temp\9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe"C:\Users\Admin\AppData\Local\Temp\9083992637e90e412e6f4e77331eb69ee8db821c54bbc38533e0f889cc4ca9dd.exe"2⤵PID:1572
-