Analysis
-
max time kernel
147s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2022, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe
Resource
win10v2004-20220901-en
General
-
Target
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe
-
Size
8.9MB
-
MD5
04befedbe76440e1e24e59ff4244ce6a
-
SHA1
a8a2d779abb35bf23ba21575af1e95a2ecd17265
-
SHA256
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee
-
SHA512
fa52f5bf9327ba9aade2cf8cc115b824761f45fe195079ec5738f71258e4cac8b1b33b3fba3954aef7aef92c44de47f249d3109f56f798f5ad7be49d9d37f0f2
-
SSDEEP
196608:YwX6s+9/A4IlpYpvG2OF+n4XRg2SS20yfdVJMjOK:YwX6s+9boYAhbgAy1vMKK
Malware Config
Extracted
fickerstealer
45.142.212.149:80
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral2/files/0x0001000000022ed8-137.dat family_babadeda -
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Executes dropped EXE 1 IoCs
pid Process 3876 SmartCleanup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe -
Loads dropped DLL 1 IoCs
pid Process 3876 SmartCleanup.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 3876 4396 bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe 83 PID 4396 wrote to memory of 3876 4396 bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe 83 PID 4396 wrote to memory of 3876 4396 bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe"C:\Users\Admin\AppData\Local\Temp\bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Roaming\Smart Cleanup\SmartCleanup.exe"C:\Users\Admin\AppData\Roaming\Smart Cleanup\SmartCleanup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5793e6ce30eb7fa464e7fe88b2afbc5ec
SHA1030bd140f2e6641237372a8b0e8b3cf709fcdea0
SHA256aadaf74cdc8f29e530a9f851fe6951ba3ed9f636ed4f1d47384ba47eb6afcf35
SHA5121430510d73ad144d7eb633710be1998cfab4ec5ced4972f44bf068e214877a91374b3377177334c33c0ac4594534434dc7bb2f2dbe8b860c8b3e221a6de560f7
-
Filesize
5.7MB
MD5793e6ce30eb7fa464e7fe88b2afbc5ec
SHA1030bd140f2e6641237372a8b0e8b3cf709fcdea0
SHA256aadaf74cdc8f29e530a9f851fe6951ba3ed9f636ed4f1d47384ba47eb6afcf35
SHA5121430510d73ad144d7eb633710be1998cfab4ec5ced4972f44bf068e214877a91374b3377177334c33c0ac4594534434dc7bb2f2dbe8b860c8b3e221a6de560f7
-
Filesize
3.8MB
MD5047dc1bdc4ae912995248b1d32c35871
SHA1ceac68884f61581b872f9d647a307d843a89687e
SHA25629c07399a30b1934f3e62de0003e4583738473aa82e598bb9b7e2f2065a2cd04
SHA512274bbcc637ade65e29b2002a65ad390e70575566f7f11335d267c79b1181a3ebe582a919f6b2f86daa85d4ab40b976b9b48ad27fbd3b3b758d3522e3f1ef93af
-
Filesize
3.8MB
MD5047dc1bdc4ae912995248b1d32c35871
SHA1ceac68884f61581b872f9d647a307d843a89687e
SHA25629c07399a30b1934f3e62de0003e4583738473aa82e598bb9b7e2f2065a2cd04
SHA512274bbcc637ade65e29b2002a65ad390e70575566f7f11335d267c79b1181a3ebe582a919f6b2f86daa85d4ab40b976b9b48ad27fbd3b3b758d3522e3f1ef93af
-
Filesize
863KB
MD595a1235466d0e4435f1a41d41805a0c4
SHA13898d1d34e3227e6cb524fb5c2968700f125a7a4
SHA2568cc8ead3a0ef670886094953beef7811f946caf934fa9725e9a0cfd02e6ebae6
SHA512371fa784d127979e9c9a575d49839e1330c8030015d59a169639c640914b6ea011b8fbd27277130e815296a7f8c9a73992cfa1179d79f5c46113e7785caa9edc