Analysis

  • max time kernel
    147s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2022, 09:44

General

  • Target

    bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe

  • Size

    8.9MB

  • MD5

    04befedbe76440e1e24e59ff4244ce6a

  • SHA1

    a8a2d779abb35bf23ba21575af1e95a2ecd17265

  • SHA256

    bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee

  • SHA512

    fa52f5bf9327ba9aade2cf8cc115b824761f45fe195079ec5738f71258e4cac8b1b33b3fba3954aef7aef92c44de47f249d3109f56f798f5ad7be49d9d37f0f2

  • SSDEEP

    196608:YwX6s+9/A4IlpYpvG2OF+n4XRg2SS20yfdVJMjOK:YwX6s+9boYAhbgAy1vMKK

Malware Config

Extracted

Family

fickerstealer

C2

45.142.212.149:80

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 1 IoCs
  • Fickerstealer

    Ficker is an infostealer written in Rust and ASM.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe
    "C:\Users\Admin\AppData\Local\Temp\bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Users\Admin\AppData\Roaming\Smart Cleanup\SmartCleanup.exe
      "C:\Users\Admin\AppData\Roaming\Smart Cleanup\SmartCleanup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3876

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Smart Cleanup\SmartCleanup.exe

          Filesize

          5.7MB

          MD5

          793e6ce30eb7fa464e7fe88b2afbc5ec

          SHA1

          030bd140f2e6641237372a8b0e8b3cf709fcdea0

          SHA256

          aadaf74cdc8f29e530a9f851fe6951ba3ed9f636ed4f1d47384ba47eb6afcf35

          SHA512

          1430510d73ad144d7eb633710be1998cfab4ec5ced4972f44bf068e214877a91374b3377177334c33c0ac4594534434dc7bb2f2dbe8b860c8b3e221a6de560f7

        • C:\Users\Admin\AppData\Roaming\Smart Cleanup\SmartCleanup.exe

          Filesize

          5.7MB

          MD5

          793e6ce30eb7fa464e7fe88b2afbc5ec

          SHA1

          030bd140f2e6641237372a8b0e8b3cf709fcdea0

          SHA256

          aadaf74cdc8f29e530a9f851fe6951ba3ed9f636ed4f1d47384ba47eb6afcf35

          SHA512

          1430510d73ad144d7eb633710be1998cfab4ec5ced4972f44bf068e214877a91374b3377177334c33c0ac4594534434dc7bb2f2dbe8b860c8b3e221a6de560f7

        • C:\Users\Admin\AppData\Roaming\Smart Cleanup\libGLES-v2.dll

          Filesize

          3.8MB

          MD5

          047dc1bdc4ae912995248b1d32c35871

          SHA1

          ceac68884f61581b872f9d647a307d843a89687e

          SHA256

          29c07399a30b1934f3e62de0003e4583738473aa82e598bb9b7e2f2065a2cd04

          SHA512

          274bbcc637ade65e29b2002a65ad390e70575566f7f11335d267c79b1181a3ebe582a919f6b2f86daa85d4ab40b976b9b48ad27fbd3b3b758d3522e3f1ef93af

        • C:\Users\Admin\AppData\Roaming\Smart Cleanup\libGLES-v2.dll

          Filesize

          3.8MB

          MD5

          047dc1bdc4ae912995248b1d32c35871

          SHA1

          ceac68884f61581b872f9d647a307d843a89687e

          SHA256

          29c07399a30b1934f3e62de0003e4583738473aa82e598bb9b7e2f2065a2cd04

          SHA512

          274bbcc637ade65e29b2002a65ad390e70575566f7f11335d267c79b1181a3ebe582a919f6b2f86daa85d4ab40b976b9b48ad27fbd3b3b758d3522e3f1ef93af

        • C:\Users\Admin\AppData\Roaming\Smart Cleanup\menu.xml

          Filesize

          863KB

          MD5

          95a1235466d0e4435f1a41d41805a0c4

          SHA1

          3898d1d34e3227e6cb524fb5c2968700f125a7a4

          SHA256

          8cc8ead3a0ef670886094953beef7811f946caf934fa9725e9a0cfd02e6ebae6

          SHA512

          371fa784d127979e9c9a575d49839e1330c8030015d59a169639c640914b6ea011b8fbd27277130e815296a7f8c9a73992cfa1179d79f5c46113e7785caa9edc

        • memory/3876-138-0x0000000000400000-0x0000000000A0F000-memory.dmp

          Filesize

          6.1MB

        • memory/3876-139-0x0000000000400000-0x0000000000A0F000-memory.dmp

          Filesize

          6.1MB