Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe
Resource
win10v2004-20220812-en
General
-
Target
ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe
-
Size
4.8MB
-
MD5
6678549db6974d6962363d8b82ee7be2
-
SHA1
b3fc1aca4ff8ad96d48895d7d9bc8e136151b844
-
SHA256
ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc
-
SHA512
39ed85ba147bbfb9625afa993993867676ebfd6efddf43f49a0d838a498c6d6be45501a8f02f3be682b5711c38119899547301bb7a02e13c003614f13a4f13b1
-
SSDEEP
98304:nSibgJW3oGqaFvY9Jp+oyyuMNfyCUFStjqNsNM5NEQ2Z+dnPcMc:1TtY9JpXXuMNzUwANsu5z2Z+1cd
Malware Config
Extracted
fickerstealer
45.142.212.149:80
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x0006000000014156-78.dat family_babadeda -
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Executes dropped EXE 3 IoCs
pid Process 1944 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 568 volcenter.exe -
Loads dropped DLL 5 IoCs
pid Process 536 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 1700 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 568 volcenter.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 536 wrote to memory of 1944 536 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 27 PID 536 wrote to memory of 1944 536 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 27 PID 536 wrote to memory of 1944 536 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 27 PID 536 wrote to memory of 1944 536 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 27 PID 536 wrote to memory of 1944 536 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 27 PID 536 wrote to memory of 1944 536 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 27 PID 536 wrote to memory of 1944 536 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 27 PID 1944 wrote to memory of 1700 1944 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 28 PID 1944 wrote to memory of 1700 1944 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 28 PID 1944 wrote to memory of 1700 1944 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 28 PID 1944 wrote to memory of 1700 1944 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 28 PID 1944 wrote to memory of 1700 1944 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 28 PID 1944 wrote to memory of 1700 1944 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 28 PID 1944 wrote to memory of 1700 1944 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 28 PID 1700 wrote to memory of 900 1700 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 29 PID 1700 wrote to memory of 900 1700 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 29 PID 1700 wrote to memory of 900 1700 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 29 PID 1700 wrote to memory of 900 1700 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 29 PID 1700 wrote to memory of 900 1700 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 29 PID 1700 wrote to memory of 900 1700 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 29 PID 1700 wrote to memory of 900 1700 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe 29 PID 900 wrote to memory of 568 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 30 PID 900 wrote to memory of 568 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 30 PID 900 wrote to memory of 568 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 30 PID 900 wrote to memory of 568 900 ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe"C:\Users\Admin\AppData\Local\Temp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\is-PVAF1.tmp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp"C:\Users\Admin\AppData\Local\Temp\is-PVAF1.tmp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp" /SL5="$60120,4197708,831488,C:\Users\Admin\AppData\Local\Temp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe"C:\Users\Admin\AppData\Local\Temp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe" /VERYSILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\is-GCNHB.tmp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp"C:\Users\Admin\AppData\Local\Temp\is-GCNHB.tmp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp" /SL5="$70120,4197708,831488,C:\Users\Admin\AppData\Local\Temp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\SharpShell Configurator\volcenter.exe"C:\Users\Admin\AppData\Roaming\SharpShell Configurator\volcenter.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:568
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-GCNHB.tmp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp
Filesize3.0MB
MD5e1f761cde120ab5fb715eaa71bfdf516
SHA1b56561aa0cbcd55eafeec32d6e88a9b3c503dfc2
SHA25698a177df49a0e70e73202e033ed2e2a4e7e4d55f3a0824eff90b057ba34c3c90
SHA5124bd1c4fdcc83c34ab89b7c68c926019c291d85e99fb16031ccf582215bb305635fff29a74c7b3306dcf8d13aa14901ed7a7ace59b55ec8d1b9e0e553ae94b591
-
C:\Users\Admin\AppData\Local\Temp\is-PVAF1.tmp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp
Filesize3.0MB
MD5e1f761cde120ab5fb715eaa71bfdf516
SHA1b56561aa0cbcd55eafeec32d6e88a9b3c503dfc2
SHA25698a177df49a0e70e73202e033ed2e2a4e7e4d55f3a0824eff90b057ba34c3c90
SHA5124bd1c4fdcc83c34ab89b7c68c926019c291d85e99fb16031ccf582215bb305635fff29a74c7b3306dcf8d13aa14901ed7a7ace59b55ec8d1b9e0e553ae94b591
-
Filesize
863KB
MD5cb2d543f6b9936599848824ddb769661
SHA1707c7bf30bc47aab26780c70accaaa6824395aa1
SHA256b3f91f360c775655a7c22acb7f81905c9f2b1217c456f0542418e2460c998191
SHA51261e621aa47bacca92aafa8765c494871d3409b807427479fe6ab5cbc87f37310621710b7cd180ba894b7eee643ce9467fcdc625ecfa5c837480b4de845d23346
-
Filesize
3.9MB
MD53a0507e45d22fe30bac2c45e72ea7450
SHA1c0766576a3247c159ff8e15a42ca215efcb1c6fa
SHA256530af0490c3dcc6b7e25e0aa3db208d20ca2a30a38349289cb2749a302d179d4
SHA51263bf703cb9d466d398754c6d24b19a1ce5a6b39ece86dfca296a106c335a503cc0be2669f75808aeef64089132b5140a662a78b22354b7b83c34cdfb43546988
-
Filesize
4.8MB
MD5b5cc4b918bc3873ff4a26951c17329fe
SHA166e4614ecc5eda9a376d3d21176a28968b964a06
SHA2566ec2fc6c161771eca089e03330348b54b8d9a8dae5c73f59d58ac585f8c84082
SHA512dc7829453592835c43af85d08029bf0d7519041d7d9494d169bd179b8f1b6c018e9f0f2b2ff184f9f5c608d5b6dd3285185e762402d5e80bc16e9eb351387691
-
\Users\Admin\AppData\Local\Temp\is-GCNHB.tmp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp
Filesize3.0MB
MD5e1f761cde120ab5fb715eaa71bfdf516
SHA1b56561aa0cbcd55eafeec32d6e88a9b3c503dfc2
SHA25698a177df49a0e70e73202e033ed2e2a4e7e4d55f3a0824eff90b057ba34c3c90
SHA5124bd1c4fdcc83c34ab89b7c68c926019c291d85e99fb16031ccf582215bb305635fff29a74c7b3306dcf8d13aa14901ed7a7ace59b55ec8d1b9e0e553ae94b591
-
\Users\Admin\AppData\Local\Temp\is-PVAF1.tmp\ad90d436c3465d6ae2f4bee7f0aafb828f150eff6a0a6c76fdd83c895b2070dc.tmp
Filesize3.0MB
MD5e1f761cde120ab5fb715eaa71bfdf516
SHA1b56561aa0cbcd55eafeec32d6e88a9b3c503dfc2
SHA25698a177df49a0e70e73202e033ed2e2a4e7e4d55f3a0824eff90b057ba34c3c90
SHA5124bd1c4fdcc83c34ab89b7c68c926019c291d85e99fb16031ccf582215bb305635fff29a74c7b3306dcf8d13aa14901ed7a7ace59b55ec8d1b9e0e553ae94b591
-
Filesize
3.9MB
MD53a0507e45d22fe30bac2c45e72ea7450
SHA1c0766576a3247c159ff8e15a42ca215efcb1c6fa
SHA256530af0490c3dcc6b7e25e0aa3db208d20ca2a30a38349289cb2749a302d179d4
SHA51263bf703cb9d466d398754c6d24b19a1ce5a6b39ece86dfca296a106c335a503cc0be2669f75808aeef64089132b5140a662a78b22354b7b83c34cdfb43546988
-
Filesize
4.8MB
MD5b5cc4b918bc3873ff4a26951c17329fe
SHA166e4614ecc5eda9a376d3d21176a28968b964a06
SHA2566ec2fc6c161771eca089e03330348b54b8d9a8dae5c73f59d58ac585f8c84082
SHA512dc7829453592835c43af85d08029bf0d7519041d7d9494d169bd179b8f1b6c018e9f0f2b2ff184f9f5c608d5b6dd3285185e762402d5e80bc16e9eb351387691
-
Filesize
4.8MB
MD5b5cc4b918bc3873ff4a26951c17329fe
SHA166e4614ecc5eda9a376d3d21176a28968b964a06
SHA2566ec2fc6c161771eca089e03330348b54b8d9a8dae5c73f59d58ac585f8c84082
SHA512dc7829453592835c43af85d08029bf0d7519041d7d9494d169bd179b8f1b6c018e9f0f2b2ff184f9f5c608d5b6dd3285185e762402d5e80bc16e9eb351387691