Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe
Resource
win10v2004-20220812-en
General
-
Target
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe
-
Size
10.7MB
-
MD5
60bce89d8df5caa28d3d73ee4c94313a
-
SHA1
878e237aeb528a1e4c6c3fe53cb4ffd1c420231e
-
SHA256
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d
-
SHA512
963629759df10731e7b49a113fd4eb462286d26d4b394bab89bea35f4515cc907d803b01313764b973ebd4876a40e2fff820ad6b10f7a142e74a31a836010665
-
SSDEEP
196608:yxthehwzf4soekmmf7zADj75xtw0QkyPAm2VxdG1P5K5S2njugWR:meCBoeq7adK7JonCxC7juR
Malware Config
Extracted
fickerstealer
prunerflowershop.com:80
Signatures
-
Babadeda Crypter 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000022e22-151.dat family_babadeda -
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Executes dropped EXE 3 IoCs
Processes:
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmpcf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmpalcodec.exepid Process 2252 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 2964 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 4928 alcodec.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmpcf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmpdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp -
Loads dropped DLL 1 IoCs
Processes:
alcodec.exepid Process 4928 alcodec.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmppid Process 2964 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 2964 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmppid Process 2964 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.execf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmpcf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.execf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmpdescription pid Process procid_target PID 1800 wrote to memory of 2252 1800 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 79 PID 1800 wrote to memory of 2252 1800 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 79 PID 1800 wrote to memory of 2252 1800 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 79 PID 2252 wrote to memory of 1132 2252 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 80 PID 2252 wrote to memory of 1132 2252 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 80 PID 2252 wrote to memory of 1132 2252 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 80 PID 1132 wrote to memory of 2964 1132 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 81 PID 1132 wrote to memory of 2964 1132 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 81 PID 1132 wrote to memory of 2964 1132 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 81 PID 2964 wrote to memory of 4928 2964 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 82 PID 2964 wrote to memory of 4928 2964 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 82 PID 2964 wrote to memory of 4928 2964 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe"C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\is-SKKPF.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp"C:\Users\Admin\AppData\Local\Temp\is-SKKPF.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp" /SL5="$D0066,10301284,798720,C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe"C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\is-A76OI.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp"C:\Users\Admin\AppData\Local\Temp\is-A76OI.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp" /SL5="$A01C4,10301284,798720,C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\Creative Labs OpenAl Codec\alcodec.exe"C:\Users\Admin\AppData\Roaming\Creative Labs OpenAl Codec\alcodec.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4928
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-A76OI.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp
Filesize3.0MB
MD5e0058e78c38cdc18f30f3b2e508f7f82
SHA1fea2c5bcf045677de140a66f69a1ce471fcd3592
SHA256e952f410d2b4ad999407961619973f658b3fd7362e79becbb647b7e673b213b0
SHA512c584594551132787fe1d428e6751187a4d6e5a9bc7c42b87b1d9a4f9c3f152673735f50b4114f61a6509bceebe4d777021bcc06dce20a2d0839325bc93cdb63d
-
C:\Users\Admin\AppData\Local\Temp\is-SKKPF.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp
Filesize3.0MB
MD5e0058e78c38cdc18f30f3b2e508f7f82
SHA1fea2c5bcf045677de140a66f69a1ce471fcd3592
SHA256e952f410d2b4ad999407961619973f658b3fd7362e79becbb647b7e673b213b0
SHA512c584594551132787fe1d428e6751187a4d6e5a9bc7c42b87b1d9a4f9c3f152673735f50b4114f61a6509bceebe4d777021bcc06dce20a2d0839325bc93cdb63d
-
Filesize
859KB
MD57d48ba5bfc96796ab7dc48f6764aec44
SHA1bec9f2d46ad903fdbf66a92aeb95c6da1d29441a
SHA2564d8fa3c825223e76c1ec3a002ff10208a3d3a91366de8472d3afa61fdf3e0ab8
SHA51271914f9266aca04de7e01d04fc7c213a82bb082968e4b8e88cc0e9bf765cb5e1d40a89cc994c03569533ec1355497e853a21a1ac22ae098de8a686241235ce1f
-
Filesize
3.5MB
MD5f387a40e95f63b5647beecdd9c4bf80e
SHA16d3e94f983eb4260e828048f464febfe80fdc5cb
SHA256f607c5c57a1dcfbf8f674519bd68358d147a93458ae18549c4eeea775d179118
SHA51249ff23b2a024de3aa8384c5bd7743038af6c714d82deed2bf839e292ad7d188c220ed792de75f5b42d7da40a955ed78ceb4628100d8385de4ff149377dcc3e2b
-
Filesize
3.5MB
MD5f387a40e95f63b5647beecdd9c4bf80e
SHA16d3e94f983eb4260e828048f464febfe80fdc5cb
SHA256f607c5c57a1dcfbf8f674519bd68358d147a93458ae18549c4eeea775d179118
SHA51249ff23b2a024de3aa8384c5bd7743038af6c714d82deed2bf839e292ad7d188c220ed792de75f5b42d7da40a955ed78ceb4628100d8385de4ff149377dcc3e2b
-
Filesize
17.1MB
MD53399513c46e46661a9d6c59ec92aefe7
SHA1696d40c6c74d5fdffe60880a454dfe69fd5400cb
SHA256a545d9fdff40e69b99b5f4a118b43666ce6c4f63aec5ca6316b8749c68286eb3
SHA512f3d3eb2491ff640830773dc2e536a8ad196f06a89075c7cd041467a1d08860232a35fcc2da8a20420f4003eb68ca06a66128d73ebd3dbf4a371e5deb4de54ce9
-
Filesize
17.1MB
MD53399513c46e46661a9d6c59ec92aefe7
SHA1696d40c6c74d5fdffe60880a454dfe69fd5400cb
SHA256a545d9fdff40e69b99b5f4a118b43666ce6c4f63aec5ca6316b8749c68286eb3
SHA512f3d3eb2491ff640830773dc2e536a8ad196f06a89075c7cd041467a1d08860232a35fcc2da8a20420f4003eb68ca06a66128d73ebd3dbf4a371e5deb4de54ce9