Analysis

  • max time kernel
    47s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 19:52

General

  • Target

    aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe

  • Size

    344KB

  • MD5

    79329781a63ea815865fb4ade911ca7a

  • SHA1

    d675a3d89ad3ffce2aa6377508ee3ea4c8810b76

  • SHA256

    aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622

  • SHA512

    255db1840cd1a4e71b39cac8559ca277487a42f0ed71c49dbd104e1960b7e38cd24a309ee8be6a52719bc3ee8a6aa118e9a4fd1cb0b255ca5e17fdab803f9f96

  • SSDEEP

    6144:PAf5Wt4vurkVbK9OZbfcZYoZDmCwIVJfVKKNqjEEmmSWpY2wg8C:PRt4GIdKYZbeJZDjfV9cmmS12w0

Malware Config

Extracted

Family

fickerstealer

C2

lukkeze.club:80

Signatures

  • Fickerstealer

    Ficker is an infostealer written in Rust and ASM.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe
    "C:\Users\Admin\AppData\Local\Temp\aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe
      "C:\Users\Admin\AppData\Local\Temp\aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe"
      2⤵
        PID:1968

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/996-54-0x0000000002F58000-0x0000000002F7F000-memory.dmp

      Filesize

      156KB

    • memory/996-59-0x0000000000220000-0x0000000000265000-memory.dmp

      Filesize

      276KB

    • memory/996-58-0x0000000002F58000-0x0000000002F7F000-memory.dmp

      Filesize

      156KB

    • memory/1968-60-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/1968-55-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/1968-61-0x00000000757A1000-0x00000000757A3000-memory.dmp

      Filesize

      8KB

    • memory/1968-62-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/1968-63-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB