Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 19:52

General

  • Target

    aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe

  • Size

    344KB

  • MD5

    79329781a63ea815865fb4ade911ca7a

  • SHA1

    d675a3d89ad3ffce2aa6377508ee3ea4c8810b76

  • SHA256

    aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622

  • SHA512

    255db1840cd1a4e71b39cac8559ca277487a42f0ed71c49dbd104e1960b7e38cd24a309ee8be6a52719bc3ee8a6aa118e9a4fd1cb0b255ca5e17fdab803f9f96

  • SSDEEP

    6144:PAf5Wt4vurkVbK9OZbfcZYoZDmCwIVJfVKKNqjEEmmSWpY2wg8C:PRt4GIdKYZbeJZDjfV9cmmS12w0

Malware Config

Extracted

Family

fickerstealer

C2

lukkeze.club:80

Signatures

  • Fickerstealer

    Ficker is an infostealer written in Rust and ASM.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe
    "C:\Users\Admin\AppData\Local\Temp\aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe
      "C:\Users\Admin\AppData\Local\Temp\aef462feef089ff65636c11a46e3eb050152c35a2239b420426f206ab69be622.exe"
      2⤵
        PID:3492

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2700-136-0x0000000002BD0000-0x0000000002C15000-memory.dmp

      Filesize

      276KB

    • memory/2700-135-0x0000000002EE3000-0x0000000002F0A000-memory.dmp

      Filesize

      156KB

    • memory/3492-133-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/3492-137-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/3492-138-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/3492-139-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB