Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-02-2023 04:41
Static task
static1
Behavioral task
behavioral1
Sample
a983f92e01f896658e290d072fc82e72.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a983f92e01f896658e290d072fc82e72.exe
Resource
win10v2004-20230220-en
General
-
Target
a983f92e01f896658e290d072fc82e72.exe
-
Size
617KB
-
MD5
a983f92e01f896658e290d072fc82e72
-
SHA1
8e531921442d1e8d2a264b825009e06d829a037d
-
SHA256
d79a1f94e5bd55d0ac6b65c55984801b876fd27236a7e458ccba4e49e2a9bd85
-
SHA512
b28309374c275ff42573aadb4e7b2ce0c85618c1b7dda9d43c3f58acdac722ae974e19d3fd4e006229afe3bf9f2bfd2124fdaf642011afb9f982b4529fe0120f
-
SSDEEP
12288:6o+8M9y1CuNt7DDYm+za1dwjk/Zf0sOveMTrPuAyBZ7:6o8VuNRMfza/wgxd6hH67
Malware Config
Extracted
fickerstealer
91.228.224.98:8080
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a983f92e01f896658e290d072fc82e72.exedescription pid Process procid_target PID 1484 set thread context of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
vbc.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vbc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vbc.exepid Process 1436 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
a983f92e01f896658e290d072fc82e72.exedescription pid Process procid_target PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27 PID 1484 wrote to memory of 1436 1484 a983f92e01f896658e290d072fc82e72.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a983f92e01f896658e290d072fc82e72.exe"C:\Users\Admin\AppData\Local\Temp\a983f92e01f896658e290d072fc82e72.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD50146b97f1bf748301734071d33706ba1
SHA14fe8ed756a2e7d09499d962cb3ffd9a7d3e20495
SHA256c3af235b5b9c8f8c0657cab7c8c85f85d97100c7d13cb4fb6626c667e06b697f
SHA51234e2df58d22ddbc3b5d4355394232e71b8ec68c389d2a21d99981200ba80e3f90e4af3c56aef2d50b5042796d658e6ac9007450d4e32f0d8db43d167a59f0cfb