Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2023 04:41
Static task
static1
Behavioral task
behavioral1
Sample
a983f92e01f896658e290d072fc82e72.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a983f92e01f896658e290d072fc82e72.exe
Resource
win10v2004-20230220-en
General
-
Target
a983f92e01f896658e290d072fc82e72.exe
-
Size
617KB
-
MD5
a983f92e01f896658e290d072fc82e72
-
SHA1
8e531921442d1e8d2a264b825009e06d829a037d
-
SHA256
d79a1f94e5bd55d0ac6b65c55984801b876fd27236a7e458ccba4e49e2a9bd85
-
SHA512
b28309374c275ff42573aadb4e7b2ce0c85618c1b7dda9d43c3f58acdac722ae974e19d3fd4e006229afe3bf9f2bfd2124fdaf642011afb9f982b4529fe0120f
-
SSDEEP
12288:6o+8M9y1CuNt7DDYm+za1dwjk/Zf0sOveMTrPuAyBZ7:6o8VuNRMfza/wgxd6hH67
Malware Config
Extracted
fickerstealer
91.228.224.98:8080
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a983f92e01f896658e290d072fc82e72.exedescription pid Process procid_target PID 812 set thread context of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
vbc.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid Process 3616 vbc.exe 3616 vbc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a983f92e01f896658e290d072fc82e72.exedescription pid Process procid_target PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83 PID 812 wrote to memory of 3616 812 a983f92e01f896658e290d072fc82e72.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a983f92e01f896658e290d072fc82e72.exe"C:\Users\Admin\AppData\Local\Temp\a983f92e01f896658e290d072fc82e72.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD571d587e911373f62d72a158eceb6e0e7
SHA168d81a1a4fb19c609288a94f10d1bbb92d972a68
SHA256acce61361a3dee677653fa2909f29530202335835c71031ba4dff50682ae5de8
SHA512a0010c487c8b1eeae82ae82896bf5f48b7ec5573197bbe149b6803093a32b3b470ef0b122278e404cd5df296376bb0629438609997d52c14757ff1c3e6756060