Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 14:30
Static task
static1
Behavioral task
behavioral1
Sample
39dff8331999da03251fd208b84b8971.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
39dff8331999da03251fd208b84b8971.exe
Resource
win10v2004-20231215-en
General
-
Target
39dff8331999da03251fd208b84b8971.exe
-
Size
534KB
-
MD5
39dff8331999da03251fd208b84b8971
-
SHA1
00875199238e66ebf0a1782b3c8fc55f6c803810
-
SHA256
f16532d0481496143ed0b4241cd76e8d0ce91b8c763ef947984636e6ed187394
-
SHA512
60f194629e08e76b66007077cbf4cb68b7a79222fc44dbef1bb7295662ceff37de7f4b4b14ad0dfd80e9994fa9a06471c124cff7f1b9ad38e52560422c719168
-
SSDEEP
6144:79jusFJc1l736iyBp27Os7FhFKF6ZLKzGZrNVfs8ViMW0rLAb56dpLN4XQKJrsu:799cCpCbKWN2jMW0rwrsu
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
39dff8331999da03251fd208b84b8971.exedescription pid process target process PID 2212 set thread context of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
39dff8331999da03251fd208b84b8971.exedescription pid process target process PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe PID 2212 wrote to memory of 320 2212 39dff8331999da03251fd208b84b8971.exe 39dff8331999da03251fd208b84b8971.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39dff8331999da03251fd208b84b8971.exe"C:\Users\Admin\AppData\Local\Temp\39dff8331999da03251fd208b84b8971.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\39dff8331999da03251fd208b84b8971.exe"C:\Users\Admin\AppData\Local\Temp\39dff8331999da03251fd208b84b8971.exe"2⤵PID:320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD58cf4dec152a9d79a3d62202b886eda9b
SHA10c1b3d3d02c0b655aa3526a58486b84872f18cc2
SHA256c30e56c9c8fe30ffa4a4ff712cf2fa1808ee82ca258cd4c8ebefcc82250b6c01
SHA512a5a65f0604f8553d0be07bd5214db52d3f167e7511d29cb64e3fa9d8c510cc79976ff2a5acb9b8c09b666f306ac8e4ad389f9a2de3ca46d57b1e91060a4c50fd