Analysis
-
max time kernel
166s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
3da310046da9a804ca0757cbfafc0c72.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3da310046da9a804ca0757cbfafc0c72.exe
Resource
win10v2004-20231215-en
General
-
Target
3da310046da9a804ca0757cbfafc0c72.exe
-
Size
578KB
-
MD5
3da310046da9a804ca0757cbfafc0c72
-
SHA1
b8e6c9346092d1bad43f4dee58b84e157f1a5e4a
-
SHA256
f66d8290b683a6de6c3a793046d8b2f908d14459d90efe21704711d9854f0306
-
SHA512
3fbbd961bc808edc023c3129ad6ef398007f8d1aa116ad088c0349f1f4b5960af089d8629057bfba5cd6e119b1fd95139cd7a15543c1df133fb8eb5bbf018798
-
SSDEEP
12288:u9y03wdYmkt9Ut9zyWS/1zZJrapeB/bL3LGIJMW0rwrsu:cwdYmktdNznieNzLhh3
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3da310046da9a804ca0757cbfafc0c72.exedescription pid process target process PID 2388 set thread context of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
3da310046da9a804ca0757cbfafc0c72.exedescription pid process target process PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2388 wrote to memory of 2136 2388 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3da310046da9a804ca0757cbfafc0c72.exe"C:\Users\Admin\AppData\Local\Temp\3da310046da9a804ca0757cbfafc0c72.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\3da310046da9a804ca0757cbfafc0c72.exe"C:\Users\Admin\AppData\Local\Temp\3da310046da9a804ca0757cbfafc0c72.exe"2⤵PID:2136
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD58cf4dec152a9d79a3d62202b886eda9b
SHA10c1b3d3d02c0b655aa3526a58486b84872f18cc2
SHA256c30e56c9c8fe30ffa4a4ff712cf2fa1808ee82ca258cd4c8ebefcc82250b6c01
SHA512a5a65f0604f8553d0be07bd5214db52d3f167e7511d29cb64e3fa9d8c510cc79976ff2a5acb9b8c09b666f306ac8e4ad389f9a2de3ca46d57b1e91060a4c50fd