Analysis
-
max time kernel
1s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
3da310046da9a804ca0757cbfafc0c72.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3da310046da9a804ca0757cbfafc0c72.exe
Resource
win10v2004-20231222-en
General
-
Target
3da310046da9a804ca0757cbfafc0c72.exe
-
Size
578KB
-
MD5
3da310046da9a804ca0757cbfafc0c72
-
SHA1
b8e6c9346092d1bad43f4dee58b84e157f1a5e4a
-
SHA256
f66d8290b683a6de6c3a793046d8b2f908d14459d90efe21704711d9854f0306
-
SHA512
3fbbd961bc808edc023c3129ad6ef398007f8d1aa116ad088c0349f1f4b5960af089d8629057bfba5cd6e119b1fd95139cd7a15543c1df133fb8eb5bbf018798
-
SSDEEP
12288:u9y03wdYmkt9Ut9zyWS/1zZJrapeB/bL3LGIJMW0rwrsu:cwdYmktdNznieNzLhh3
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3da310046da9a804ca0757cbfafc0c72.exedescription pid process target process PID 2008 set thread context of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
3da310046da9a804ca0757cbfafc0c72.exedescription pid process target process PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe PID 2008 wrote to memory of 2196 2008 3da310046da9a804ca0757cbfafc0c72.exe 3da310046da9a804ca0757cbfafc0c72.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3da310046da9a804ca0757cbfafc0c72.exe"C:\Users\Admin\AppData\Local\Temp\3da310046da9a804ca0757cbfafc0c72.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\3da310046da9a804ca0757cbfafc0c72.exe"C:\Users\Admin\AppData\Local\Temp\3da310046da9a804ca0757cbfafc0c72.exe"2⤵PID:2196
-