Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
d56c1454ba50e5726df1c1f9cb64c310.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d56c1454ba50e5726df1c1f9cb64c310.exe
Resource
win10v2004-20240226-en
General
-
Target
d56c1454ba50e5726df1c1f9cb64c310.exe
-
Size
446KB
-
MD5
d56c1454ba50e5726df1c1f9cb64c310
-
SHA1
18e3ff47adbe879d8329d9d614fea679416ac126
-
SHA256
3ba446e8536427d61e5a46027cf0b60603cc9875fd91df2f3603e6ade817c33f
-
SHA512
92780f6af372e4055e5180d1047d733d2d138359718c72528e6d6541768def02f00d8de8042b7ba33df8c66359ee58167a9c34d8751f8e5907b9054904b882a1
-
SSDEEP
6144:tSLlO+SzMZpSIhX+Yrk9upCTOo+jlXPMW0rLAb56dpLN4XQKJrsu:8A+SQpSIDrk9KNPMW0rwrsu
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d56c1454ba50e5726df1c1f9cb64c310.exedescription pid Process procid_target PID 1288 set thread context of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
d56c1454ba50e5726df1c1f9cb64c310.exedescription pid Process procid_target PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28 PID 1288 wrote to memory of 1792 1288 d56c1454ba50e5726df1c1f9cb64c310.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d56c1454ba50e5726df1c1f9cb64c310.exe"C:\Users\Admin\AppData\Local\Temp\d56c1454ba50e5726df1c1f9cb64c310.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\d56c1454ba50e5726df1c1f9cb64c310.exe"C:\Users\Admin\AppData\Local\Temp\d56c1454ba50e5726df1c1f9cb64c310.exe"2⤵PID:1792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD58cf4dec152a9d79a3d62202b886eda9b
SHA10c1b3d3d02c0b655aa3526a58486b84872f18cc2
SHA256c30e56c9c8fe30ffa4a4ff712cf2fa1808ee82ca258cd4c8ebefcc82250b6c01
SHA512a5a65f0604f8553d0be07bd5214db52d3f167e7511d29cb64e3fa9d8c510cc79976ff2a5acb9b8c09b666f306ac8e4ad389f9a2de3ca46d57b1e91060a4c50fd