Analysis
-
max time kernel
215s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe
Resource
win10v2004-20240226-en
General
-
Target
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe
-
Size
10.7MB
-
MD5
60bce89d8df5caa28d3d73ee4c94313a
-
SHA1
878e237aeb528a1e4c6c3fe53cb4ffd1c420231e
-
SHA256
cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d
-
SHA512
963629759df10731e7b49a113fd4eb462286d26d4b394bab89bea35f4515cc907d803b01313764b973ebd4876a40e2fff820ad6b10f7a142e74a31a836010665
-
SSDEEP
196608:yxthehwzf4soekmmf7zADj75xtw0QkyPAm2VxdG1P5K5S2njugWR:meCBoeq7adK7JonCxC7juR
Malware Config
Extracted
fickerstealer
prunerflowershop.com:80
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x000700000002320d-473.dat family_babadeda -
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp -
Executes dropped EXE 3 IoCs
pid Process 4508 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 532 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 4772 alcodec.exe -
Loads dropped DLL 1 IoCs
pid Process 4772 alcodec.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 532 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 532 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 532 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 748 wrote to memory of 4508 748 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 88 PID 748 wrote to memory of 4508 748 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 88 PID 748 wrote to memory of 4508 748 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 88 PID 4508 wrote to memory of 1452 4508 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 89 PID 4508 wrote to memory of 1452 4508 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 89 PID 4508 wrote to memory of 1452 4508 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 89 PID 1452 wrote to memory of 532 1452 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 90 PID 1452 wrote to memory of 532 1452 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 90 PID 1452 wrote to memory of 532 1452 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe 90 PID 532 wrote to memory of 4772 532 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 95 PID 532 wrote to memory of 4772 532 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 95 PID 532 wrote to memory of 4772 532 cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe"C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\is-3IRV5.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp"C:\Users\Admin\AppData\Local\Temp\is-3IRV5.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp" /SL5="$301D2,10301284,798720,C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe"C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\is-U45CR.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp"C:\Users\Admin\AppData\Local\Temp\is-U45CR.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp" /SL5="$401D4,10301284,798720,C:\Users\Admin\AppData\Local\Temp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.exe" /VERYSILENT4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Roaming\Creative Labs OpenAl Codec\alcodec.exe"C:\Users\Admin\AppData\Roaming\Creative Labs OpenAl Codec\alcodec.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4772
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD51207bc197a1ebd72a77f1a771cad9e52
SHA18ed121ff66d407150d7390b9276fe690dd213b27
SHA256260658b9cb063d6ce96f681b18704e02fae7bf8fc995fc249ab0be1400983476
SHA512d037cfa3b6e6ced9652b2c781bb54cf48dbaa0aaff05039ae4fd0122749eda472807d4198981aa6ceffeba6d2b23d7ad08d7d96983dbd8539cf6b07e46e157f4
-
C:\Users\Admin\AppData\Local\Temp\is-3IRV5.tmp\cf88923b7d0287884870af999a8d64f90c7deeb4c4d09feed406472ff259b30d.tmp
Filesize3.0MB
MD5e0058e78c38cdc18f30f3b2e508f7f82
SHA1fea2c5bcf045677de140a66f69a1ce471fcd3592
SHA256e952f410d2b4ad999407961619973f658b3fd7362e79becbb647b7e673b213b0
SHA512c584594551132787fe1d428e6751187a4d6e5a9bc7c42b87b1d9a4f9c3f152673735f50b4114f61a6509bceebe4d777021bcc06dce20a2d0839325bc93cdb63d
-
Filesize
859KB
MD57d48ba5bfc96796ab7dc48f6764aec44
SHA1bec9f2d46ad903fdbf66a92aeb95c6da1d29441a
SHA2564d8fa3c825223e76c1ec3a002ff10208a3d3a91366de8472d3afa61fdf3e0ab8
SHA51271914f9266aca04de7e01d04fc7c213a82bb082968e4b8e88cc0e9bf765cb5e1d40a89cc994c03569533ec1355497e853a21a1ac22ae098de8a686241235ce1f
-
Filesize
3.5MB
MD5f387a40e95f63b5647beecdd9c4bf80e
SHA16d3e94f983eb4260e828048f464febfe80fdc5cb
SHA256f607c5c57a1dcfbf8f674519bd68358d147a93458ae18549c4eeea775d179118
SHA51249ff23b2a024de3aa8384c5bd7743038af6c714d82deed2bf839e292ad7d188c220ed792de75f5b42d7da40a955ed78ceb4628100d8385de4ff149377dcc3e2b
-
Filesize
17.1MB
MD53399513c46e46661a9d6c59ec92aefe7
SHA1696d40c6c74d5fdffe60880a454dfe69fd5400cb
SHA256a545d9fdff40e69b99b5f4a118b43666ce6c4f63aec5ca6316b8749c68286eb3
SHA512f3d3eb2491ff640830773dc2e536a8ad196f06a89075c7cd041467a1d08860232a35fcc2da8a20420f4003eb68ca06a66128d73ebd3dbf4a371e5deb4de54ce9