Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
02fae1b6a4d47cfc386b0267fb93c3c3_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
02fae1b6a4d47cfc386b0267fb93c3c3_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
02fae1b6a4d47cfc386b0267fb93c3c3_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
02fae1b6a4d47cfc386b0267fb93c3c3
-
SHA1
6858061de8c3f0558be3b6f36e73be07b01007fb
-
SHA256
0d382123819c1e6ba120584adaa1611135a04db677e3be880e91f422fb9c663f
-
SHA512
ded716fe688f630bfc8f0983f53569b20b6534b66a65db9b9d97434012a643ed63c8b313818528d661ec3d1eb87e13d711f64181a24cad0640f81979a8efe634
-
SSDEEP
12288:PCG/qboPqVi2AqGj7k9Rey+Nt7BOAth5eQX3S:NCbrK57FtzeQXi
Malware Config
Extracted
fickerstealer
intros.top:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org -
Program crash 1 IoCs
pid pid_target Process procid_target 1360 3036 WerFault.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\02fae1b6a4d47cfc386b0267fb93c3c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02fae1b6a4d47cfc386b0267fb93c3c3_JaffaCakes118.exe"1⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 13282⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3036 -ip 30361⤵PID:4128