Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe
-
Size
368KB
-
MD5
cc8e8bed26e01bd70934e3694d47539f
-
SHA1
a82c59683d4763347951eeaf71f94568ea3678d9
-
SHA256
55c76c4160faaf104652eb6da27dda571da4c92a1d4be2e17885c7d0ff3bcbc8
-
SHA512
24cbe8822c99ecbab6b102be7045e16b5236fe4d1ae63a74e391328633ad4fc7e3d21eb3a6f01222f95643caf5c2ad2e18bf185dd1911ecf4d481129d4b657a5
-
SSDEEP
6144:Ke7+66+IWTs/ZrTcNgQitIBhAAK6zIwxCAVcE7Oew073WmJrI1y7Nc/FvwMP:KM+6trAVcrituY/wxrKh0PJZcNv5P
Malware Config
Extracted
fickerstealer
144.217.66.137:81
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1848 set thread context of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2776 1848 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2156 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2776 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 31 PID 1848 wrote to memory of 2776 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 31 PID 1848 wrote to memory of 2776 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 31 PID 1848 wrote to memory of 2776 1848 cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cc8e8bed26e01bd70934e3694d47539f_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 1682⤵
- Program crash
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5907326301a53876360553d631f2775c4
SHA1e900c12c18a7295611f3e2234bc68e8dc0501e06
SHA256d5543b3a5715587c9c0993a7f56f3e1ee445af837f62c38f2f3457a2ea8d00c8
SHA512435c1fd96b79b70c370d6f769d44eca3e682404189ff42a6b5718c21bf9dc8358d72c115d68dc25014b8cb9c709af0e64de012103fce687cf4a340fa8f3ea2aa