Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe
-
Size
304KB
-
MD5
da132cbd2fa5cd37ae08020e93806014
-
SHA1
d4d58190498b149e38fb0eb435e49c985c92dbe1
-
SHA256
1452c1f907044233491363e69fd1b1ab7e63671e38fa236b8ff83711812e6985
-
SHA512
e4e00f94170837757dae4e8f8f4c4603543e6c6ba59104272cd0b03ea8da67d5e9efdf304158164f0b0446990e568c3a9f3c22eed9e2994e0456f5f67d193ed5
-
SSDEEP
6144:vmpmLC2C8ScIbcG0lRknfyVZ42nZpUyp3SYfqc:vm022C/A14f8Ay5SJc
Malware Config
Extracted
fickerstealer
gzgbnserv639.xyz:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exedescription pid process target process PID 412 set thread context of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exeda132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exedescription pid process target process PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe PID 412 wrote to memory of 924 412 da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da132cbd2fa5cd37ae08020e93806014_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5907326301a53876360553d631f2775c4
SHA1e900c12c18a7295611f3e2234bc68e8dc0501e06
SHA256d5543b3a5715587c9c0993a7f56f3e1ee445af837f62c38f2f3457a2ea8d00c8
SHA512435c1fd96b79b70c370d6f769d44eca3e682404189ff42a6b5718c21bf9dc8358d72c115d68dc25014b8cb9c709af0e64de012103fce687cf4a340fa8f3ea2aa