Overview
overview
10Static
static
107b707d7788...f8.exe
windows7-x64
57b707d7788...f8.exe
windows10-2004-x64
57be6c0d38e...ce.exe
windows7-x64
107be6c0d38e...ce.exe
windows10-2004-x64
108e9d85ae52...28.exe
windows7-x64
38e9d85ae52...28.exe
windows10-2004-x64
3a246c7a036...82.exe
windows7-x64
10a246c7a036...82.exe
windows10-2004-x64
8a8a9389353...c4.exe
windows7-x64
10a8a9389353...c4.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 18:19
Behavioral task
behavioral1
Sample
7b707d7788849ef1b8722aaea161ee016228239f0713fce4cb9592552f6715f8.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
7b707d7788849ef1b8722aaea161ee016228239f0713fce4cb9592552f6715f8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7be6c0d38ef7ac12dbfd8a45d5b9513934d1e1195eb62c7cb44f103269b1bbce.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
7be6c0d38ef7ac12dbfd8a45d5b9513934d1e1195eb62c7cb44f103269b1bbce.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
8e9d85ae521c93539b3c58c3c9f3aedfe235ee4cea0688f580fc67cefdbeaa28.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
8e9d85ae521c93539b3c58c3c9f3aedfe235ee4cea0688f580fc67cefdbeaa28.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
a246c7a0362b24c2022ebdb4c229f3c8bdd0f8541f55880a03d394f85aa10582.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
a246c7a0362b24c2022ebdb4c229f3c8bdd0f8541f55880a03d394f85aa10582.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe
Resource
win10v2004-20241007-en
General
-
Target
a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe
-
Size
535KB
-
MD5
24529921569a021456436d4088937002
-
SHA1
e51ed743a9b4e639c44e9dd01879ed9861301374
-
SHA256
a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4
-
SHA512
508aedf4215b944ce454c89134d19cc1bb51d3eebfada2c5a75cb53d271c5ac1cead074cd61c784eceb7ac8a70fbefb14ecf42e7635218ca85188da3348f6112
-
SSDEEP
6144:TPMsDJ+WdooOjnbd77EfncL62UhKCx6jB3MW0rLAb56dpLN4XQKJrsu:TPM0JTKo8np8Pce2UhDx613MW0rwrsu
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Fickerstealer family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2820 set thread context of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30 PID 2820 wrote to memory of 2684 2820 a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe"C:\Users\Admin\AppData\Local\Temp\a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe"C:\Users\Admin\AppData\Local\Temp\a8a9389353cbc3155ef587c59f6f2e250740cbad4c7bd1c6f3ff501652f593c4.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD52c807857a435aa8554d595bd14ed35d1
SHA19003a73beceab3d1b1cd65614347c33117041a95
SHA2563c4fae56f61b7cdf09709c2aaf65ca47d3bf9077b1e5eb0eb1e6c5c34923eb9b
SHA51295c6fa9f5b342ef34d896f083700ee12d55723e24aff42805bac5c1aa73f07d0db4f9d435d31a61da187edc2336252dfb38529b3f2b1d2039aa2a8e65d64a7a9