Analysis
-
max time kernel
82s -
max time network
35s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
07/07/2020, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
SWIFTpayment47547745776.bat.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SWIFTpayment47547745776.bat.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SWIFTpayment47547745776.bat.exe
-
Size
545KB
-
MD5
68b0764829912d9ecd36633377da29bc
-
SHA1
17ab0f2b63d6e723be24ac44874c3a86e01186b5
-
SHA256
37859468e6f4a77939f08daeab868b4da51c1a506334dc85908d2c29b0d977fc
-
SHA512
fedc6097a4f8ef57664ef45fcfcec227ee1a6c1bc894effc43cd32ff3982f89c401efdddc713d0ad4046ace3a7f8a4bf023bd9c007f188a514847227acfa3c15
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1500 SWIFTpayment47547745776.bat.exe 1500 SWIFTpayment47547745776.bat.exe 1820 SWIFTpayment47547745776.bat.exe 1820 SWIFTpayment47547745776.bat.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1500 set thread context of 1820 1500 SWIFTpayment47547745776.bat.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1820 SWIFTpayment47547745776.bat.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\ngnIl = "C:\\Users\\Admin\\AppData\\Roaming\\ngnIl\\ngnIl.exe" SWIFTpayment47547745776.bat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1788 1500 SWIFTpayment47547745776.bat.exe 26 PID 1500 wrote to memory of 1788 1500 SWIFTpayment47547745776.bat.exe 26 PID 1500 wrote to memory of 1788 1500 SWIFTpayment47547745776.bat.exe 26 PID 1500 wrote to memory of 1788 1500 SWIFTpayment47547745776.bat.exe 26 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 PID 1500 wrote to memory of 1820 1500 SWIFTpayment47547745776.bat.exe 27 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1500 SWIFTpayment47547745776.bat.exe Token: SeDebugPrivilege 1820 SWIFTpayment47547745776.bat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFTpayment47547745776.bat.exe"C:\Users\Admin\AppData\Local\Temp\SWIFTpayment47547745776.bat.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\SWIFTpayment47547745776.bat.exe"{path}"2⤵PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\SWIFTpayment47547745776.bat.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Adds Run entry to start application
- Suspicious use of AdjustPrivilegeToken
PID:1820
-