Analysis
-
max time kernel
124s -
max time network
134s -
platform
windows10_x64 -
resource
win10 -
submitted
10-07-2020 07:38
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Swift Copy.exe
-
Size
449KB
-
MD5
f68a1350469f33284215b4bdeece9684
-
SHA1
a18e517eb1409c06d73cae87d3253ea83ad8c97f
-
SHA256
ca8f27e8398ec81d1bbaa5714ef8bb4c557edeb706690bc031a3089c990bbef1
-
SHA512
8d47ca1fe59f89112b09cde3648e8b2bc4d29cc9b5abcb3019b4d35fdf49d8e9671ca61674154a9ee02630b137af456b08e691996d04cfb1a3b72445d261867e
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3792 3588 WerFault.exe Swift Copy.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3792 WerFault.exe Token: SeBackupPrivilege 3792 WerFault.exe Token: SeDebugPrivilege 3792 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"1⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 9122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792