Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 14:21
Static task
static1
Behavioral task
behavioral1
Sample
Swift.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Swift.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Swift.exe
-
Size
495KB
-
MD5
bc83a482919da0b018285329ba46e677
-
SHA1
d5adf56fcd3c1b06acfdf4d2f439d88140029bd6
-
SHA256
3abfb95be4564e9ae481978572cc87821b860b5aab3e1deb0df0d56c28d2d8d0
-
SHA512
62e0c3b32afbaaa35f64030d59372c33c183e53a9346dcdf81deee376839b67d8ab9808177f03d7092923c1a9e54d67985229502918768148716862437f8ae91
Score
7/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 316 wrote to memory of 1480 316 Swift.exe 24 PID 316 wrote to memory of 1480 316 Swift.exe 24 PID 316 wrote to memory of 1480 316 Swift.exe 24 PID 316 wrote to memory of 1480 316 Swift.exe 24 PID 316 wrote to memory of 1480 316 Swift.exe 24 PID 316 wrote to memory of 1480 316 Swift.exe 24 PID 316 wrote to memory of 1480 316 Swift.exe 24 PID 316 wrote to memory of 1480 316 Swift.exe 24 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 316 Swift.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1480 RegAsm.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\HBWELB = "C:\\Users\\Admin\\AppData\\Roaming\\HBWELB\\HBWELB.exe" RegAsm.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 316 set thread context of 1480 316 Swift.exe 24 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1480 RegAsm.exe 1480 RegAsm.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe Swift.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift.exe"C:\Users\Admin\AppData\Local\Temp\Swift.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Drops startup file
PID:316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
- Suspicious behavior: EnumeratesProcesses
PID:1480
-