Analysis
-
max time kernel
136s -
max time network
50s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13-07-2020 14:21
Static task
static1
Behavioral task
behavioral1
Sample
Swift.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Swift.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Swift.exe
-
Size
495KB
-
MD5
bc83a482919da0b018285329ba46e677
-
SHA1
d5adf56fcd3c1b06acfdf4d2f439d88140029bd6
-
SHA256
3abfb95be4564e9ae481978572cc87821b860b5aab3e1deb0df0d56c28d2d8d0
-
SHA512
62e0c3b32afbaaa35f64030d59372c33c183e53a9346dcdf81deee376839b67d8ab9808177f03d7092923c1a9e54d67985229502918768148716862437f8ae91
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 724 Swift.exe 724 Swift.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 724 set thread context of 1532 724 Swift.exe 69 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1532 RegAsm.exe 1532 RegAsm.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 724 wrote to memory of 1504 724 Swift.exe 68 PID 724 wrote to memory of 1504 724 Swift.exe 68 PID 724 wrote to memory of 1504 724 Swift.exe 68 PID 724 wrote to memory of 1532 724 Swift.exe 69 PID 724 wrote to memory of 1532 724 Swift.exe 69 PID 724 wrote to memory of 1532 724 Swift.exe 69 PID 724 wrote to memory of 1532 724 Swift.exe 69 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1532 RegAsm.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe Swift.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\HBWELB = "C:\\Users\\Admin\\AppData\\Roaming\\HBWELB\\HBWELB.exe" RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift.exe"C:\Users\Admin\AppData\Local\Temp\Swift.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Drops startup file
PID:724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
PID:1532
-