Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 22:14
Static task
static1
Behavioral task
behavioral1
Sample
1672020Swift Copy.Scan8976.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1672020Swift Copy.Scan8976.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
1672020Swift Copy.Scan8976.exe
-
Size
443KB
-
MD5
041f2ac19f452b2d61a76b5d83c29297
-
SHA1
acac069d10ae5eeb06b89c158fcaca19e8932cbb
-
SHA256
0c3d2c9f3d8e38323436d7f47852059f7b0cfc19fa53c86196b5376b8ebe5aff
-
SHA512
0cf2e313eb237eee5951776c6634d9173dd91867ece690691ca9e0b0c2caea49e1b3e97e92be6ce540fc5df445ca4fd8e75de073823175196f45336ccf852a6e
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 112 set thread context of 1092 112 1672020Swift Copy.Scan8976.exe 24 PID 1092 set thread context of 1300 1092 1672020Swift Copy.Scan8976.exe 20 PID 1092 set thread context of 1300 1092 1672020Swift Copy.Scan8976.exe 20 PID 1528 set thread context of 1300 1528 rundll32.exe 20 -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1092 1672020Swift Copy.Scan8976.exe 1092 1672020Swift Copy.Scan8976.exe 1092 1672020Swift Copy.Scan8976.exe 1092 1672020Swift Copy.Scan8976.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Msfo\userbnm.exe rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 112 wrote to memory of 1092 112 1672020Swift Copy.Scan8976.exe 24 PID 112 wrote to memory of 1092 112 1672020Swift Copy.Scan8976.exe 24 PID 112 wrote to memory of 1092 112 1672020Swift Copy.Scan8976.exe 24 PID 112 wrote to memory of 1092 112 1672020Swift Copy.Scan8976.exe 24 PID 112 wrote to memory of 1092 112 1672020Swift Copy.Scan8976.exe 24 PID 112 wrote to memory of 1092 112 1672020Swift Copy.Scan8976.exe 24 PID 112 wrote to memory of 1092 112 1672020Swift Copy.Scan8976.exe 24 PID 1300 wrote to memory of 1528 1300 Explorer.EXE 25 PID 1300 wrote to memory of 1528 1300 Explorer.EXE 25 PID 1300 wrote to memory of 1528 1300 Explorer.EXE 25 PID 1300 wrote to memory of 1528 1300 Explorer.EXE 25 PID 1300 wrote to memory of 1528 1300 Explorer.EXE 25 PID 1300 wrote to memory of 1528 1300 Explorer.EXE 25 PID 1300 wrote to memory of 1528 1300 Explorer.EXE 25 PID 1528 wrote to memory of 1680 1528 rundll32.exe 26 PID 1528 wrote to memory of 1680 1528 rundll32.exe 26 PID 1528 wrote to memory of 1680 1528 rundll32.exe 26 PID 1528 wrote to memory of 1680 1528 rundll32.exe 26 PID 1528 wrote to memory of 1544 1528 rundll32.exe 31 PID 1528 wrote to memory of 1544 1528 rundll32.exe 31 PID 1528 wrote to memory of 1544 1528 rundll32.exe 31 PID 1528 wrote to memory of 1544 1528 rundll32.exe 31 PID 1528 wrote to memory of 1544 1528 rundll32.exe 31 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1092 1672020Swift Copy.Scan8976.exe Token: SeDebugPrivilege 1528 rundll32.exe -
Deletes itself 1 IoCs
pid Process 1680 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OJPHLL2X = "C:\\Program Files (x86)\\Msfo\\userbnm.exe" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1092 1672020Swift Copy.Scan8976.exe 1092 1672020Swift Copy.Scan8976.exe 1092 1672020Swift Copy.Scan8976.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe 1528 rundll32.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 rundll32.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\1672020Swift Copy.Scan8976.exe"C:\Users\Admin\AppData\Local\Temp\1672020Swift Copy.Scan8976.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\1672020Swift Copy.Scan8976.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Modifies Internet Explorer settings
PID:1528 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\1672020Swift Copy.Scan8976.exe"3⤵
- Deletes itself
PID:1680
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1544
-
-