Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 10:42
Static task
static1
Behavioral task
behavioral1
Sample
Swift.exe
Resource
win7
Behavioral task
behavioral2
Sample
Swift.exe
Resource
win10v200430
General
-
Target
Swift.exe
-
Size
1.3MB
-
MD5
4a6cdb0a5b956461c3766686317b8f77
-
SHA1
daa8f5b4aa6330289bc802c0fe38d541bc5572bc
-
SHA256
9f9c8fddfe9fb02c88d8cdaea6efe3a1f88e56af6bb71161e30a1196a8cd8438
-
SHA512
7efcd96570d9613bf989d31f87783af201666286ecedc1d769817c57fda0056906ffe9a678f8cec76f61f3377501e86ea62195448de5d70c283b10002e8c3ca1
Malware Config
Extracted
C:\Users\Admin\AppData\Local\E2C1E8F1FA\Log.txt
masslogger
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 284 Swift.exe 1892 .exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\admin = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 284 Swift.exe Token: SeDebugPrivilege 1892 .exe Token: SeDebugPrivilege 1984 AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 284 Swift.exe 284 Swift.exe 284 Swift.exe 1892 .exe 1892 .exe 1892 .exe 1984 AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1892 set thread context of 1984 1892 .exe 31 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 284 wrote to memory of 1508 284 Swift.exe 24 PID 284 wrote to memory of 1508 284 Swift.exe 24 PID 284 wrote to memory of 1508 284 Swift.exe 24 PID 284 wrote to memory of 1508 284 Swift.exe 24 PID 1508 wrote to memory of 1772 1508 cmd.exe 26 PID 1508 wrote to memory of 1772 1508 cmd.exe 26 PID 1508 wrote to memory of 1772 1508 cmd.exe 26 PID 1508 wrote to memory of 1772 1508 cmd.exe 26 PID 284 wrote to memory of 1892 284 Swift.exe 28 PID 284 wrote to memory of 1892 284 Swift.exe 28 PID 284 wrote to memory of 1892 284 Swift.exe 28 PID 284 wrote to memory of 1892 284 Swift.exe 28 PID 1892 wrote to memory of 1984 1892 .exe 31 PID 1892 wrote to memory of 1984 1892 .exe 31 PID 1892 wrote to memory of 1984 1892 .exe 31 PID 1892 wrote to memory of 1984 1892 .exe 31 PID 1892 wrote to memory of 1984 1892 .exe 31 PID 1892 wrote to memory of 1984 1892 .exe 31 PID 1892 wrote to memory of 1984 1892 .exe 31 PID 1892 wrote to memory of 1984 1892 .exe 31 PID 1892 wrote to memory of 1984 1892 .exe 31 -
Executes dropped EXE 2 IoCs
pid Process 1892 .exe 1984 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift.exe"C:\Users\Admin\AppData\Local\Temp\Swift.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v admin /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v admin /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run key to start application
PID:1772
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:1984
-
-