Analysis

  • max time kernel
    148s
  • max time network
    63s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    16-07-2020 10:42

General

  • Target

    Swift.exe

  • Size

    1.3MB

  • MD5

    4a6cdb0a5b956461c3766686317b8f77

  • SHA1

    daa8f5b4aa6330289bc802c0fe38d541bc5572bc

  • SHA256

    9f9c8fddfe9fb02c88d8cdaea6efe3a1f88e56af6bb71161e30a1196a8cd8438

  • SHA512

    7efcd96570d9613bf989d31f87783af201666286ecedc1d769817c57fda0056906ffe9a678f8cec76f61f3377501e86ea62195448de5d70c283b10002e8c3ca1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Swift.exe
    "C:\Users\Admin\AppData\Local\Temp\Swift.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads